Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MEuu1a2o6n.exe

Overview

General Information

Sample name:MEuu1a2o6n.exe
renamed because original name is a hash value
Original sample name:B686B0A91C6DA4D4EF4EB9894F41AAEF.exe
Analysis ID:1581462
MD5:b686b0a91c6da4d4ef4eb9894f41aaef
SHA1:d5376faea233ddf3d41de066c35b8a51b88c2d02
SHA256:cea23cddf4b3ab0e7a61377df8dd847b52a7dd84ba5a3a6a3e547f329a5d29fa
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Execution from Suspicious Folder
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • MEuu1a2o6n.exe (PID: 7300 cmdline: "C:\Users\user\Desktop\MEuu1a2o6n.exe" MD5: B686B0A91C6DA4D4EF4EB9894F41AAEF)
    • cmd.exe (PID: 7432 cmdline: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Update.exe (PID: 7476 cmdline: C:\Users\Public\Bilite\Axialis\Update.exe MD5: FB325C945A08D06FE91681179BDCCC66)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Bilite\Axialis\Update.exe, CommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Bilite\Axialis\Update.exe, NewProcessName: C:\Users\Public\Bilite\Axialis\Update.exe, OriginalFileName: C:\Users\Public\Bilite\Axialis\Update.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7432, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, ProcessId: 7476, ProcessName: Update.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: MEuu1a2o6n.exeAvira: detected
Source: C:\Users\Public\Bilite\Axialis\Update.dllReversingLabs: Detection: 36%
Source: MEuu1a2o6n.exeReversingLabs: Detection: 26%
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BD80020 CryptAcquireContextW,CryptCreateHash,CryptReleaseContext,CryptHashData,CryptDestroyHash,CryptReleaseContext,CryptHashData,CryptDestroyHash,CryptReleaseContext,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CryptDestroyHash,CryptReleaseContext,3_2_6BD80020
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BD81000 CryptAcquireContextW,CryptImportKey,CryptReleaseContext,CryptSetKeyParam,CryptDestroyKey,CryptReleaseContext,CryptSetKeyParam,CryptDestroyKey,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,CryptDestroyKey,CryptReleaseContext,3_2_6BD81000
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BD7FD80 CryptStringToBinaryA,CryptStringToBinaryA,3_2_6BD7FD80
Source: MEuu1a2o6n.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Binary string: UpdaterSetup.exe.pdb source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.dr
Source: Binary string: \YSS\Release\Update.pdb source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmp
Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000000.1778938696.0000000000432000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000002.1782606665.0000000000432000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
Source: Binary string: UpdaterSetup.exe.pdbP source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.dr
Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb((& source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000000.1778938696.0000000000432000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000002.1782606665.0000000000432000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
Source: Binary string: \YSS\Release\Update.pdbp: source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmp
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BEFED8C FindFirstFileExW,RevokeDragDrop,FindNextFileW,FindClose,FindClose,3_2_6BEFED8C
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BEFECDB FindFirstFileExW,3_2_6BEFECDB
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDE7D6F __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,3_2_6BDE7D6F
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BD97EE0 WSAStartup,getaddrinfo,WSACleanup,socket,WSACleanup,connect,closesocket,freeaddrinfo,WSACleanup,recv,closesocket,WSACleanup,VirtualAlloc,3_2_6BD97EE0
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.drString found in binary or memory: http://.css
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.drString found in binary or memory: http://.jpg
Source: MEuu1a2o6n.exe, 00000000.00000003.1775350054.0000000000600000.00000004.00001000.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1776381363.0000000006F80000.00000004.00001000.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: MEuu1a2o6n.exe, 00000000.00000003.1775350054.0000000000600000.00000004.00001000.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1776381363.0000000006F80000.00000004.00001000.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: MEuu1a2o6n.exe, 00000000.00000003.1775350054.0000000000600000.00000004.00001000.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1776381363.0000000006F80000.00000004.00001000.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: MEuu1a2o6n.exe, 00000000.00000003.1775350054.0000000000600000.00000004.00001000.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1776381363.0000000006F80000.00000004.00001000.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: MEuu1a2o6n.exe, 00000000.00000003.1775350054.0000000000600000.00000004.00001000.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1776381363.0000000006F80000.00000004.00001000.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: MEuu1a2o6n.exe, 00000000.00000003.1775350054.0000000000600000.00000004.00001000.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1776381363.0000000006F80000.00000004.00001000.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: MEuu1a2o6n.exe, 00000000.00000003.1775350054.0000000000600000.00000004.00001000.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1776381363.0000000006F80000.00000004.00001000.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Update.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: MEuu1a2o6n.exe, 00000000.00000003.1775350054.0000000000600000.00000004.00001000.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1776381363.0000000006F80000.00000004.00001000.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.drString found in binary or memory: http://html4/loose.dtd
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: MEuu1a2o6n.exe, 00000000.00000003.1775350054.0000000000600000.00000004.00001000.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1776381363.0000000006F80000.00000004.00001000.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: MEuu1a2o6n.exe, 00000000.00000003.1775350054.0000000000600000.00000004.00001000.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1776381363.0000000006F80000.00000004.00001000.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: MEuu1a2o6n.exe, 00000000.00000003.1775350054.0000000000600000.00000004.00001000.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1776381363.0000000006F80000.00000004.00001000.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: MEuu1a2o6n.exe, 00000000.00000003.1775350054.0000000000600000.00000004.00001000.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1776381363.0000000006F80000.00000004.00001000.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
Source: MEuu1a2o6n.exe, 00000000.00000003.1775350054.0000000000600000.00000004.00001000.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, MEuu1a2o6n.exe, 00000000.00000003.1776381363.0000000006F80000.00000004.00001000.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.drString found in binary or memory: https://clients2.google.com/cr/report
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.drString found in binary or memory: https://dl.google.com/update2/installers/icons/
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.drString found in binary or memory: https://m.google.com/devicemanagement/data/api
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.drString found in binary or memory: https://update.googleapis.com/service/update2/json
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.drString found in binary or memory: https://update.googleapis.com/service/update2/jsonhttps://clients2.google.com/cr/reporthttps://m.goo
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BE1EDBA __EH_prolog3_catch_GS,CreateCompatibleDC,CreateCompatibleBitmap,FillRect,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,3_2_6BE1EDBA
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDF0E79 GetAsyncKeyState,GetAsyncKeyState,GetKeyboardState,GetKeyboardLayout,MapVirtualKeyW,ToUnicodeEx,CharUpperW,3_2_6BDF0E79
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDACCFE GetKeyState,GetKeyState,GetKeyState,SendMessageW,3_2_6BDACCFE
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDC3FB7 ScreenToClient,GetKeyState,GetKeyState,GetKeyState,KillTimer,IsWindow,3_2_6BDC3FB7
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BD81000 CryptAcquireContextW,CryptImportKey,CryptReleaseContext,CryptSetKeyParam,CryptDestroyKey,CryptReleaseContext,CryptSetKeyParam,CryptDestroyKey,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,CryptDestroyKey,CryptReleaseContext,3_2_6BD81000
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BD9EB803_2_6BD9EB80
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDB8B4D3_2_6BDB8B4D
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BD94EC03_2_6BD94EC0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDBCEF53_2_6BDBCEF5
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BEEA2C43_2_6BEEA2C4
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDA422E3_2_6BDA422E
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BEF01663_2_6BEF0166
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BEE61113_2_6BEE6111
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BEE26A03_2_6BEE26A0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BD945503_2_6BD94550
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BF065423_2_6BF06542
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BEE99403_2_6BEE9940
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDCB87D3_2_6BDCB87D
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDA7F5D3_2_6BDA7F5D
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDD1DAB3_2_6BDD1DAB
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDD9C413_2_6BDD9C41
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BD7F3B03_2_6BD7F3B0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDDB04F3_2_6BDDB04F
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDAD73F3_2_6BDAD73F
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BD9B4C03_2_6BD9B4C0
Source: Joe Sandbox ViewDropped File: C:\Users\Public\Bilite\ChromeSetup.exe A68355D5F7E99F3BE66D84EA5AD4A72F92D1611C53F959C0B4E742B363678578
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6BDBD350 appears 69 times
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6BDBF17E appears 67 times
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6BD9D440 appears 31 times
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6BDA012B appears 63 times
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6BDBF21F appears 44 times
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6BDBF115 appears 204 times
Source: ChromeSetup.exe.0.drStatic PE information: Resource name: B7 type: 7-zip archive data, version 0.4
Source: ChromeSetup.exe.0.drStatic PE information: Resource name: RT_STRING type: CLIPPER COFF executable (VAX #) not stripped - version 71
Source: MEuu1a2o6n.exe, 00000000.00000000.1658926023.000000000041A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameV vs MEuu1a2o6n.exe
Source: MEuu1a2o6n.exe, 00000000.00000003.1660090482.0000000002511000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameV vs MEuu1a2o6n.exe
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamensdksetupJ vs MEuu1a2o6n.exe
Source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUpdate.exe vs MEuu1a2o6n.exe
Source: MEuu1a2o6n.exe, 00000000.00000003.1776381363.0000000006F80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUpdaterSetup.exeB vs MEuu1a2o6n.exe
Source: MEuu1a2o6n.exeBinary or memory string: OriginalFilenameV vs MEuu1a2o6n.exe
Source: MEuu1a2o6n.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal68.evad.winEXE@6/6@0/0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BD99550 CreateToolhelp32Snapshot,Process32FirstW,WideCharToMultiByte,CloseHandle,Process32NextW,CloseHandle,3_2_6BD99550
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BD99A80 GetFileAttributesA,SHGetFolderPathA,GetFileAttributesA,CoInitialize,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,CoUninitialize,3_2_6BD99A80
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDAAA1B FindResourceW,LoadResource,LockResource,3_2_6BDAAA1B
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeFile created: C:\Users\Public\BiliteJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7440:120:WilError_03
Source: MEuu1a2o6n.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: MEuu1a2o6n.exeReversingLabs: Detection: 26%
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeFile read: C:\Users\user\Desktop\MEuu1a2o6n.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\MEuu1a2o6n.exe "C:\Users\user\Desktop\MEuu1a2o6n.exe"
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exe
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: version.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: update.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00021401-0000-0000-C000-000000000046}\InProcServer32Jump to behavior
Source: ChromeSetup.exe.lnk.3.drLNK file: ..\..\Public\Bilite\ChromeSetup.exe
Source: MEuu1a2o6n.exeStatic file information: File size 73957257 > 1048576
Source: Binary string: UpdaterSetup.exe.pdb source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.dr
Source: Binary string: \YSS\Release\Update.pdb source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmp
Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000000.1778938696.0000000000432000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000002.1782606665.0000000000432000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
Source: Binary string: UpdaterSetup.exe.pdbP source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.dr
Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb((& source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000000.1778938696.0000000000432000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000002.1782606665.0000000000432000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
Source: Binary string: \YSS\Release\Update.pdbp: source: MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmp
Source: Update.dll.0.drStatic PE information: section name: .00cfg
Source: ChromeSetup.exe.0.drStatic PE information: section name: CPADinfo
Source: ChromeSetup.exe.0.drStatic PE information: section name: malloc_h
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeCode function: 0_2_0088E400 push esi; ret 0_2_0088E401
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeCode function: 0_2_0088CE30 push es; ret 0_2_0088CE51
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeCode function: 0_2_0088BCD9 push esp; ret 0_2_0088BD19
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BD9F210 push eax; mov dword ptr [esp], 8007000Eh3_2_6BD9F214
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDE18F6 pushfd ; retf 3_2_6BDE18F7
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDE188A pushfd ; retf 3_2_6BDE188B
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDAF863 push esi; ret 3_2_6BDAF865
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDBF1ED push ecx; ret 3_2_6BDBF200
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeFile created: C:\Users\Public\Bilite\Axialis\Update.dllJump to dropped file
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeFile created: C:\Users\Public\Bilite\ChromeSetup.exeJump to dropped file
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeFile created: C:\Users\Public\Bilite\Axialis\Update.exeJump to dropped file
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDC2B1D GetParent,IsIconic,GetParent,__EH_prolog3,3_2_6BDC2B1D
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDB2D84 IsWindowVisible,IsIconic,3_2_6BDB2D84
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDA6D7F IsIconic,IsWindowVisible,3_2_6BDA6D7F
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDD8264 SetRectEmpty,RedrawWindow,ReleaseCapture,SetCapture,ReleaseCapture,SetCapture,SendMessageW,UpdateWindow,SendMessageW,IsWindow,IsIconic,IsZoomed,IsWindow,UpdateWindow,3_2_6BDD8264
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDAE40E IsIconic,3_2_6BDAE40E
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeCode function: 0_2_0088DC0D sldt word ptr [eax+003A0043h]0_2_0088DC0D
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeDropped PE file which has not been started: C:\Users\Public\Bilite\ChromeSetup.exeJump to dropped file
Source: C:\Users\Public\Bilite\Axialis\Update.exeAPI coverage: 4.4 %
Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 7504Thread sleep time: -73000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BEFED8C FindFirstFileExW,RevokeDragDrop,FindNextFileW,FindClose,FindClose,3_2_6BEFED8C
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BEFECDB FindFirstFileExW,3_2_6BEFECDB
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDE7D6F __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,3_2_6BDE7D6F
Source: C:\Users\Public\Bilite\Axialis\Update.exeThread delayed: delay time: 73000Jump to behavior
Source: xfkiejfk.png.0.drBinary or memory string: NHgfS
Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_004315D0 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_004315D0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDA0AC8 OutputDebugStringA,GetLastError,3_2_6BDA0AC8
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BD72590 GetProcessHeap,3_2_6BD72590
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_004315D0 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_004315D0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00431764 SetUnhandledExceptionFilter,3_2_00431764
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00431A8F SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00431A8F
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BE18246 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_6BE18246
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BEF19D8 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6BEF19D8
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDBD236 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6BDBD236
Source: C:\Users\user\Desktop\MEuu1a2o6n.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_004318A4 cpuid 3_2_004318A4
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetLocaleInfoW,3_2_6BDC5B91
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6BF05B73
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6BF05B14
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_6BF058C1
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6BF05826
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6BF05E40
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_6BF05D3A
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6BF05C93
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6BF05C48
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6BEFB18C
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6BEFB7AB
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_6BF055D5
Source: C:\Users\Public\Bilite\Axialis\Update.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_004314B7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_004314B7
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6BDA9085 __EH_prolog3_GS,GetCurrentThread,GetCurrentThreadId,GetVersionExW,3_2_6BDA9085
Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Masquerading
21
Input Capture
1
System Time Discovery
Remote Services21
Input Capture
2
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
LSASS Memory131
Security Software Discovery
Remote Desktop Protocol11
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares1
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync34
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
MEuu1a2o6n.exe26%ReversingLabsWin32.Trojan.Generic
MEuu1a2o6n.exe100%AviraTR/Crypt.CFI.Gen
SourceDetectionScannerLabelLink
C:\Users\Public\Bilite\Axialis\Update.dll37%ReversingLabsWin32.Backdoor.Farfli
C:\Users\Public\Bilite\Axialis\Update.exe0%ReversingLabs
C:\Users\Public\Bilite\ChromeSetup.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tMEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpfalse
    high
    http://html4/loose.dtdMEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.drfalse
      high
      https://sectigo.com/CPS0MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yMEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://ocsp.sectigo.com0MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://m.google.com/devicemanagement/data/apiMEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.drfalse
                high
                http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://dl.google.com/update2/installers/icons/MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.drfalse
                    high
                    http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#MEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002B61000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://.cssMEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.drfalse
                          high
                          http://.jpgMEuu1a2o6n.exe, 00000000.00000003.1760987934.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, ChromeSetup.exe.0.drfalse
                            high
                            No contacted IP infos
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1581462
                            Start date and time:2024-12-27 20:01:10 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 11s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:8
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:MEuu1a2o6n.exe
                            renamed because original name is a hash value
                            Original Sample Name:B686B0A91C6DA4D4EF4EB9894F41AAEF.exe
                            Detection:MAL
                            Classification:mal68.evad.winEXE@6/6@0/0
                            EGA Information:
                            • Successful, ratio: 50%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 38
                            • Number of non-executed functions: 354
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Stop behavior analysis, all processes terminated
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.63
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target MEuu1a2o6n.exe, PID 7300 because there are no executed function
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: MEuu1a2o6n.exe
                            TimeTypeDescription
                            14:02:11API Interceptor1x Sleep call for process: Update.exe modified
                            No context
                            No context
                            No context
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            C:\Users\Public\Bilite\ChromeSetup.exeWiezmDFd6L.exeGet hashmaliciousUnknownBrowse
                              WiezmDFd6L.exeGet hashmaliciousUnknownBrowse
                                Process:C:\Users\user\Desktop\MEuu1a2o6n.exe
                                File Type:openssl enc'd data with salted password, base64 encoded
                                Category:dropped
                                Size (bytes):44
                                Entropy (8bit):4.925118550357139
                                Encrypted:false
                                SSDEEP:3:iqknz1wReNcIIix+:iliRyIH
                                MD5:DF834B315AFBDF1009F18093561F24B0
                                SHA1:E6D34AA40B027DFE0770D7EA47EB0F8391FDE9A5
                                SHA-256:32627CBBDCD3BCC5FC0A9BFABA8F83D3B0658117E957656C61E6A40F1B3F198E
                                SHA-512:26A8B16B1CF69B2EF5B675F4C1AE9CFFAF97AF7B3F5CF04BC7DBB2EA352AFB4D612229F77A4E67CAE1F69CCC289330DAB917D1260E3985B617027E637515CDC1
                                Malicious:false
                                Reputation:low
                                Preview:U2FsdGVkX1+F4WeqPiQSr4Yjb4xJYXlIJqx/6mGhFoo=
                                Process:C:\Users\user\Desktop\MEuu1a2o6n.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):2289432
                                Entropy (8bit):6.608881172420025
                                Encrypted:false
                                SSDEEP:49152:5WDF0mklRXopNsAyGrLf2x2umZTltQCv3n89btEQBz68IaV:5Wh0mklRXo7fyGrTw2umjtQCv3nutEQR
                                MD5:B1B3A26D557D3FFD4FB1358290A0E13E
                                SHA1:763C92A20DB285249F9C043F1249C2C079D45664
                                SHA-256:767CD378AF0B0C6B6665DC89078DB9D52D81EBA13AB72B84512A33C912658711
                                SHA-512:4F66F9E72634BEC4482ACEDE8D15792710EB5A9FC761603B49EBEA096E88F07F3E92B201A68CCD7882DDE9A6CD5B9408C2F082EFAAB937B7E2C4EAACD030B30C
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 37%
                                Reputation:low
                                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....sig...........!.........:......S........................................`#...........@.........................<...O.......h..... ..H............"..)... !..0..\........................b......P................................................text............................... ..`.rdata...].......^..................@..@.data...@..... ..^..................@....00cfg........ ......H .............@..@.tls.......... ......J .............@....rsrc....H.... ..H...L .............@..@.reloc...0... !..2.... .............@..B................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\MEuu1a2o6n.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):395368
                                Entropy (8bit):5.090673225697451
                                Encrypted:false
                                SSDEEP:6144:I0acLF3rgypB1Grf/TRfiJ7BePaEvLJggZy:Y/TRfi3ePtJRg
                                MD5:FB325C945A08D06FE91681179BDCCC66
                                SHA1:F5D91B7D75D34E156066AB4099E0FD0DF9227B32
                                SHA-256:0C2CC4513EC9101A28A7988C72A46175EFD82F387BB3BCFB2612E808804282B5
                                SHA-512:2BB588EBE2FA35D03652AEC4E5D51DABD3A24E996336A4D5EC9C762D6084862D5CD5F530F1DA0B98D2887BA88F4E077697D128071FF497D2967F9F42ADC2F533
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:..[...[...[...#l..[.......[.......[.......[.......[..b....[..e....[...0...[...[...[..e....[..e....[...[h..[..e....[..Rich.[..........................PE..L...X..e............................\........ ....@..................................8....@.................................D(.......@..................h(...........!..T............................!..@............ ...............................text............................... ..`.rdata....... ......................@..@.data........0.......$..............@....rsrc........@.......&..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\MEuu1a2o6n.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):69947528
                                Entropy (8bit):7.999995221278417
                                Encrypted:true
                                SSDEEP:1572864:MAm4Pz2HsA8kQp53/qIgnsCisxhhvxTLhAeXDxv4i/d3AC+ZL:Mjoz98QbPqIgnsCisxhhJlAeXDxvVgL
                                MD5:F3BECB4772D5FFDA3B45506E796FE4CE
                                SHA1:CC14A431A7D6C64CFE0683E0333869959515C587
                                SHA-256:3FDC78A3A74C8BA0C37093AA1308FD2A439CA44052B4E9EF83CC5E90C1589BD6
                                SHA-512:D9334E287A750235BC13AB11F8E3760467CDAB8CE108ECE9DEFAFBA07D60094D3B20EFBD31C61296BA7E7BEC7A1EE67F1BD5E75F99E0E831FE74A48D43FB8357
                                Malicious:false
                                Reputation:low
                                Preview:..>.....x...@..{)`B.........*......F......P j.~.%.c..J2,j.nXj~.._.O...h...$........F)d...|."......G..T..R+Ikt.0'.q..8..9\..b[.H...d.3i.ly ..D.l..0D.!...69...M.!-{nX.....:k.".h...e.G..NN.W.m.+..`.*......[..5.ZL...v.6.\2..k.t.....!k...j..pX...S.<.YD^i@...,.PMy..B.....#^uR.M....K...g.f.....1....k."..&$..XY....@...?..R:.........@.Q|.)D..C...U.V.(.D..lYHh....~o.%B..}.=.;X)6...h....v.......{J<7X)....$H[.]^...._].sq....M.........<..`a&Y=.@S...}Z.%...<..S..v]..'Ri.....`{..:.......9....F.s.]s.(OC8.....u.&2.Ugw}.-..4..i.0..Vcg..]..t.{....z.}...@)).@....v.*.K....D...X%._.t.b.)B.o....fp._.M..#..d...Q...dgI..j#.k.T.....).'MP;.........:......,s......_.&m....v.a$M..!...L-.|Z.c.6....A..j'...K..4...v.%..C..E.h.C...P......A-S..\.......7..v....a...H...|.Om....1....E..\...6.#.:f.^.N....N.r..\v.[.....$..C.....c....P!x......%.d...B...d.A.......Sv.8.D..h^....4.S.yb2.r.5er..|{.HA<.".>.v.?...R..S<{QR..8...;..&F.=.6f..._u...fc(.G..m..,..T.f/..t
                                Process:C:\Users\user\Desktop\MEuu1a2o6n.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):10384768
                                Entropy (8bit):6.780996075213578
                                Encrypted:false
                                SSDEEP:196608:VpjYZ94Z6AhJ5NtGdDDIauMJZZCgdaTos7s4QA/rmYeus5dvXCKsJdVV3qHDYyY2:VpjwKZF5LGdDDvJZZCgdwbcAheus5xXB
                                MD5:C8B07E0F9BA7C97B55CB29835FFAF5F6
                                SHA1:9FFFC728C361DCDD4828212F1F0E56A0DAC92463
                                SHA-256:A68355D5F7E99F3BE66D84EA5AD4A72F92D1611C53F959C0B4E742B363678578
                                SHA-512:0AB0D39F0FBCDB11E241AE95CC540A54EF4D9A6E611AE516EF189627E73505696AEBEDACE7D4527C40F31A021850CB7CB563F4D0CE0411BE2F9B87ABA2493866
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Joe Sandbox View:
                                • Filename: WiezmDFd6L.exe, Detection: malicious, Browse
                                • Filename: WiezmDFd6L.exe, Detection: malicious, Browse
                                Reputation:low
                                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...{*2g.........."......T4...i...................@......................................@.........................<.=.U.....=.@.....@..H^..........,...I...`.......k=.....................Pi=......q4.............@.=.l............................text....S4......T4................. ..`.rdata..`....p4......X4.............@..@.data........ >..R....=.............@....tls....u.....?......N>.............@...CPADinfo(.....?......P>.............@...malloc_h......@......R>............. ..`.rsrc....H^...@..H^..T>.............@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\Public\Bilite\Axialis\Update.exe
                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Dec 27 18:02:09 2024, mtime=Fri Dec 27 18:02:09 2024, atime=Sun Dec 8 12:55:51 2024, length=10384768, window=hide
                                Category:dropped
                                Size (bytes):1056
                                Entropy (8bit):4.714683537886547
                                Encrypted:false
                                SSDEEP:12:8GIGpUlGIwCICHqXbRXyACmq2PxXlFTXjEjAJslGlHavoo44t2YZ/elFlSJmZmV:8GWG7V9JDXUAJsDvo3qyFm
                                MD5:068402181EDD92F80B4EC08996FDB6DE
                                SHA1:C6626DF0000FD7FE62DEA22C3486F4C99D4214AE
                                SHA-256:C462778433FAAE1DA50CE44E911B99AC258DB20DC45A52F676398C3673E93CC7
                                SHA-512:C6FD253B5661F55CDC9CB32F6A634387928D4BD1F7F2085EEC790F6E8777276C082768EAA69B6BB337898ED758C46857994CB8917C25D15C779CE779F4B7E578
                                Malicious:false
                                Preview:L..................F.... ...v.J.X..K.d.X...@.xI...u...........................P.O. .:i.....+00.../C:\...................x.1.....CW;^..Users.d......OwH.Y=.....................:.....K...U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....|.1......Y@...Public..f......O.I.Y@.....+...............<.....'.).P.u.b.l.i.c...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.6.....T.1......YE...Bilite..>......Y@..YE.............................n.B.i.l.i.t.e.....l.2..u...Y.n .CHROME~1.EXE..P......YE..YE..........................."e{.C.h.r.o.m.e.S.e.t.u.p...e.x.e.......U...............-.......T...................C:\Users\Public\Bilite\ChromeSetup.exe..#.....\.....\.P.u.b.l.i.c.\.B.i.l.i.t.e.\.C.h.r.o.m.e.S.e.t.u.p...e.x.e..........v..*.cM.jVD.Es.!...`.......X.......927537...........hT..CrF.f4... ...T..b...,.......hT..CrF.f4... ...T..b...,..................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.2.........9...1SPS.
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.9999862599196385
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:MEuu1a2o6n.exe
                                File size:73'957'257 bytes
                                MD5:b686b0a91c6da4d4ef4eb9894f41aaef
                                SHA1:d5376faea233ddf3d41de066c35b8a51b88c2d02
                                SHA256:cea23cddf4b3ab0e7a61377df8dd847b52a7dd84ba5a3a6a3e547f329a5d29fa
                                SHA512:8b3fe6da763b6ddd3303c454bc904dc7e1632e34651d1a1b82e8fae104742f74c2b435d87c0231103eb73712feb19d2434fd665f95fa0b7509a270503de617ab
                                SSDEEP:1572864:hvZ64UFS44SPDVZpy+1gwFIFhRMNSu8pxpwY9muH4dPuf29k4:hvZ6pbZPDVm3hSN5aIY9zH4xufj4
                                TLSH:F0F733FEC2E39800D18A36F5F59DEF65D6EF80B8CB05A7026C80D9229952E51D74FB60
                                File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................................0....@.......................... ......y|.......................................P...........z.................
                                Icon Hash:674e4f45a7297639
                                Entrypoint:0x411def
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:
                                Time Stamp:0x4C26F87E [Sun Jun 27 07:06:38 2010 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:b5a014d7eeb4c2042897567e1288a095
                                Instruction
                                push ebp
                                mov ebp, esp
                                push FFFFFFFFh
                                push 00414C50h
                                push 00411F80h
                                mov eax, dword ptr fs:[00000000h]
                                push eax
                                mov dword ptr fs:[00000000h], esp
                                sub esp, 68h
                                push ebx
                                push esi
                                push edi
                                mov dword ptr [ebp-18h], esp
                                xor ebx, ebx
                                mov dword ptr [ebp-04h], ebx
                                push 00000002h
                                call dword ptr [00413184h]
                                pop ecx
                                or dword ptr [00419924h], FFFFFFFFh
                                or dword ptr [00419928h], FFFFFFFFh
                                call dword ptr [00413188h]
                                mov ecx, dword ptr [0041791Ch]
                                mov dword ptr [eax], ecx
                                call dword ptr [0041318Ch]
                                mov ecx, dword ptr [00417918h]
                                mov dword ptr [eax], ecx
                                mov eax, dword ptr [00413190h]
                                mov eax, dword ptr [eax]
                                mov dword ptr [00419920h], eax
                                call 00007F86D0B3BF02h
                                cmp dword ptr [00417710h], ebx
                                jne 00007F86D0B3BDEEh
                                push 00411F78h
                                call dword ptr [00413194h]
                                pop ecx
                                call 00007F86D0B3BED4h
                                push 00417048h
                                push 00417044h
                                call 00007F86D0B3BEBFh
                                mov eax, dword ptr [00417914h]
                                mov dword ptr [ebp-6Ch], eax
                                lea eax, dword ptr [ebp-6Ch]
                                push eax
                                push dword ptr [00417910h]
                                lea eax, dword ptr [ebp-64h]
                                push eax
                                lea eax, dword ptr [ebp-70h]
                                push eax
                                lea eax, dword ptr [ebp-60h]
                                push eax
                                call dword ptr [0041319Ch]
                                push 00417040h
                                push 00417000h
                                call 00007F86D0B3BE8Ch
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x150dc0xb4.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x7aae.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x130000x310.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x113170x11400797279c5ab1a163aed1f2a528f9fe3ceFalse0.6174988677536232data6.576987441854239IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x130000x30ea0x32001359639b02bcb8f0a8743e6ead1c0030False0.43828125data5.549434098115495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x170000x292c0x8009415c9c8dea3245d6d73c23393e27d8eFalse0.431640625data3.6583182363171756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x1a0000x7aae0x7c00681924a1176975a6419cbf4cfcb9eeb5False0.8595325100806451data7.469162062602366IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x1a3040x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.41397849462365593
                                RT_STRING0x1a5ec0x278data0.3212025316455696
                                RT_STRING0x1a8640x328data0.3910891089108911
                                RT_STRING0x1ab8c0xe4data0.5482456140350878
                                RT_STRING0x1ac700xbcdata0.5691489361702128
                                RT_STRING0x1ad2c0x2dcdata0.44808743169398907
                                RT_STRING0x1b0080x3b4data0.38396624472573837
                                RT_STRING0x1b3bc0x2c4data0.4166666666666667
                                RT_RCDATA0x1b6800x10data1.5
                                RT_RCDATA0x1b6900x360data0.6944444444444444
                                RT_GROUP_ICON0x1b9f00x14dataEnglishUnited States1.2
                                RT_VERSION0x1ba040x324dataEnglishUnited States0.4552238805970149
                                DLLImport
                                COMCTL32.dll
                                KERNEL32.dllGetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, LoadLibraryA, LockResource, LoadResource, SizeofResource, FindResourceExA, MulDiv, GlobalFree, GlobalAlloc, lstrcmpiA, GetSystemDefaultLCID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, MultiByteToWideChar, GetLocaleInfoW, lstrlenA, lstrcmpiW, GetEnvironmentVariableW, lstrcmpW, GlobalMemoryStatusEx, VirtualAlloc, WideCharToMultiByte, ExpandEnvironmentStringsW, RemoveDirectoryW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, SetThreadLocale, GetLocalTime, GetSystemTimeAsFileTime, lstrlenW, GetTempPathW, SetEnvironmentVariableW, CloseHandle, CreateFileW, GetDriveTypeW, SetCurrentDirectoryW, GetModuleFileNameW, GetCommandLineW, GetVersionExW, CreateEventW, SetEvent, ResetEvent, InitializeCriticalSection, TerminateThread, ResumeThread, SuspendThread, IsBadReadPtr, LocalFree, lstrcpyW, FormatMessageW, GetSystemDirectoryW, DeleteCriticalSection, GetFileSize, SetFilePointer, ReadFile, SetFileTime, SetEndOfFile, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetModuleHandleA, SystemTimeToFileTime, GetLastError, CreateThread, WaitForSingleObject, GetExitCodeThread, Sleep, SetLastError, SetFileAttributesW, GetDiskFreeSpaceExW, lstrcatW, ExitProcess, CompareFileTime, GetStartupInfoA
                                USER32.dllCharUpperW, EndDialog, DestroyWindow, KillTimer, ReleaseDC, DispatchMessageW, GetMessageW, SetTimer, CreateWindowExW, ScreenToClient, GetWindowRect, wsprintfW, GetParent, GetSystemMenu, EnableMenuItem, EnableWindow, MessageBeep, LoadIconW, LoadImageW, wvsprintfW, IsWindow, DefWindowProcW, CallWindowProcW, DrawIconEx, DialogBoxIndirectParamW, GetWindow, ClientToScreen, GetDC, DrawTextW, ShowWindow, SystemParametersInfoW, SetFocus, SetWindowLongW, GetSystemMetrics, GetClientRect, GetDlgItem, GetKeyState, MessageBoxA, wsprintfA, SetWindowTextW, GetSysColor, GetWindowTextLengthW, GetWindowTextW, GetClassNameA, GetWindowLongW, GetMenu, SetWindowPos, CopyImage, SendMessageW, GetWindowDC
                                GDI32.dllGetCurrentObject, StretchBlt, SetStretchBltMode, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, GetObjectW, GetDeviceCaps, DeleteObject, CreateFontIndirectW, DeleteDC
                                SHELL32.dllSHGetFileInfoW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteExW, SHGetSpecialFolderPathW, ShellExecuteW
                                ole32.dllCoInitialize, CreateStreamOnHGlobal, CoCreateInstance
                                OLEAUT32.dllVariantClear, OleLoadPicture, SysAllocString
                                MSVCRT.dll__set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, memset, _wcsnicmp, strncmp, malloc, memmove, _wtol, memcpy, free, memcmp, _purecall, ??2@YAPAXI@Z, ??3@YAXPAX@Z, _except_handler3, _controlfp
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                No network behavior found

                                Click to jump to process

                                Click to jump to process

                                Click to jump to process

                                Target ID:0
                                Start time:14:01:59
                                Start date:27/12/2024
                                Path:C:\Users\user\Desktop\MEuu1a2o6n.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\MEuu1a2o6n.exe"
                                Imagebase:0x400000
                                File size:73'957'257 bytes
                                MD5 hash:B686B0A91C6DA4D4EF4EB9894F41AAEF
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:1
                                Start time:14:02:11
                                Start date:27/12/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe
                                Imagebase:0x240000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:14:02:11
                                Start date:27/12/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:14:02:11
                                Start date:27/12/2024
                                Path:C:\Users\Public\Bilite\Axialis\Update.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\Public\Bilite\Axialis\Update.exe
                                Imagebase:0x430000
                                File size:395'368 bytes
                                MD5 hash:FB325C945A08D06FE91681179BDCCC66
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 0%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Reset < >
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1780007005.0000000000886000.00000004.00000020.00020000.00000000.sdmp, Offset: 00886000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_886000_MEuu1a2o6n.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5cc4d9b6841f11710bf244377597842d745899d857755b528ce25ba544840b2a
                                  • Instruction ID: 557e2da77460eada5b71cb9e0f8e81d02fbf12eca5fbca22467b36072140c4c8
                                  • Opcode Fuzzy Hash: 5cc4d9b6841f11710bf244377597842d745899d857755b528ce25ba544840b2a
                                  • Instruction Fuzzy Hash: F251BD9284E3C54FD7139730886A654BFB1AE23204B1E86DFC4C6CF4E3E6999849C766

                                  Execution Graph

                                  Execution Coverage:4.7%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:8.7%
                                  Total number of Nodes:1458
                                  Total number of Limit Nodes:21
                                  execution_graph 64321 4310e0 64322 4310ec ___scrt_is_nonwritable_in_current_image 64321->64322 64345 4312dc 64322->64345 64324 4310f3 64325 431246 64324->64325 64328 43111d 64324->64328 64363 4315d0 6 API calls 64325->64363 64327 43124d exit 64329 431253 _exit 64327->64329 64330 431121 _initterm_e 64328->64330 64333 43116a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 64328->64333 64331 43114d _initterm 64330->64331 64332 43113c 64330->64332 64331->64333 64334 4311be 64333->64334 64338 4311b6 _register_thread_local_exe_atexit_callback 64333->64338 64349 4316eb memset GetStartupInfoW 64334->64349 64336 4311c3 _get_narrow_winmain_command_line 64350 431c50 GetCommandLineW CommandLineToArgvW 64336->64350 64338->64334 64339 4311d8 64362 431721 GetModuleHandleW 64339->64362 64341 4311df 64341->64327 64342 4311e3 64341->64342 64343 4311e7 _cexit 64342->64343 64344 4311ec ___scrt_uninitialize_crt 64342->64344 64343->64344 64344->64332 64346 4312e5 64345->64346 64364 4318a4 IsProcessorFeaturePresent 64346->64364 64348 4312f1 ___scrt_uninitialize_crt 64348->64324 64349->64336 64351 431c82 64350->64351 64352 431c78 64350->64352 64365 431d6f 64351->64365 64352->64339 64354 431ca0 64355 431d1c LocalFree 64354->64355 64357 431cc1 WideCharToMultiByte 64354->64357 64375 431000 TCGamerUpdateMain 64355->64375 64358 431d6f 4 API calls 64357->64358 64359 431ce1 WideCharToMultiByte 64358->64359 64359->64357 64360 431d14 64359->64360 64360->64355 64361 431d35 64361->64339 64362->64341 64363->64327 64364->64348 64366 431d7d 64365->64366 64367 431d8f malloc 64366->64367 64368 431d82 _callnewh 64367->64368 64369 431d9c 64367->64369 64368->64367 64370 431d9e 64368->64370 64369->64354 64371 431e9f 64370->64371 64374 431e90 _CxxThrowException 64370->64374 64372 431ead _CxxThrowException 64371->64372 64373 431ec3 64372->64373 64373->64354 64374->64371 64375->64361 64376 6bd9f70a 64381 6be26972 64376->64381 64387 6be20ae2 64381->64387 64383 6bd9f714 64384 6bda012b 64383->64384 64409 6bda0140 64384->64409 64388 6be20aee __EH_prolog3 64387->64388 64395 6bdc2f60 64388->64395 64390 6be20b26 64391 6be20b67 64390->64391 64392 6be20b2f GetProfileIntW GetProfileIntW 64390->64392 64406 6bdc2fd4 LeaveCriticalSection RaiseException Concurrency::details::ExternalContextBase::~ExternalContextBase 64391->64406 64392->64391 64394 6be20b6e Concurrency::details::ExternalContextBase::~ExternalContextBase 64394->64383 64396 6bdc2f6c 64395->64396 64397 6bdc2fce 64395->64397 64399 6bdc2f7a 64396->64399 64407 6bdc2ff8 InitializeCriticalSection 64396->64407 64408 6bdb733a RaiseException Concurrency::cancel_current_task 64397->64408 64402 6bdc2fbc EnterCriticalSection 64399->64402 64403 6bdc2f8a EnterCriticalSection 64399->64403 64402->64390 64404 6bdc2fb4 LeaveCriticalSection 64403->64404 64405 6bdc2fa1 InitializeCriticalSection 64403->64405 64404->64402 64405->64404 64406->64394 64407->64399 64410 6bda014f 64409->64410 64411 6bda0156 64409->64411 64415 6beefa38 32 API calls 64410->64415 64416 6beef9c7 32 API calls 64411->64416 64414 6bd9f71e 64415->64414 64416->64414 64417 6beffb9b CreateFileW 64418 6bdb6a7f 64419 6bdb6a83 64418->64419 64420 6bdb6a99 64418->64420 64419->64420 64422 6bdc52dd 7 API calls 3 library calls 64419->64422 64422->64420 64423 6bd9f5ff 64428 6bdbdb5b 64423->64428 64425 6bd9f609 64426 6bda012b 32 API calls 64425->64426 64427 6bd9f613 64426->64427 64429 6bdbdb67 __EH_prolog3 64428->64429 64432 6bdbdeb7 64429->64432 64431 6bdbdd50 Concurrency::details::ExternalContextBase::~ExternalContextBase 64431->64425 64433 6bdbded8 __fread_nolock 64432->64433 64442 6bdbdf5f 64432->64442 64436 6bdbdf08 VerSetConditionMask VerSetConditionMask VerifyVersionInfoW GetSystemMetrics 64433->64436 64435 6bdbdf72 64435->64431 64443 6bdbdf74 64436->64443 64438 6bdbdf51 64520 6bdbe392 64438->64520 64606 6bdbf107 64442->64606 64613 6bdbf115 64443->64613 64445 6bdbdf80 GetSysColor 64446 6bdbdf95 GetSysColor 64445->64446 64447 6bdbdfa1 GetSysColor 64445->64447 64446->64447 64449 6bdbdfc4 64447->64449 64450 6bdbdfb8 GetSysColor 64447->64450 64614 6bda3a38 64449->64614 64450->64449 64452 6bdbdfda 22 API calls 64453 6bdbe10d GetSysColor 64452->64453 64454 6bdbe104 64452->64454 64455 6bdbe11f GetSysColorBrush 64453->64455 64454->64455 64456 6bdbe13b GetSysColorBrush 64455->64456 64457 6bdbe38c 64455->64457 64456->64457 64458 6bdbe14e GetSysColorBrush 64456->64458 64654 6bdb733a RaiseException Concurrency::cancel_current_task 64457->64654 64458->64457 64460 6bdbe161 64458->64460 64622 6bda2d5a 64460->64622 64463 6bdbe16e CreateSolidBrush 64627 6bda2d04 64463->64627 64466 6bda2d5a 4 API calls 64467 6bdbe18c CreateSolidBrush 64466->64467 64468 6bda2d04 3 API calls 64467->64468 64469 6bdbe19d 64468->64469 64470 6bda2d5a 4 API calls 64469->64470 64471 6bdbe1aa CreateSolidBrush 64470->64471 64472 6bda2d04 3 API calls 64471->64472 64473 6bdbe1bb 64472->64473 64474 6bda2d5a 4 API calls 64473->64474 64475 6bdbe1c8 CreateSolidBrush 64474->64475 64476 6bda2d04 3 API calls 64475->64476 64477 6bdbe1dc 64476->64477 64478 6bda2d5a 4 API calls 64477->64478 64479 6bdbe1e9 CreateSolidBrush 64478->64479 64480 6bda2d04 3 API calls 64479->64480 64481 6bdbe1fa 64480->64481 64482 6bda2d5a 4 API calls 64481->64482 64483 6bdbe207 CreateSolidBrush 64482->64483 64484 6bda2d04 3 API calls 64483->64484 64485 6bdbe218 64484->64485 64486 6bda2d5a 4 API calls 64485->64486 64487 6bdbe225 CreateSolidBrush 64486->64487 64488 6bda2d04 3 API calls 64487->64488 64489 6bdbe236 64488->64489 64490 6bda2d5a 4 API calls 64489->64490 64491 6bdbe243 CreatePen 64490->64491 64492 6bda2d04 3 API calls 64491->64492 64493 6bdbe25c 64492->64493 64494 6bda2d5a 4 API calls 64493->64494 64495 6bdbe269 CreatePen 64494->64495 64496 6bda2d04 3 API calls 64495->64496 64497 6bdbe280 64496->64497 64498 6bda2d5a 4 API calls 64497->64498 64499 6bdbe28d CreatePen 64498->64499 64500 6bda2d04 3 API calls 64499->64500 64501 6bdbe2a4 64500->64501 64502 6bdbe2bb 64501->64502 64505 6bda2d5a 4 API calls 64501->64505 64503 6bdbe328 64502->64503 64504 6bdbe2c4 CreateSolidBrush 64502->64504 64650 6bdbef42 7 API calls 2 library calls 64503->64650 64506 6bda2d04 3 API calls 64504->64506 64505->64502 64508 6bdbe326 64506->64508 64633 6bdf1ab9 64508->64633 64509 6bdbe332 64509->64457 64510 6bdbe336 64509->64510 64512 6bda2d04 3 API calls 64510->64512 64514 6bdbe34f CreatePatternBrush 64512->64514 64516 6bda2d04 3 API calls 64514->64516 64517 6bdbe360 64516->64517 64651 6bd9d1f0 64517->64651 64518 6bdbe386 Concurrency::details::ExternalContextBase::~ExternalContextBase 64518->64438 64521 6bdbe3a1 __EH_prolog3_GS 64520->64521 64522 6bda3a38 4 API calls 64521->64522 64523 6bdbe3b0 GetDeviceCaps 64522->64523 64525 6bdbe3ea 64523->64525 64524 6bdbe41e 64526 6bdbe43c 64524->64526 64531 6bda2d30 3 API calls 64524->64531 64525->64524 64528 6bda2d30 3 API calls 64525->64528 64527 6bdbe45a 64526->64527 64533 6bda2d30 3 API calls 64526->64533 64529 6bdbe478 64527->64529 64537 6bda2d30 3 API calls 64527->64537 64530 6bdbe417 DeleteObject 64528->64530 64534 6bdbe496 64529->64534 64540 6bda2d30 3 API calls 64529->64540 64530->64524 64532 6bdbe435 DeleteObject 64531->64532 64532->64526 64536 6bdbe453 DeleteObject 64533->64536 64535 6bdbe4b4 64534->64535 64541 6bda2d30 3 API calls 64534->64541 64538 6bdbe4d2 64535->64538 64546 6bda2d30 3 API calls 64535->64546 64536->64527 64539 6bdbe471 DeleteObject 64537->64539 64542 6bdbe4f0 64538->64542 64549 6bda2d30 3 API calls 64538->64549 64539->64529 64543 6bdbe48f DeleteObject 64540->64543 64545 6bdbe4ad DeleteObject 64541->64545 64544 6bdbe50e 64542->64544 64550 6bda2d30 3 API calls 64542->64550 64543->64534 64547 6bdbe52c 64544->64547 64554 6bda2d30 3 API calls 64544->64554 64545->64535 64548 6bdbe4cb DeleteObject 64546->64548 64686 6bdbee43 64547->64686 64548->64538 64552 6bdbe4e9 DeleteObject 64549->64552 64553 6bdbe507 DeleteObject 64550->64553 64552->64542 64553->64544 64556 6bdbe525 DeleteObject 64554->64556 64555 6bdbe544 __fread_nolock 64557 6bdbe551 GetTextCharsetInfo 64555->64557 64556->64547 64558 6bdbe58b lstrcpyW 64557->64558 64560 6bdbe62b CreateFontIndirectW 64558->64560 64561 6bdbe5bf 64558->64561 64563 6bda2d04 3 API calls 64560->64563 64561->64560 64562 6bdbe5c8 EnumFontFamiliesW 64561->64562 64564 6bdbe5f9 EnumFontFamiliesW 64562->64564 64565 6bdbe5e4 lstrcpyW 64562->64565 64568 6bdbe63d 64563->64568 64566 6bdbe618 lstrcpyW 64564->64566 64565->64560 64566->64560 64569 6bdbe673 CreateFontIndirectW 64568->64569 64570 6bda2d04 3 API calls 64569->64570 64571 6bdbe685 64570->64571 64572 6bdbee43 SystemParametersInfoW 64571->64572 64573 6bdbe6a0 CreateFontIndirectW 64572->64573 64574 6bda2d04 3 API calls 64573->64574 64575 6bdbe6c8 CreateFontIndirectW 64574->64575 64576 6bda2d04 3 API calls 64575->64576 64577 6bdbe6f4 CreateFontIndirectW 64576->64577 64578 6bda2d04 3 API calls 64577->64578 64579 6bdbe715 GetSystemMetrics lstrcpyW CreateFontIndirectW 64578->64579 64580 6bda2d04 3 API calls 64579->64580 64581 6bdbe751 GetStockObject 64580->64581 64582 6bdbe849 64581->64582 64583 6bdbe77f GetObjectW 64581->64583 64689 6bdbee84 64582->64689 64583->64582 64585 6bdbe794 lstrcpyW CreateFontIndirectW 64583->64585 64586 6bda2d04 3 API calls 64585->64586 64587 6bdbe7e3 CreateFontIndirectW 64586->64587 64588 6bda2d04 3 API calls 64587->64588 64590 6bdbe7fc GetObjectW CreateFontIndirectW 64588->64590 64589 6bdbe885 64591 6bd9d1f0 4 API calls 64589->64591 64594 6bda2d04 3 API calls 64590->64594 64595 6bdbe89a 64591->64595 64592 6bdbe8ab 64711 6bdb733a RaiseException Concurrency::cancel_current_task 64592->64711 64593 6bdbe850 64593->64589 64593->64592 64707 6bdaa885 RaiseException EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase 64593->64707 64598 6bdbe828 CreateFontIndirectW 64594->64598 64599 6bda3a8d 5 API calls 64595->64599 64601 6bda2d04 3 API calls 64598->64601 64602 6bdbe8a5 64599->64602 64601->64582 64708 6bdbf201 64602->64708 64607 6bdbf10f 64606->64607 64608 6bdbf110 IsProcessorFeaturePresent 64606->64608 64607->64435 64610 6be18160 64608->64610 64725 6be18246 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 64610->64725 64612 6be18243 64612->64435 64613->64445 64615 6bda3a44 __EH_prolog3 64614->64615 64616 6bda3a67 GetWindowDC 64615->64616 64655 6bda2ee6 64616->64655 64619 6bda3a7d Concurrency::details::ExternalContextBase::~ExternalContextBase 64619->64452 64623 6bda2d63 64622->64623 64624 6bda2d60 64622->64624 64664 6bda2d30 64623->64664 64624->64463 64626 6bda2d68 DeleteObject 64626->64463 64628 6bda2d26 64627->64628 64629 6bda2d11 64627->64629 64628->64466 64669 6bda3c00 RaiseException EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase __EH_prolog3 64629->64669 64631 6bda2d1b 64670 6bdc0122 RaiseException Concurrency::details::ExternalContextBase::~ExternalContextBase 64631->64670 64634 6bdf1ac2 64633->64634 64644 6bdbe374 64633->64644 64634->64644 64671 6be222d2 DeleteObject RaiseException EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase 64634->64671 64636 6bdf1ad5 64672 6be222d2 DeleteObject RaiseException EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase 64636->64672 64638 6bdf1adf 64673 6be222d2 DeleteObject RaiseException EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase 64638->64673 64640 6bdf1ae9 64674 6be222d2 DeleteObject RaiseException EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase 64640->64674 64642 6bdf1af3 64675 6be222d2 DeleteObject RaiseException EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase 64642->64675 64645 6bda3a8d 64644->64645 64676 6bda2f28 64645->64676 64647 6bda3abd ReleaseDC 64680 6bda37da 64647->64680 64650->64509 64652 6bda2d5a 4 API calls 64651->64652 64653 6bd9d240 64652->64653 64653->64508 64656 6bda2f09 64655->64656 64657 6bda2ef3 64655->64657 64656->64619 64661 6bda268b RaiseException Concurrency::cancel_current_task 64656->64661 64662 6bda3b8f RaiseException EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase __EH_prolog3 64657->64662 64659 6bda2efe 64663 6bdc0122 RaiseException Concurrency::details::ExternalContextBase::~ExternalContextBase 64659->64663 64662->64659 64663->64656 64665 6bda2d3b 64664->64665 64666 6bda2d42 64664->64666 64668 6bda3c00 RaiseException EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase __EH_prolog3 64665->64668 64666->64626 64668->64666 64669->64631 64670->64628 64671->64636 64672->64638 64673->64640 64674->64642 64675->64644 64677 6bda2f3b 64676->64677 64678 6bda2f34 64676->64678 64677->64647 64685 6bda3b8f RaiseException EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase __EH_prolog3 64678->64685 64681 6bda3808 64680->64681 64682 6bda3814 64680->64682 64683 6bda2f28 3 API calls 64681->64683 64682->64518 64684 6bda380d DeleteDC 64683->64684 64684->64682 64685->64677 64687 6bdbee58 SystemParametersInfoW 64686->64687 64688 6bdbee52 64686->64688 64687->64555 64688->64687 64690 6bdbee90 __EH_prolog3_GS 64689->64690 64691 6bda3a38 4 API calls 64690->64691 64692 6bdbee9c 64691->64692 64712 6bda3083 64692->64712 64695 6bdbeeb9 GetTextMetricsW 64697 6bda3083 5 API calls 64695->64697 64696 6bdbef3c 64720 6bdb733a RaiseException Concurrency::cancel_current_task 64696->64720 64699 6bdbeef9 GetTextMetricsW 64697->64699 64701 6bda3083 5 API calls 64699->64701 64702 6bdbef2e 64701->64702 64703 6bda3a8d 5 API calls 64702->64703 64704 6bdbef36 64703->64704 64705 6bdbf201 5 API calls 64704->64705 64706 6bdbef3b 64705->64706 64706->64593 64707->64593 64709 6bdbf107 _ValidateLocalCookies 5 API calls 64708->64709 64710 6bdbf20b 64709->64710 64710->64710 64713 6bda309a SelectObject 64712->64713 64714 6bda30a9 64712->64714 64713->64714 64716 6bda30bf 64714->64716 64717 6bda30b5 SelectObject 64714->64717 64721 6bda2cf2 64716->64721 64717->64716 64719 6bda30c5 64719->64695 64719->64696 64724 6bda3c00 RaiseException EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase __EH_prolog3 64721->64724 64723 6bda2cfc 64724->64723 64725->64612 64726 6bdc5234 64727 6bdc523d 64726->64727 64728 6bdc524d 64726->64728 64757 6bdc4e5d TlsAlloc InitializeCriticalSection RaiseException 64727->64757 64732 6bdc529f 64728->64732 64738 6bdc4e9d EnterCriticalSection 64728->64738 64731 6bdc5261 64731->64732 64733 6bdc5267 64731->64733 64759 6bdb733a RaiseException Concurrency::cancel_current_task 64732->64759 64758 6bdc5196 EnterCriticalSection TlsGetValue LeaveCriticalSection LeaveCriticalSection 64733->64758 64737 6bdc5273 Concurrency::details::ExternalContextBase::~ExternalContextBase 64745 6bdc4ec1 64738->64745 64739 6bdc4fd4 LeaveCriticalSection 64760 6bdb7306 RaiseException Concurrency::cancel_current_task 64739->64760 64741 6bdc4f71 __fread_nolock 64746 6bdc4fa1 LeaveCriticalSection 64741->64746 64742 6bdc4f28 GlobalHandle 64747 6bdc4fbc 64742->64747 64748 6bdc4f3b GlobalUnlock 64742->64748 64743 6bdc4f13 64751 6bdc4f1b GlobalAlloc 64743->64751 64745->64739 64745->64741 64745->64742 64745->64743 64746->64731 64747->64739 64750 6bdc4fc1 GlobalHandle 64747->64750 64752 6bdb6d62 64748->64752 64750->64739 64753 6bdc4fcd GlobalLock 64750->64753 64754 6bdc4f5d 64751->64754 64755 6bdc4f51 GlobalReAlloc 64752->64755 64753->64739 64754->64747 64756 6bdc4f61 GlobalLock 64754->64756 64755->64754 64756->64739 64756->64741 64757->64728 64758->64737 64761 6bd9a4d0 64815 6bd75430 64761->64815 64767 6bd9a548 64848 6bd98ac0 64767->64848 64771 6bd9a573 64772 6bd786c0 29 API calls 64771->64772 64773 6bd9a57b 64772->64773 64776 6bd9a598 64773->64776 64874 6bd992d0 64773->64874 64778 6bd9a696 CreateThread 64776->64778 64898 6bd99a80 64776->64898 64777 6bd99fe0 31 API calls 64779 6bd9a5c4 64777->64779 64781 6bd9a6e5 WaitForSingleObject 64778->64781 64782 6bd9a73f 64778->64782 66238 6bd99520 Sleep 64778->66238 64787 6bd85700 30 API calls 64779->64787 64781->64782 64785 6bd9a70a 64781->64785 64933 6bd9a1c0 31 API calls 64782->64933 64784 6bd9a64e 64790 6bd9a65e CreateThread 64784->64790 64791 6bd786c0 29 API calls 64785->64791 64786 6bd9a77a 64934 6bd99f60 31 API calls 64786->64934 64788 6bd9a5ee 64787->64788 64793 6bd786c0 29 API calls 64788->64793 64790->64778 66239 6bd99950 64790->66239 64794 6bd9a726 64791->64794 64792 6bd9a795 64935 6bd77a70 64792->64935 64795 6bd9a5fe 64793->64795 64885 6bef5dae 64795->64885 64800 6bd9a611 64802 6bd786c0 29 API calls 64800->64802 64801 6bd9a7dd 64803 6bd786c0 29 API calls 64801->64803 64802->64776 64804 6bd9a7ed 64803->64804 64940 6bd84990 147 API calls 64804->64940 64806 6bd9a815 64941 6bd993b0 102 API calls 3 library calls 64806->64941 64808 6bd9a829 64942 6bd97ee0 60 API calls 3 library calls 64808->64942 64810 6bd9a868 64943 6beef36f 47 API calls CallUnexpected 64810->64943 64812 6bd9a87b 64813 6bd786c0 29 API calls 64812->64813 64814 6bd9a88f 64813->64814 64944 6bd75580 64815->64944 64819 6bd75477 64950 6bd73d20 64819->64950 64821 6bd754ac 64988 6bd74470 64821->64988 64828 6bd75495 64828->64821 64830 6bd754e2 Sleep 64828->64830 64957 6bd73ef0 64828->64957 64975 6bd74c70 64828->64975 64980 6bd74de0 64828->64980 64830->64828 64831 6bd74470 39 API calls 64832 6bd75540 64831->64832 65005 6bd755e0 64832->65005 64835 6bd99fe0 GetModuleFileNameA 64836 6bd77a70 30 API calls 64835->64836 64837 6bd9a059 64836->64837 64838 6bd9a08c 64837->64838 64839 6bd9a0d0 64837->64839 65275 6bd97e80 30 API calls 64838->65275 64841 6bd77a70 30 API calls 64839->64841 64842 6bd9a0b9 64841->64842 64843 6bd786c0 29 API calls 64842->64843 64844 6bd9a107 64843->64844 64845 6bd85700 64844->64845 65276 6bd78a30 64845->65276 64847 6bd85748 64847->64767 65285 6bd859d0 64848->65285 64850 6bd98b3b 64851 6bd98b7c 64850->64851 64852 6bd98b4e 64850->64852 65289 6bd98d10 64851->65289 64853 6bd77a70 30 API calls 64852->64853 64870 6bd98b68 64853->64870 64855 6bd98b95 65294 6bd98e90 64855->65294 64858 6bd98caf 64871 6bd786c0 64858->64871 64859 6bd98bc9 65304 6bd7c140 64859->65304 64861 6bd98be7 65308 6bd990a0 64861->65308 64863 6bd98c2c 64864 6bd98c4c 64863->64864 64865 6bd98c51 64863->64865 65315 6bd85ad0 64864->65315 64866 6bd77a70 30 API calls 64865->64866 64869 6bd98c61 64866->64869 64868 6bd786c0 29 API calls 64868->64870 64869->64868 65320 6bd85da0 64870->65320 65980 6bd795b0 64871->65980 64873 6bd786d4 64873->64771 64875 6bd77a70 30 API calls 64874->64875 64876 6bd99330 64875->64876 65985 6bd81000 64876->65985 64878 6bd99352 66042 6bd7f690 64878->66042 64880 6bd9936b 64881 6bd786c0 29 API calls 64880->64881 64882 6bd99376 64881->64882 64883 6bd786c0 29 API calls 64882->64883 64884 6bd9937e 64883->64884 64884->64777 64886 6bef5dbc 64885->64886 64887 6bef5dc6 64885->64887 64888 6bf02e89 16 API calls 64886->64888 66172 6bef5e18 64887->66172 64890 6bef5dc3 64888->64890 64890->64800 64894 6bef5df4 64896 6bef5e12 64894->64896 64897 6bef8f57 ___free_lconv_mon 14 API calls 64894->64897 64896->64800 64897->64896 64899 6bd77a70 30 API calls 64898->64899 64900 6bd99aeb 64899->64900 66222 6bd93b70 64900->66222 64902 6bd99b13 64903 6bd786c0 29 API calls 64902->64903 64904 6bd99b20 64903->64904 64905 6bd99b28 GetFileAttributesA 64904->64905 64906 6bd99b49 SHGetFolderPathA 64905->64906 64932 6bd99b3d 64905->64932 64907 6bd99b90 64906->64907 64906->64932 64909 6bd77a70 30 API calls 64907->64909 64908 6bd786c0 29 API calls 64910 6bd99e85 64908->64910 64911 6bd99bb5 64909->64911 64910->64784 64912 6bd85700 30 API calls 64911->64912 64913 6bd99be3 64912->64913 64914 6bd93b70 30 API calls 64913->64914 64915 6bd99c10 64914->64915 64916 6bd85700 30 API calls 64915->64916 64917 6bd99c3b 64916->64917 64918 6bd786c0 29 API calls 64917->64918 64919 6bd99c4b 64918->64919 64920 6bd786c0 29 API calls 64919->64920 64921 6bd99c56 64920->64921 64922 6bd786c0 29 API calls 64921->64922 64923 6bd99c61 64922->64923 64924 6bd99c6c GetFileAttributesA 64923->64924 64925 6bd99c8d CoInitialize 64924->64925 64926 6bd99c81 64924->64926 66225 6bd781c0 64925->66225 64928 6bd786c0 29 API calls 64926->64928 64928->64932 64929 6bd99cad CoCreateInstance 64930 6bd99e4f CoUninitialize 64929->64930 64931 6bd99cf2 64929->64931 64930->64926 64931->64930 64932->64908 64933->64786 64934->64792 64936 6bd77ab7 64935->64936 66230 6bd77b60 64936->66230 64938 6bd77aec 64939 6bd9a3b0 32 API calls __fread_nolock 64938->64939 64939->64801 64940->64806 64941->64808 64942->64810 64943->64812 65008 6bef29a2 GetSystemTimeAsFileTime 64944->65008 64946 6bd7546c 64947 6bef5d28 64946->64947 65010 6bef91e3 GetLastError 64947->65010 65060 6bef5d3a 64950->65060 64953 6bef5d3a 50 API calls 64954 6bd73d98 64953->64954 65063 6bd73e80 64954->65063 64958 6bd73f19 64957->64958 64959 6bd73f76 64958->64959 64960 6bd74470 39 API calls 64958->64960 64961 6bd74470 39 API calls 64959->64961 64960->64958 64974 6bd73f91 64961->64974 64962 6bd73fc8 64963 6bd743eb 64962->64963 64965 6bd74470 39 API calls 64962->64965 64966 6bd74470 39 API calls 64963->64966 64964 6bd74470 39 API calls 64964->64974 64965->64962 64967 6bd74406 64966->64967 64968 6bd74470 39 API calls 64967->64968 64969 6bd74424 64968->64969 64970 6bd749e0 82 API calls 64969->64970 64971 6bd74444 64970->64971 64972 6bd74470 39 API calls 64971->64972 64973 6bd74465 64972->64973 64973->64828 64974->64962 64974->64964 65071 6bef10d7 64975->65071 64978 6bd74c92 64978->64828 64981 6bd74e2f 64980->64981 64982 6bef5d3a 50 API calls 64981->64982 64987 6bd750b6 64981->64987 64983 6bd7503f 64982->64983 64984 6bef5d3a 50 API calls 64983->64984 64985 6bd75065 64984->64985 64986 6bd73e80 30 API calls 64985->64986 64986->64987 64987->64828 64990 6bd744c0 64988->64990 65112 6bd769d0 64990->65112 64994 6bd7480f 64996 6bd749e0 64994->64996 64995 6bd74561 65116 6bd76d50 64995->65116 64997 6bd769d0 39 API calls 64996->64997 64998 6bd74a2d 64997->64998 65004 6bd74a40 std::ios_base::_Ios_base_dtor 64998->65004 65143 6bd798c0 64998->65143 64999 6bd76d50 39 API calls 65000 6bd74bad 64999->65000 65002 6bd76dc0 39 API calls 65000->65002 65003 6bd74bbd 65002->65003 65003->64831 65004->64999 65267 6bd75730 65005->65267 65009 6bef29db __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 65008->65009 65009->64946 65011 6bef91f9 65010->65011 65012 6bef91ff 65010->65012 65037 6befb10b 6 API calls std::_Locinfo::_Locinfo_dtor 65011->65037 65034 6bef9203 SetLastError 65012->65034 65038 6befb14a 6 API calls std::_Locinfo::_Locinfo_dtor 65012->65038 65015 6bef921b 65015->65034 65039 6befc2a8 65015->65039 65019 6bef9298 65056 6bef4151 50 API calls CallUnexpected 65019->65056 65020 6bef5d32 65020->64819 65021 6bef9249 65047 6befb14a 6 API calls std::_Locinfo::_Locinfo_dtor 65021->65047 65022 6bef9238 65046 6befb14a 6 API calls std::_Locinfo::_Locinfo_dtor 65022->65046 65027 6bef9246 65049 6bef8f57 65027->65049 65028 6bef9255 65029 6bef9259 65028->65029 65030 6bef9270 65028->65030 65048 6befb14a 6 API calls std::_Locinfo::_Locinfo_dtor 65029->65048 65055 6bef9520 14 API calls _unexpected 65030->65055 65034->65019 65034->65020 65035 6bef927b 65036 6bef8f57 ___free_lconv_mon 14 API calls 65035->65036 65036->65034 65037->65012 65038->65015 65044 6befc2b5 _unexpected 65039->65044 65040 6befc2f5 65058 6bee50d6 14 API calls __dosmaperr 65040->65058 65041 6befc2e0 RtlAllocateHeap 65043 6bef9230 65041->65043 65041->65044 65043->65021 65043->65022 65044->65040 65044->65041 65057 6beef2bb EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase 65044->65057 65046->65027 65047->65028 65048->65027 65050 6bef8f8c 65049->65050 65051 6bef8f62 RtlFreeHeap 65049->65051 65050->65034 65051->65050 65052 6bef8f77 GetLastError 65051->65052 65053 6bef8f84 __dosmaperr 65052->65053 65059 6bee50d6 14 API calls __dosmaperr 65053->65059 65055->65035 65057->65044 65058->65043 65059->65050 65061 6bef91e3 _unexpected 50 API calls 65060->65061 65062 6bd73d86 65061->65062 65062->64953 65066 6bd759f0 65063->65066 65065 6bd73df9 65065->64828 65067 6bd75a71 65066->65067 65069 6bd75a4a 65066->65069 65070 6bd75b50 30 API calls 65067->65070 65069->65065 65070->65069 65072 6bef10e3 ___scrt_is_nonwritable_in_current_image 65071->65072 65080 6bef206c EnterCriticalSection 65072->65080 65074 6bef10ea 65081 6bef1395 65074->65081 65079 6bef1127 29 API calls 2 library calls 65079->64978 65080->65074 65082 6bef13b3 65081->65082 65091 6bef13c2 65082->65091 65098 6beffa06 CreateFileW ___initconin 65082->65098 65084 6bef13cf 65084->65091 65099 6beffa77 5 API calls ___initconin 65084->65099 65085 6bdbf107 _ValidateLocalCookies 5 API calls 65086 6bef10f8 65085->65086 65095 6bef111e 65086->65095 65088 6bef13e0 65088->65091 65092 6bef140d __DllMainCRTStartup@12 65088->65092 65094 6bef144a 65088->65094 65100 6bef8f91 65088->65100 65091->65085 65092->65094 65107 6beffabd 5 API calls ___initconin 65092->65107 65108 6bde800c 14 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 65094->65108 65111 6bef2083 LeaveCriticalSection 65095->65111 65097 6bd74c7e 65097->64978 65097->65079 65098->65084 65099->65088 65101 6bef8fcf 65100->65101 65105 6bef8f9f _unexpected 65100->65105 65110 6bee50d6 14 API calls __dosmaperr 65101->65110 65102 6bef8fba RtlAllocateHeap 65104 6bef8fcd 65102->65104 65102->65105 65104->65092 65105->65101 65105->65102 65109 6beef2bb EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase 65105->65109 65107->65094 65108->65091 65109->65105 65110->65104 65111->65097 65113 6bd76a19 65112->65113 65115 6bd76a31 65113->65115 65124 6bd76ee0 39 API calls 65113->65124 65115->64995 65117 6bd76d7e 65116->65117 65125 6bd77220 65117->65125 65120 6bd76dc0 65121 6bd76dd4 65120->65121 65122 6bd76dfb 65121->65122 65142 6bd796e0 39 API calls 65121->65142 65122->64994 65124->65115 65128 6bd772a0 65125->65128 65129 6bd747f9 65128->65129 65130 6bd772fa 65128->65130 65129->65120 65132 6bd7730b 65130->65132 65138 6bee1da1 RaiseException 65130->65138 65139 6bd773f0 38 API calls 65132->65139 65134 6bd773b2 65140 6bd77440 30 API calls 65134->65140 65136 6bd773c7 65141 6bee1da1 RaiseException 65136->65141 65138->65132 65139->65134 65140->65136 65141->65129 65142->65122 65156 6bdbbd4e 65143->65156 65147 6bd79917 65155 6bd79955 65147->65155 65168 6bd79dc0 65147->65168 65150 6bd799fe 65150->65004 65152 6bd7998b 65177 6bdbbf2c RaiseException Concurrency::cancel_current_task ___std_exception_copy 65152->65177 65178 6bdbbd7f 65155->65178 65157 6bdbbd5d 65156->65157 65158 6bdbbd64 65156->65158 65185 6bef209a 6 API calls 2 library calls 65157->65185 65161 6bd79902 65158->65161 65186 6bde7f59 EnterCriticalSection 65158->65186 65162 6bd79c00 65161->65162 65163 6bd79c7a 65162->65163 65164 6bd79c1b 65162->65164 65163->65147 65165 6bdbbd4e std::_Lockit::_Lockit 7 API calls 65164->65165 65166 6bd79c2c 65165->65166 65167 6bdbbd7f std::_Lockit::~_Lockit 2 API calls 65166->65167 65167->65163 65169 6bd79dff 65168->65169 65175 6bd79972 65168->65175 65169->65175 65187 6bd9ffd7 65169->65187 65171 6bd79e18 65198 6bd7a060 65171->65198 65173 6bd79e3c 65209 6bd7a290 75 API calls 2 library calls 65173->65209 65175->65152 65176 6bd79ef0 RaiseException Concurrency::cancel_current_task 65175->65176 65177->65155 65179 6bef20a8 65178->65179 65181 6bdbbd89 65178->65181 65266 6bef2083 LeaveCriticalSection 65179->65266 65182 6bdbbd9c 65181->65182 65265 6bde7f67 LeaveCriticalSection 65181->65265 65182->65150 65183 6bef20af 65183->65150 65185->65161 65186->65161 65188 6bd9ffdc ___std_exception_copy 65187->65188 65189 6bd9fff6 65188->65189 65191 6bd9fff8 65188->65191 65210 6beef2bb EnterCriticalSection LeaveCriticalSection Concurrency::details::ExternalContextBase::~ExternalContextBase 65188->65210 65189->65171 65192 6bdbced8 Concurrency::details::ExternalContextBase::~ExternalContextBase 65191->65192 65193 6bdbc375 Concurrency::cancel_current_task 65191->65193 65212 6bee1da1 RaiseException 65192->65212 65211 6bee1da1 RaiseException 65193->65211 65195 6bdbcef4 65197 6bdbc391 65199 6bdbbd4e std::_Lockit::_Lockit 7 API calls 65198->65199 65200 6bd7a0a9 65199->65200 65201 6bd7a13f 65200->65201 65202 6bd7a10a 65200->65202 65222 6bdbc3d2 30 API calls 2 library calls 65201->65222 65213 6bdbbfae 65202->65213 65206 6bd7a153 65223 6bd7a3f0 14 API calls 65206->65223 65208 6bd7a16f 65208->65173 65209->65175 65210->65188 65211->65197 65212->65195 65224 6bef5e57 65213->65224 65217 6bdbbfd3 65218 6bdbbfe2 65217->65218 65219 6bef5e57 std::_Locinfo::_Locinfo_dtor 74 API calls 65217->65219 65220 6bdbc014 _Yarn 14 API calls 65218->65220 65219->65218 65221 6bd7a123 65220->65221 65221->65173 65222->65206 65223->65208 65233 6befb4c6 65224->65233 65226 6bef5e64 65227 6bef6089 std::_Locinfo::_Locinfo_dtor 74 API calls 65226->65227 65228 6bdbbfbb 65227->65228 65229 6bdbc014 65228->65229 65230 6bdbc022 65229->65230 65232 6bdbc02e _Yarn ___std_exception_copy 65229->65232 65230->65232 65264 6bef5045 14 API calls ___free_lconv_mon 65230->65264 65232->65217 65232->65232 65254 6befb64d 5 API calls std::_Locinfo::_Locinfo_dtor 65233->65254 65235 6befb4cb 65255 6befb667 5 API calls std::_Locinfo::_Locinfo_dtor 65235->65255 65237 6befb4d0 65256 6befb681 5 API calls std::_Locinfo::_Locinfo_dtor 65237->65256 65239 6befb4d5 65257 6befb69b 5 API calls std::_Locinfo::_Locinfo_dtor 65239->65257 65241 6befb4da 65258 6befb6b5 5 API calls std::_Locinfo::_Locinfo_dtor 65241->65258 65243 6befb4df 65259 6befb6cf 5 API calls std::_Locinfo::_Locinfo_dtor 65243->65259 65245 6befb4e4 65260 6befb6e9 5 API calls std::_Locinfo::_Locinfo_dtor 65245->65260 65247 6befb4e9 65261 6befb703 5 API calls std::_Locinfo::_Locinfo_dtor 65247->65261 65249 6befb4ee 65262 6befb71d 5 API calls std::_Locinfo::_Locinfo_dtor 65249->65262 65251 6befb4f3 65263 6befb737 5 API calls std::_Locinfo::_Locinfo_dtor 65251->65263 65253 6befb4f8 65253->65253 65254->65235 65255->65237 65256->65239 65257->65241 65258->65243 65259->65245 65260->65247 65261->65249 65262->65251 65263->65253 65264->65232 65265->65182 65266->65183 65270 6bd75760 65267->65270 65272 6bd75775 65270->65272 65271 6bd7554d 65271->64835 65272->65271 65274 6bd75890 29 API calls 65272->65274 65274->65271 65275->64842 65277 6bd78a53 65276->65277 65280 6bd78ba0 65277->65280 65279 6bd78a6d 65279->64847 65281 6bd78bda 65280->65281 65283 6bd78bdf 65280->65283 65284 6bd78d70 30 API calls 65281->65284 65283->65279 65284->65283 65286 6bd85a3d 65285->65286 65323 6bd8b300 65286->65323 65647 6bd8b910 65289->65647 65291 6bd98dbc 65291->64855 65292 6bd98d64 65292->65291 65651 6bd9bb00 65292->65651 65295 6bd98ef1 65294->65295 65296 6bd77220 39 API calls 65295->65296 65297 6bd98f24 65296->65297 65298 6bd8b910 82 API calls 65297->65298 65299 6bd98f3d 65298->65299 65301 6bd9bb00 80 API calls 65299->65301 65303 6bd98f92 65299->65303 65300 6bd76d50 39 API calls 65302 6bd99000 65300->65302 65301->65303 65302->64859 65303->65300 65305 6bd7c18a 65304->65305 65750 6bd7cfd0 65305->65750 65307 6bd7c1aa 65307->64861 65309 6bd8b910 82 API calls 65308->65309 65311 6bd99118 65309->65311 65310 6bd76d50 39 API calls 65313 6bd99209 65310->65313 65314 6bd9912b 65311->65314 65758 6bd9bbc0 65311->65758 65313->64863 65314->65310 65965 6bd861c0 65315->65965 65318 6bd76d50 39 API calls 65319 6bd85b28 65318->65319 65319->64869 65973 6bd8a160 65320->65973 65322 6bd85dbd 65322->64858 65324 6bd8b356 65323->65324 65333 6bd8b4e0 65324->65333 65330 6bd8b40d 65331 6bd85a5f 65330->65331 65332 6bd76d50 39 API calls 65330->65332 65331->64850 65332->65331 65334 6bd8b539 65333->65334 65350 6bd8a830 65334->65350 65337 6bd8a5e0 65407 6bd8ac40 65337->65407 65339 6bd8a5f4 65412 6bd88080 65339->65412 65341 6bd8a615 65342 6bd8a620 65341->65342 65343 6bd8a677 65342->65343 65349 6bd8a66b std::ios_base::_Ios_base_dtor 65342->65349 65417 6bdbc2aa 65343->65417 65346 6bd88080 29 API calls 65347 6bd8a6bf 65346->65347 65425 6bd898c0 76 API calls 2 library calls 65347->65425 65349->65330 65359 6bd8a9a0 65350->65359 65354 6bd8a86b 65355 6bd76d50 39 API calls 65354->65355 65356 6bd8a8aa 65354->65356 65355->65356 65357 6bd8a8c3 65356->65357 65370 6bdbbdf2 9 API calls 2 library calls 65356->65370 65357->65337 65371 6bd8ab10 65359->65371 65362 6bd9ffd7 Concurrency::details::ExternalContextBase::~ExternalContextBase 3 API calls 65363 6bd8aa28 65362->65363 65374 6bd8ab40 65363->65374 65366 6bd8aa40 65367 6bd8aa87 65366->65367 65391 6bd7bfa0 65367->65391 65369 6bd8aa9d std::ios_base::_Ios_base_dtor 65369->65354 65370->65357 65372 6bd772a0 39 API calls 65371->65372 65373 6bd8aa19 65372->65373 65373->65362 65377 6bdbc18a 65374->65377 65376 6bd8a84f 65376->65366 65378 6bdbc196 __EH_prolog3 65377->65378 65379 6bdbbd4e std::_Lockit::_Lockit 7 API calls 65378->65379 65380 6bdbc1a1 65379->65380 65388 6bdbc1d2 65380->65388 65389 6bdbc093 15 API calls 2 library calls 65380->65389 65382 6bdbbd7f std::_Lockit::~_Lockit 2 API calls 65384 6bdbc20f Concurrency::details::ExternalContextBase::~ExternalContextBase 65382->65384 65383 6bdbc1b4 65390 6bdbc21d 52 API calls std::locale::_Setgloballocale 65383->65390 65384->65376 65386 6bdbc1bc 65387 6bdbc014 _Yarn 14 API calls 65386->65387 65387->65388 65388->65382 65389->65383 65390->65386 65392 6bdbbd4e std::_Lockit::_Lockit 7 API calls 65391->65392 65393 6bd7bfe2 65392->65393 65394 6bd79c00 9 API calls 65393->65394 65395 6bd7bff7 65394->65395 65396 6bd7c035 65395->65396 65404 6bd7c820 76 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 65395->65404 65397 6bdbbd7f std::_Lockit::~_Lockit 2 API calls 65396->65397 65398 6bd7c0de 65397->65398 65398->65369 65400 6bd7c052 65401 6bd7c06b 65400->65401 65405 6bd79ef0 RaiseException Concurrency::cancel_current_task 65400->65405 65406 6bdbbf2c RaiseException Concurrency::cancel_current_task ___std_exception_copy 65401->65406 65404->65400 65406->65396 65408 6bd9ffd7 Concurrency::details::ExternalContextBase::~ExternalContextBase 3 API calls 65407->65408 65409 6bd8acc0 65408->65409 65410 6bd8ab40 54 API calls 65409->65410 65411 6bd8acca 65410->65411 65411->65339 65413 6bd880be 65412->65413 65415 6bd880fd 65413->65415 65416 6bee4f54 29 API calls 2 library calls 65413->65416 65415->65341 65416->65415 65418 6bdbc2b3 65417->65418 65421 6bd8a690 65418->65421 65426 6bef0be1 65418->65426 65421->65346 65421->65349 65423 6bdbc322 65423->65421 65449 6bef44b3 65423->65449 65425->65349 65428 6bef0bec ___scrt_is_nonwritable_in_current_image 65426->65428 65427 6bef0bff 65467 6bee50d6 14 API calls __dosmaperr 65427->65467 65428->65427 65431 6bef0c1f 65428->65431 65430 6bef0c04 65468 6bef1977 29 API calls __wsopen_s 65430->65468 65433 6bef0c24 65431->65433 65434 6bef0c31 65431->65434 65469 6bee50d6 14 API calls __dosmaperr 65433->65469 65453 6beff5a8 65434->65453 65436 6bdbc307 65436->65421 65445 6bef0884 65436->65445 65439 6bef0c4e 65461 6beff972 65439->65461 65440 6bef0c41 65470 6bee50d6 14 API calls __dosmaperr 65440->65470 65446 6bef0897 swprintf 65445->65446 65544 6bef0b37 65446->65544 65448 6bef08ac swprintf 65448->65423 65450 6bef44c6 swprintf 65449->65450 65598 6bef4571 65450->65598 65452 6bef44d2 swprintf 65452->65421 65454 6beff5b4 ___scrt_is_nonwritable_in_current_image 65453->65454 65472 6bef206c EnterCriticalSection 65454->65472 65456 6beff5c2 65473 6beff64c 65456->65473 65462 6beff97d 65461->65462 65494 6bef0633 65462->65494 65466 6bef0c63 65471 6bef0c8c LeaveCriticalSection __fread_nolock 65466->65471 65467->65430 65468->65436 65469->65436 65470->65436 65471->65436 65472->65456 65480 6beff66f 65473->65480 65474 6beff6c7 65475 6befc2a8 _unexpected 14 API calls 65474->65475 65476 6beff6d0 65475->65476 65478 6bef8f57 ___free_lconv_mon 14 API calls 65476->65478 65479 6beff6d9 65478->65479 65485 6beff5cf 65479->65485 65491 6befb207 6 API calls std::_Locinfo::_Locinfo_dtor 65479->65491 65480->65474 65480->65480 65480->65485 65489 6bee4f9a EnterCriticalSection 65480->65489 65490 6bee4fae LeaveCriticalSection 65480->65490 65482 6beff6f8 65492 6bee4f9a EnterCriticalSection 65482->65492 65486 6beff608 65485->65486 65493 6bef2083 LeaveCriticalSection 65486->65493 65488 6bef0c3a 65488->65439 65488->65440 65489->65480 65490->65480 65491->65482 65492->65485 65493->65488 65495 6bef0652 65494->65495 65496 6bef0665 65495->65496 65504 6bef067a 65495->65504 65514 6bee50d6 14 API calls __dosmaperr 65496->65514 65498 6bef066a 65515 6bef1977 29 API calls __wsopen_s 65498->65515 65500 6bef0675 65500->65466 65511 6bf08830 65500->65511 65502 6bef084b 65520 6bef1977 29 API calls __wsopen_s 65502->65520 65509 6bef079a 65504->65509 65516 6bef286a 50 API calls 2 library calls 65504->65516 65506 6bef07ea 65506->65509 65517 6bef286a 50 API calls 2 library calls 65506->65517 65508 6bef0808 65508->65509 65518 6bef286a 50 API calls 2 library calls 65508->65518 65509->65500 65519 6bee50d6 14 API calls __dosmaperr 65509->65519 65521 6bf08be8 65511->65521 65514->65498 65515->65500 65516->65506 65517->65508 65518->65509 65519->65502 65520->65500 65524 6bf08bf4 ___scrt_is_nonwritable_in_current_image 65521->65524 65522 6bf08bfb 65541 6bee50d6 14 API calls __dosmaperr 65522->65541 65524->65522 65526 6bf08c26 65524->65526 65525 6bf08c00 65542 6bef1977 29 API calls __wsopen_s 65525->65542 65532 6bf08850 65526->65532 65529 6bf0884b 65529->65466 65533 6bef5e18 __wsopen_s 50 API calls 65532->65533 65534 6bf08872 65533->65534 65535 6bee46a2 __wsopen_s 17 API calls 65534->65535 65536 6bf0887f 65535->65536 65537 6bf08886 65536->65537 65538 6bf088be __wsopen_s 99 API calls 65536->65538 65539 6bf088b8 65537->65539 65540 6bef8f57 ___free_lconv_mon 14 API calls 65537->65540 65538->65537 65543 6bf08c7d LeaveCriticalSection __wsopen_s 65539->65543 65540->65539 65541->65525 65542->65529 65543->65529 65546 6bef0b43 ___scrt_is_nonwritable_in_current_image 65544->65546 65545 6bef0b49 65567 6bef1b20 29 API calls 2 library calls 65545->65567 65546->65545 65548 6bef0b8c 65546->65548 65555 6bee4f9a EnterCriticalSection 65548->65555 65549 6bef0b64 65549->65448 65551 6bef0b98 65556 6bef0a4b 65551->65556 65553 6bef0bae 65568 6bef0bd7 LeaveCriticalSection __fread_nolock 65553->65568 65555->65551 65557 6bef0a5e 65556->65557 65558 6bef0a71 65556->65558 65557->65553 65569 6bef0972 65558->65569 65560 6bef0aaf 65573 6bef46c9 65560->65573 65561 6bef0a94 65561->65560 65566 6bef0b22 65561->65566 65582 6bef51cb 34 API calls 3 library calls 65561->65582 65566->65553 65567->65549 65568->65549 65570 6bef09db 65569->65570 65571 6bef0983 65569->65571 65570->65561 65571->65570 65583 6beff74e 31 API calls 2 library calls 65571->65583 65574 6bef46e2 65573->65574 65578 6bef0ac2 65573->65578 65574->65578 65584 6bef085d 65574->65584 65576 6bef46fe 65591 6bf017a6 75 API calls 4 library calls 65576->65591 65579 6beff78e 65578->65579 65592 6beff8ef 65579->65592 65581 6beff7a7 65581->65566 65582->65560 65583->65570 65585 6bef087e 65584->65585 65586 6bef0869 65584->65586 65585->65576 65587 6bee50d6 __dosmaperr 14 API calls 65586->65587 65588 6bef086e 65587->65588 65589 6bef1977 __wsopen_s 29 API calls 65588->65589 65590 6bef0879 65589->65590 65590->65576 65591->65578 65593 6bef0ca3 __wsopen_s 29 API calls 65592->65593 65594 6beff901 65593->65594 65595 6beff91d SetFilePointerEx 65594->65595 65597 6beff909 __wsopen_s 65594->65597 65596 6beff935 GetLastError 65595->65596 65595->65597 65596->65597 65597->65581 65599 6bef457d ___scrt_is_nonwritable_in_current_image 65598->65599 65600 6bef45aa 65599->65600 65601 6bef4587 65599->65601 65603 6bef45a2 65600->65603 65609 6bee4f9a EnterCriticalSection 65600->65609 65624 6bef1b20 29 API calls 2 library calls 65601->65624 65603->65452 65605 6bef45c8 65610 6bef44e3 65605->65610 65607 6bef45d5 65625 6bef4600 LeaveCriticalSection __fread_nolock 65607->65625 65609->65605 65611 6bef44f0 65610->65611 65613 6bef4513 65610->65613 65637 6bef1b20 29 API calls 2 library calls 65611->65637 65614 6bef450b 65613->65614 65615 6bef46c9 ___scrt_uninitialize_crt 75 API calls 65613->65615 65614->65607 65616 6bef452b 65615->65616 65626 6befd88c 65616->65626 65619 6bef085d __fread_nolock 29 API calls 65620 6bef453f 65619->65620 65630 6bf01300 65620->65630 65623 6bef8f57 ___free_lconv_mon 14 API calls 65623->65614 65624->65603 65625->65603 65627 6bef4533 65626->65627 65628 6befd8a3 65626->65628 65627->65619 65628->65627 65629 6bef8f57 ___free_lconv_mon 14 API calls 65628->65629 65629->65627 65631 6bef4546 65630->65631 65632 6bf01329 65630->65632 65631->65614 65631->65623 65633 6bf01378 65632->65633 65635 6bf01350 65632->65635 65646 6bef1b20 29 API calls 2 library calls 65633->65646 65638 6bf013a3 65635->65638 65637->65614 65639 6bf013af ___scrt_is_nonwritable_in_current_image 65638->65639 65640 6bef1091 __fread_nolock EnterCriticalSection 65639->65640 65641 6bf013bd 65640->65641 65642 6bf013ee 65641->65642 65643 6bf01260 __wsopen_s 32 API calls 65641->65643 65644 6bf01428 LeaveCriticalSection 65642->65644 65643->65642 65645 6bf01411 65644->65645 65645->65631 65646->65631 65648 6bd8b960 65647->65648 65654 6bd8bdb0 65648->65654 65650 6bd8b987 65650->65292 65666 6bd87730 65651->65666 65652 6bd9bba5 65652->65291 65655 6bd8bdfb 65654->65655 65656 6bd8be03 65655->65656 65658 6bd8be2d 65655->65658 65657 6bd76d50 39 API calls 65656->65657 65660 6bd8be21 65657->65660 65662 6bd8be4f 65658->65662 65665 6bd76ee0 39 API calls 65658->65665 65660->65650 65661 6bd76d50 39 API calls 65661->65660 65663 6bd7bfa0 76 API calls 65662->65663 65664 6bd8bea5 std::ios_base::_Ios_base_dtor 65662->65664 65663->65664 65664->65660 65664->65661 65665->65662 65667 6bd87796 65666->65667 65673 6bd8785f 65667->65673 65674 6bd87e50 65667->65674 65671 6bd878bd 65671->65673 65682 6bef4ac0 65671->65682 65673->65652 65675 6bd87e72 65674->65675 65677 6bd8784f 65674->65677 65675->65677 65696 6bef57cd 79 API calls swprintf 65675->65696 65677->65671 65677->65673 65678 6bef08be 65677->65678 65679 6bef08d1 swprintf 65678->65679 65680 6bef0b37 78 API calls 65679->65680 65681 6bef08e6 swprintf 65680->65681 65681->65671 65683 6bef4acb 65682->65683 65684 6bef4ae0 65682->65684 65701 6bee50d6 14 API calls __dosmaperr 65683->65701 65685 6bef4afd 65684->65685 65686 6bef4ae8 65684->65686 65697 6bef5195 65685->65697 65703 6bee50d6 14 API calls __dosmaperr 65686->65703 65690 6bef4ad0 65702 6bef1977 29 API calls __wsopen_s 65690->65702 65691 6bef4aed 65704 6bef1977 29 API calls __wsopen_s 65691->65704 65694 6bef4af8 65694->65673 65695 6bef4adb 65695->65673 65696->65677 65698 6bef51a9 swprintf 65697->65698 65705 6bef573e 65698->65705 65700 6bef51b5 swprintf 65700->65694 65701->65690 65702->65695 65703->65691 65704->65694 65706 6bef574a ___scrt_is_nonwritable_in_current_image 65705->65706 65707 6bef5774 65706->65707 65708 6bef5751 65706->65708 65716 6bee4f9a EnterCriticalSection 65707->65716 65731 6bef1b20 29 API calls 2 library calls 65708->65731 65711 6bef576a 65711->65700 65712 6bef5782 65717 6bef559d 65712->65717 65714 6bef5791 65732 6bef57c3 LeaveCriticalSection __fread_nolock 65714->65732 65716->65712 65718 6bef55ac 65717->65718 65719 6bef55d4 65717->65719 65736 6bef1b20 29 API calls 2 library calls 65718->65736 65721 6bef085d __fread_nolock 29 API calls 65719->65721 65722 6bef55dd 65721->65722 65733 6beff7ac 65722->65733 65725 6bef5687 65737 6bef5227 34 API calls 4 library calls 65725->65737 65727 6bef55c7 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 65727->65714 65728 6bef569e 65728->65727 65738 6bef53d2 33 API calls 2 library calls 65728->65738 65729 6bef5696 65729->65727 65731->65711 65732->65711 65739 6beff7ca 65733->65739 65736->65727 65737->65729 65738->65727 65740 6beff7d6 ___scrt_is_nonwritable_in_current_image 65739->65740 65741 6beff819 65740->65741 65743 6beff85f 65740->65743 65749 6bef55fb 65740->65749 65742 6bef1b20 swprintf 29 API calls 65741->65742 65742->65749 65744 6bef1091 __fread_nolock EnterCriticalSection 65743->65744 65745 6beff865 65744->65745 65746 6beff886 65745->65746 65747 6beff8ef __fread_nolock 31 API calls 65745->65747 65748 6beff8e7 LeaveCriticalSection 65746->65748 65747->65746 65748->65749 65749->65725 65749->65727 65749->65728 65751 6bd7d02a 65750->65751 65753 6bd7d03c 65751->65753 65756 6bd77ef0 30 API calls 65751->65756 65755 6bd7d075 65753->65755 65757 6bd78130 30 API calls 65753->65757 65755->65307 65757->65755 65761 6bd86f20 65758->65761 65759 6bd9bc16 65759->65314 65762 6bd86fec 65761->65762 65764 6bd8700a 65761->65764 65762->65759 65763 6bd871c4 65763->65762 65767 6bef4e4f 65763->65767 65764->65762 65764->65763 65765 6bef4e4f __fread_nolock 45 API calls 65764->65765 65765->65764 65770 6bef4db2 65767->65770 65772 6bef4dbe ___scrt_is_nonwritable_in_current_image 65770->65772 65771 6bef4df6 65771->65762 65772->65771 65773 6bef4e08 65772->65773 65774 6bef4dd1 __fread_nolock 65772->65774 65783 6bee4f9a EnterCriticalSection 65773->65783 65798 6bee50d6 14 API calls __dosmaperr 65774->65798 65777 6bef4e12 65784 6bef4e6c 65777->65784 65778 6bef4deb 65799 6bef1977 29 API calls __wsopen_s 65778->65799 65783->65777 65785 6bef4e29 65784->65785 65788 6bef4e7e __fread_nolock 65784->65788 65800 6bef4e47 LeaveCriticalSection __fread_nolock 65785->65800 65786 6bef4e8b 65822 6bee50d6 14 API calls __dosmaperr 65786->65822 65788->65785 65788->65786 65791 6bef4edc 65788->65791 65791->65785 65792 6bef5007 __fread_nolock 65791->65792 65794 6bef085d __fread_nolock 29 API calls 65791->65794 65801 6bf02059 65791->65801 65824 6bee9896 29 API calls 4 library calls 65791->65824 65825 6bf02622 65791->65825 65890 6bee50d6 14 API calls __dosmaperr 65792->65890 65794->65791 65796 6bef4e90 65823 6bef1977 29 API calls __wsopen_s 65796->65823 65798->65778 65799->65771 65800->65771 65802 6bf02064 65801->65802 65803 6bf02071 65802->65803 65806 6bf02089 65802->65806 65921 6bee50d6 14 API calls __dosmaperr 65803->65921 65805 6bf02076 65922 6bef1977 29 API calls __wsopen_s 65805->65922 65808 6bf020e8 65806->65808 65816 6bf02081 65806->65816 65923 6bf03a51 14 API calls 2 library calls 65806->65923 65810 6bef085d __fread_nolock 29 API calls 65808->65810 65811 6bf02101 65810->65811 65891 6bf02509 65811->65891 65814 6bef085d __fread_nolock 29 API calls 65815 6bf0213a 65814->65815 65815->65816 65817 6bef085d __fread_nolock 29 API calls 65815->65817 65816->65791 65818 6bf02148 65817->65818 65818->65816 65819 6bef085d __fread_nolock 29 API calls 65818->65819 65820 6bf02156 65819->65820 65821 6bef085d __fread_nolock 29 API calls 65820->65821 65821->65816 65822->65796 65823->65785 65824->65791 65826 6bf02634 65825->65826 65827 6bf0264c 65825->65827 65944 6bee50e9 14 API calls __dosmaperr 65826->65944 65829 6bf0298e 65827->65829 65837 6bf0268f 65827->65837 65959 6bee50e9 14 API calls __dosmaperr 65829->65959 65830 6bf02639 65945 6bee50d6 14 API calls __dosmaperr 65830->65945 65833 6bf02993 65960 6bee50d6 14 API calls __dosmaperr 65833->65960 65834 6bf02641 65834->65791 65836 6bf0269a 65946 6bee50e9 14 API calls __dosmaperr 65836->65946 65837->65834 65837->65836 65842 6bf026ca 65837->65842 65838 6bf026a7 65961 6bef1977 29 API calls __wsopen_s 65838->65961 65840 6bf0269f 65947 6bee50d6 14 API calls __dosmaperr 65840->65947 65844 6bf026e3 65842->65844 65845 6bf026f0 65842->65845 65846 6bf0271e 65842->65846 65844->65845 65850 6bf0270c 65844->65850 65948 6bee50e9 14 API calls __dosmaperr 65845->65948 65848 6bef8f91 __fread_nolock 15 API calls 65846->65848 65851 6bf0272f 65848->65851 65849 6bf026f5 65949 6bee50d6 14 API calls __dosmaperr 65849->65949 65935 6bf061ff 65850->65935 65854 6bef8f57 ___free_lconv_mon 14 API calls 65851->65854 65857 6bf02738 65854->65857 65855 6bf026fc 65950 6bef1977 29 API calls __wsopen_s 65855->65950 65856 6bf0286a 65859 6bf028de 65856->65859 65860 6bf02883 GetConsoleMode 65856->65860 65861 6bef8f57 ___free_lconv_mon 14 API calls 65857->65861 65862 6bf028e2 ReadFile 65859->65862 65860->65859 65863 6bf02894 65860->65863 65864 6bf0273f 65861->65864 65865 6bf02956 GetLastError 65862->65865 65866 6bf028fa 65862->65866 65863->65862 65867 6bf0289a ReadConsoleW 65863->65867 65868 6bf02764 65864->65868 65869 6bf02749 65864->65869 65870 6bf02963 65865->65870 65871 6bf028ba 65865->65871 65866->65865 65872 6bf028d3 65866->65872 65867->65872 65874 6bf028b4 GetLastError 65867->65874 65953 6beff74e 31 API calls 2 library calls 65868->65953 65951 6bee50d6 14 API calls __dosmaperr 65869->65951 65957 6bee50d6 14 API calls __dosmaperr 65870->65957 65887 6bf02707 __fread_nolock 65871->65887 65954 6bee50fc 14 API calls __dosmaperr 65871->65954 65882 6bf02936 65872->65882 65883 6bf0291f 65872->65883 65872->65887 65874->65871 65875 6bef8f57 ___free_lconv_mon 14 API calls 65875->65834 65878 6bf02968 65958 6bee50e9 14 API calls __dosmaperr 65878->65958 65880 6bf0274e 65952 6bee50e9 14 API calls __dosmaperr 65880->65952 65886 6bf0294f 65882->65886 65882->65887 65955 6bf02a2b 34 API calls 2 library calls 65883->65955 65956 6bf02ccf 32 API calls __fread_nolock 65886->65956 65887->65875 65889 6bf02954 65889->65887 65890->65796 65892 6bf02515 ___scrt_is_nonwritable_in_current_image 65891->65892 65893 6bf0251d 65892->65893 65896 6bf02538 65892->65896 65925 6bee50e9 14 API calls __dosmaperr 65893->65925 65895 6bf02522 65926 6bee50d6 14 API calls __dosmaperr 65895->65926 65898 6bf0254f 65896->65898 65899 6bf0258a 65896->65899 65927 6bee50e9 14 API calls __dosmaperr 65898->65927 65901 6bf02593 65899->65901 65902 6bf025a8 65899->65902 65930 6bee50e9 14 API calls __dosmaperr 65901->65930 65924 6bef1091 EnterCriticalSection 65902->65924 65903 6bf02554 65928 6bee50d6 14 API calls __dosmaperr 65903->65928 65907 6bf02598 65931 6bee50d6 14 API calls __dosmaperr 65907->65931 65908 6bf025ae 65911 6bf025e2 65908->65911 65912 6bf025cd 65908->65912 65909 6bf0255c 65929 6bef1977 29 API calls __wsopen_s 65909->65929 65914 6bf02622 __fread_nolock 41 API calls 65911->65914 65932 6bee50d6 14 API calls __dosmaperr 65912->65932 65916 6bf025dd 65914->65916 65934 6bf0261a LeaveCriticalSection __wsopen_s 65916->65934 65917 6bf025d2 65933 6bee50e9 14 API calls __dosmaperr 65917->65933 65920 6bf02109 65920->65814 65920->65816 65921->65805 65922->65816 65923->65808 65924->65908 65925->65895 65926->65920 65927->65903 65928->65909 65929->65920 65930->65907 65931->65909 65932->65917 65933->65916 65934->65920 65936 6bf06219 65935->65936 65937 6bf0620c 65935->65937 65940 6bf06225 65936->65940 65963 6bee50d6 14 API calls __dosmaperr 65936->65963 65962 6bee50d6 14 API calls __dosmaperr 65937->65962 65939 6bf06211 65939->65856 65940->65856 65942 6bf06246 65964 6bef1977 29 API calls __wsopen_s 65942->65964 65944->65830 65945->65834 65946->65840 65947->65838 65948->65849 65949->65855 65950->65887 65951->65880 65952->65887 65953->65850 65954->65887 65955->65887 65956->65889 65957->65878 65958->65887 65959->65833 65960->65838 65961->65834 65962->65939 65963->65942 65964->65939 65967 6bd861d4 65965->65967 65966 6bd8622c 65968 6bd88080 29 API calls 65966->65968 65967->65966 65970 6bd87e50 79 API calls 65967->65970 65969 6bd85af3 65968->65969 65969->65318 65969->65319 65971 6bd861f7 65970->65971 65972 6bef44b3 80 API calls 65971->65972 65972->65966 65976 6bd85fe0 65973->65976 65975 6bd8a1b9 65975->65322 65978 6bd8602a 65976->65978 65977 6bd8604e 65977->65975 65978->65977 65979 6bd861c0 82 API calls 65978->65979 65979->65977 65981 6bd795dc 65980->65981 65983 6bd795f2 65981->65983 65984 6bd790e0 29 API calls 65981->65984 65983->64873 65984->65983 66046 6bd7fd80 65985->66046 65987 6bd81059 65988 6bd81156 65987->65988 66120 6bd80dd0 30 API calls 65987->66120 66067 6bd80020 65988->66067 65990 6bd8120f CryptAcquireContextW 65992 6bd8125b 65990->65992 65993 6bd81292 65990->65993 66121 6bd7ff40 29 API calls std::invalid_argument::invalid_argument 65992->66121 65996 6bd812c5 CryptImportKey 65993->65996 65995 6bd81274 66122 6bee1da1 RaiseException 65995->66122 65997 6bd81329 65996->65997 65998 6bd8137b 65996->65998 66123 6bd7ff40 29 API calls std::invalid_argument::invalid_argument 65997->66123 66001 6bd81383 CryptSetKeyParam 65998->66001 66000 6bd8128d 66139 6bd80000 29 API calls 66000->66139 66003 6bd8141a CryptSetKeyParam 66001->66003 66004 6bd813b4 66001->66004 66007 6bd8145b 66003->66007 66008 6bd814c1 66003->66008 66125 6bd7ff40 29 API calls std::invalid_argument::invalid_argument 66004->66125 66006 6bd8135d 66124 6bee1da1 RaiseException 66006->66124 66127 6bd7ff40 29 API calls std::invalid_argument::invalid_argument 66007->66127 66129 6bd81870 30 API calls 66008->66129 66009 6bd816c2 66009->64878 66013 6bd814ea 66019 6bd814fd CryptDecrypt 66013->66019 66015 6bd813fc 66126 6bee1da1 RaiseException 66015->66126 66018 6bd814a3 66128 6bee1da1 RaiseException 66018->66128 66021 6bd815af 66019->66021 66022 6bd81542 66019->66022 66132 6bd80d90 30 API calls 66021->66132 66130 6bd7ff40 29 API calls std::invalid_argument::invalid_argument 66022->66130 66025 6bd8158a 66131 6bee1da1 RaiseException 66025->66131 66027 6bd815fa 66133 6bd779c0 30 API calls 66027->66133 66029 6bd8163b 66030 6bd81662 66029->66030 66032 6bd786c0 29 API calls 66029->66032 66134 6bd80000 29 API calls 66030->66134 66032->66030 66033 6bd8166d 66135 6bd80000 29 API calls 66033->66135 66035 6bd81675 66136 6bd80000 29 API calls 66035->66136 66037 6bd8167d 66137 6bd80000 29 API calls 66037->66137 66039 6bd81685 66138 6bd80000 29 API calls 66039->66138 66041 6bd8168d 66041->64878 66043 6bd7f6e7 66042->66043 66045 6bd7f6dc 66042->66045 66044 6bd795b0 29 API calls 66043->66044 66044->66045 66045->64880 66140 6bd79490 66046->66140 66048 6bd7fdca CryptStringToBinaryA 66049 6bd7fe12 66048->66049 66050 6bd7fe3b 66048->66050 66142 6bd7ff40 29 API calls std::invalid_argument::invalid_argument 66049->66142 66144 6bd7ff80 30 API calls 66050->66144 66052 6bd7fe23 66143 6bee1da1 RaiseException 66052->66143 66055 6bd7fe5c 66056 6bd7fe72 CryptStringToBinaryA 66055->66056 66057 6bd7feee 66056->66057 66058 6bd7feb9 66056->66058 66060 6bd7ff04 66057->66060 66147 6bd80000 29 API calls 66057->66147 66145 6bd7ff40 29 API calls std::invalid_argument::invalid_argument 66058->66145 66060->65987 66061 6bd7fecc 66146 6bee1da1 RaiseException 66061->66146 66064 6bd7fee9 66148 6bd80000 29 API calls 66064->66148 66066 6bd7ff2f 66066->65987 66068 6bd8006c 66067->66068 66069 6bd80074 CryptAcquireContextW 66068->66069 66070 6bd800bc 66069->66070 66118 6bd800f7 66069->66118 66149 6bd7ff40 29 API calls std::invalid_argument::invalid_argument 66070->66149 66072 6bd800d2 66150 6bee1da1 RaiseException 66072->66150 66074 6bd800f2 66171 6bd80000 29 API calls 66074->66171 66076 6bd8081f 66076->65990 66077 6bd80121 CryptCreateHash 66078 6bd8015a 66077->66078 66077->66118 66151 6bd7ff40 29 API calls std::invalid_argument::invalid_argument 66078->66151 66080 6bd80188 66152 6bee1da1 RaiseException 66080->66152 66082 6bd80661 66165 6bd80f20 30 API calls 66082->66165 66083 6bd801d3 CryptHashData 66085 6bd80205 66083->66085 66083->66118 66153 6bd7ff40 29 API calls std::invalid_argument::invalid_argument 66085->66153 66088 6bd80244 66154 6bee1da1 RaiseException 66088->66154 66090 6bd806fe 66166 6bd80f20 30 API calls 66090->66166 66091 6bd803b9 CryptHashData 66093 6bd8044b CryptGetHashParam 66091->66093 66094 6bd803eb 66091->66094 66096 6bd8049d 66093->66096 66093->66118 66157 6bd7ff40 29 API calls std::invalid_argument::invalid_argument 66094->66157 66095 6bd807cc 66167 6bd80000 29 API calls 66095->66167 66159 6bd7ff40 29 API calls std::invalid_argument::invalid_argument 66096->66159 66100 6bd807dc 66168 6bd80000 29 API calls 66100->66168 66103 6bd807e4 66169 6bd80000 29 API calls 66103->66169 66106 6bd8042d 66158 6bee1da1 RaiseException 66106->66158 66107 6bd8051f CryptGetHashParam 66111 6bd80559 66107->66111 66107->66118 66108 6bd807ec 66170 6bd80000 29 API calls 66108->66170 66109 6bd804df 66160 6bee1da1 RaiseException 66109->66160 66162 6bd7ff40 29 API calls std::invalid_argument::invalid_argument 66111->66162 66114 6bd807f4 66114->65990 66116 6bd8059b 66163 6bee1da1 RaiseException 66116->66163 66118->66077 66118->66082 66118->66083 66118->66091 66118->66107 66155 6bd809e0 30 API calls 66118->66155 66156 6bd80be0 30 API calls 66118->66156 66161 6bd80d90 30 API calls 66118->66161 66164 6bd80dd0 30 API calls 66118->66164 66120->65988 66121->65995 66122->66000 66123->66006 66124->66000 66125->66015 66126->66000 66127->66018 66128->66000 66129->66013 66130->66025 66131->66000 66132->66027 66133->66029 66134->66033 66135->66035 66136->66037 66137->66039 66138->66041 66139->66009 66141 6bd794ad 66140->66141 66141->66048 66142->66052 66143->66050 66144->66055 66145->66061 66146->66064 66147->66060 66148->66066 66149->66072 66150->66074 66151->66080 66152->66074 66153->66088 66154->66074 66155->66118 66156->66118 66157->66106 66158->66074 66159->66109 66160->66074 66161->66118 66162->66116 66163->66074 66164->66118 66165->66090 66166->66095 66167->66100 66168->66103 66169->66108 66170->66114 66171->66076 66185 6bee45a8 66172->66185 66176 6bef5de0 66177 6bee46a2 66176->66177 66196 6bee4717 66177->66196 66180 6bf02e89 DeleteFileW 66181 6bf02e9b GetLastError 66180->66181 66182 6bf02ead 66180->66182 66221 6bee50fc 14 API calls __dosmaperr 66181->66221 66182->64894 66184 6bf02ea7 66184->64894 66186 6bee45c6 66185->66186 66192 6bee45bf 66185->66192 66187 6bef91e3 _unexpected 50 API calls 66186->66187 66186->66192 66188 6bee45e7 66187->66188 66194 6bef97f2 50 API calls __Getctype 66188->66194 66190 6bee45fd 66195 6bef981f 50 API calls __wsopen_s 66190->66195 66192->66176 66193 6befafbd 5 API calls std::_Locinfo::_Locinfo_dtor 66192->66193 66193->66176 66194->66190 66195->66192 66197 6bee473f 66196->66197 66198 6bee4725 66196->66198 66200 6bee4746 66197->66200 66201 6bee4765 66197->66201 66214 6bee4688 14 API calls ___free_lconv_mon 66198->66214 66213 6bee46ba 66200->66213 66215 6bee4649 15 API calls __wsopen_s 66200->66215 66216 6bef8fdf MultiByteToWideChar __fread_nolock 66201->66216 66203 6bee4774 66205 6bee477b GetLastError 66203->66205 66207 6bee47a1 66203->66207 66219 6bee4649 15 API calls __wsopen_s 66203->66219 66217 6bee50fc 14 API calls __dosmaperr 66205->66217 66207->66213 66220 6bef8fdf MultiByteToWideChar __fread_nolock 66207->66220 66208 6bee4787 66218 6bee50d6 14 API calls __dosmaperr 66208->66218 66212 6bee47b8 66212->66205 66212->66213 66213->64894 66213->66180 66214->66213 66215->66213 66216->66203 66217->66208 66218->66213 66219->66207 66220->66212 66221->66184 66226 6bd78a80 66222->66226 66224 6bd93ba5 66224->64902 66225->64929 66227 6bd78ab9 66226->66227 66228 6bd78ba0 30 API calls 66227->66228 66229 6bd78ad0 66228->66229 66229->66224 66231 6bd77bd3 66230->66231 66233 6bd77be5 66231->66233 66236 6bd77ef0 30 API calls 66231->66236 66235 6bd77c34 66233->66235 66237 6bd78130 30 API calls 66233->66237 66235->64938 66237->66235 66243 6bd99988 66239->66243 66240 6bd77a70 30 API calls 66240->66243 66242 6bd786c0 29 API calls 66242->66243 66243->66240 66243->66242 66244 6bd999d7 66243->66244 66245 6bd99a28 Sleep 66243->66245 66252 6bd99550 CreateToolhelp32Snapshot 66243->66252 66246 6bd77a70 30 API calls 66244->66246 66245->66243 66247 6bd999f0 66246->66247 66265 6bd99770 32 API calls 66247->66265 66249 6bd99a06 66250 6bd786c0 29 API calls 66249->66250 66251 6bd99a13 66250->66251 66253 6bd995bb 66252->66253 66254 6bd995c4 __fread_nolock 66252->66254 66253->66243 66255 6bd995e4 Process32FirstW 66254->66255 66256 6bd996fd CloseHandle 66255->66256 66257 6bd9960d 66255->66257 66256->66253 66258 6bd99612 WideCharToMultiByte 66257->66258 66259 6bd77a70 30 API calls 66258->66259 66261 6bd9966e 66259->66261 66260 6bd786c0 29 API calls 66260->66261 66261->66260 66262 6bd996a3 CloseHandle 66261->66262 66263 6bd996c2 Process32NextW 66261->66263 66262->66253 66263->66258 66264 6bd996f3 66263->66264 66264->66256 66265->66249 66266 6bee1c53 66267 6bee1c5c 66266->66267 66268 6bee1c61 66266->66268 66283 6bee1c76 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 66267->66283 66272 6bee1b48 66268->66272 66275 6bee1b54 ___scrt_is_nonwritable_in_current_image 66272->66275 66273 6bee1b63 66274 6bee1b7d dllmain_raw 66274->66273 66276 6bee1b97 dllmain_crt_dispatch 66274->66276 66275->66273 66275->66274 66277 6bee1b78 __DllMainCRTStartup@12 66275->66277 66276->66273 66276->66277 66278 6bee1be9 66277->66278 66284 6bee1a1c 122 API calls 4 library calls 66277->66284 66278->66273 66279 6bee1bf2 dllmain_crt_dispatch 66278->66279 66279->66273 66280 6bee1c05 dllmain_raw 66279->66280 66280->66273 66282 6bee1bde dllmain_raw 66282->66278 66283->66268 66284->66282

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 404 6bd80020-6bd800b6 call 6bd80890 * 2 CryptAcquireContextW 409 6bd800bc-6bd800f2 call 6bd7ff40 call 6bee1da1 404->409 410 6bd800f7-6bd8010b call 6bd80890 * 2 404->410 419 6bd80808-6bd80823 call 6bd80000 409->419 418 6bd80110-6bd8011b call 6bd808e0 410->418 424 6bd80661-6bd80807 call 6bd80ed0 call 6bd80fc0 call 6bd80ed0 call 6bd80f20 call 6bd80ed0 call 6bd80fc0 * 2 call 6bd80ed0 call 6bd80fc0 call 6bd80f20 call 6bd80000 * 4 418->424 425 6bd80121-6bd80154 CryptCreateHash 418->425 426 6bd8015a-6bd801a8 call 6bd7ff40 call 6bee1da1 425->426 427 6bd801ad-6bd801b7 call 6bd80910 425->427 426->419 435 6bd801bd-6bd801ff call 6bd808e0 call 6bd7ffd0 CryptHashData 427->435 436 6bd80270-6bd8030f call 6bd80950 call 6bd80ae0 call 6bd80b30 call 6bd80b80 call 6bd809e0 call 6bd80910 427->436 454 6bd80269 435->454 455 6bd80205-6bd80264 call 6bd7ff40 call 6bee1da1 435->455 479 6bd803a3-6bd803e5 call 6bd808e0 call 6bd7ffd0 CryptHashData 436->479 480 6bd80315-6bd8039e call 6bd80ce0 call 6bd80d30 call 6bd80b80 call 6bd80be0 436->480 454->436 455->419 493 6bd8044b-6bd80497 CryptGetHashParam 479->493 494 6bd803eb-6bd80446 call 6bd7ff40 call 6bee1da1 479->494 480->479 499 6bd804fd-6bd80553 call 6bd80d90 call 6bd7ffd0 CryptGetHashParam 493->499 500 6bd8049d-6bd804f8 call 6bd7ff40 call 6bee1da1 493->500 494->419 524 6bd805b9-6bd8065c call 6bd80b80 call 6bd80ed0 call 6bd80b80 call 6bd80dd0 499->524 525 6bd80559-6bd805b4 call 6bd7ff40 call 6bee1da1 499->525 500->419 524->418 525->419
                                  APIs
                                  • CryptAcquireContextW.ADVAPI32 ref: 6BD800AA
                                  • CryptCreateHash.ADVAPI32 ref: 6BD80148
                                    • Part of subcall function 6BEE1DA1: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,?,?,?,6BD764E3,?,?,?,?,6BD763C6), ref: 6BEE1E02
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Crypt$AcquireContextCreateExceptionHashRaise
                                  • String ID:
                                  • API String ID: 333276693-0
                                  • Opcode ID: f42947ee98338f52ea3c475067425c28db824cc22f1b4eca47cf130b7c86918e
                                  • Instruction ID: 8ce51eb69f0f6fd613afc3ba3cef069da90a3eb5db39324c15ebf607ec8464f5
                                  • Opcode Fuzzy Hash: f42947ee98338f52ea3c475067425c28db824cc22f1b4eca47cf130b7c86918e
                                  • Instruction Fuzzy Hash: 4C322BB5911318CFCB18EF68D95579DBBB0FF49354F0084A9D809AB350DB74AA88CF92

                                  Control-flow Graph

                                  APIs
                                  • GetFileAttributesA.KERNEL32 ref: 6BD99B2B
                                  • SHGetFolderPathA.SHELL32 ref: 6BD99B74
                                  • GetFileAttributesA.KERNEL32 ref: 6BD99C6F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AttributesFile$FolderPath
                                  • String ID:
                                  • API String ID: 1382956649-0
                                  • Opcode ID: fbb5d9c17bf836728ab3f07d4f90abf9e8dad11544f6dad0b67d9b10d021ffb1
                                  • Instruction ID: 32202ffac56f2237c1636b729aa79a176a8890c13423c26014bb34e0824e4e27
                                  • Opcode Fuzzy Hash: fbb5d9c17bf836728ab3f07d4f90abf9e8dad11544f6dad0b67d9b10d021ffb1
                                  • Instruction Fuzzy Hash: F8B12AB0914314CFCB14EF28D84579DBBB0FF49318F0085AAD4599B3A1DB799A88CF92

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Process32$ByteCharCloseCreateFirstHandleMultiNextSnapshotToolhelp32Wide
                                  • String ID:
                                  • API String ID: 4013288513-0
                                  • Opcode ID: f100bb42bcfa7169596b6b5047ebfbfe4b2a2e7593680364dd8fff458cfbe60d
                                  • Instruction ID: e691ec95b7b05c4804d5f3e0c9981c7175bbe3fffb0ad8dadc78db0b86e95a26
                                  • Opcode Fuzzy Hash: f100bb42bcfa7169596b6b5047ebfbfe4b2a2e7593680364dd8fff458cfbe60d
                                  • Instruction Fuzzy Hash: 705139B4D082459FDB00EFB8D5557AEBFF0AF49314F00856DE895AB381D7389948CBA2

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 6BD7FD80: CryptStringToBinaryA.CRYPT32 ref: 6BD7FE00
                                    • Part of subcall function 6BD7FD80: CryptStringToBinaryA.CRYPT32 ref: 6BD7FEA7
                                  • CryptAcquireContextW.ADVAPI32 ref: 6BD81249
                                  • CryptImportKey.ADVAPI32 ref: 6BD81317
                                  • CryptSetKeyParam.ADVAPI32 ref: 6BD813A2
                                  • CryptSetKeyParam.ADVAPI32 ref: 6BD81449
                                    • Part of subcall function 6BEE1DA1: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,?,?,?,6BD764E3,?,?,?,?,6BD763C6), ref: 6BEE1E02
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Crypt$BinaryParamString$AcquireContextExceptionImportRaise
                                  • String ID:
                                  • API String ID: 2873263705-0
                                  • Opcode ID: 80fceb2ae0839da6c267d4adb8b1296484a57644b0dc8f23bc430d45b5da4055
                                  • Instruction ID: b451b4a0015b849153ae12a0a315df8103aa248d5ad0a2284f287e04aaad28a1
                                  • Opcode Fuzzy Hash: 80fceb2ae0839da6c267d4adb8b1296484a57644b0dc8f23bc430d45b5da4055
                                  • Instruction Fuzzy Hash: F0123BB0915318CFDB14EF68D95579DBBF0BF49314F0084A9D849AB350DB78AA88CF92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 913 6bda9085-6bda90a5 call 6bdbf17e call 6bdb7ea0 917 6bda90aa-6bda90b7 913->917 918 6bda90b9-6bda90c0 call 6bef2a0a 917->918 919 6bda90c2 917->919 920 6bda90c4-6bda90d0 call 6bdb6a70 918->920 919->920 925 6bda91df-6bda91f7 call 6bdb733a 920->925 926 6bda90d6-6bda90e5 call 6bdc521a 920->926 931 6bda91f9-6bda91fb 925->931 932 6bda9205-6bda9209 925->932 926->925 933 6bda90eb-6bda91a0 GetCurrentThread GetCurrentThreadId GetVersionExW 926->933 934 6bda91ff 931->934 935 6bda91fd 931->935 936 6bda920b-6bda921d 932->936 937 6bda921f 932->937 938 6bda91a2-6bda91a8 933->938 939 6bda91b1-6bda91b3 933->939 934->932 935->934 943 6bda9225-6bda923f 936->943 937->943 940 6bda91aa 938->940 941 6bda91b5 938->941 939->941 942 6bda91b7-6bda91dc call 6bdbf201 939->942 940->939 941->942
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDA908F
                                    • Part of subcall function 6BDB7EA0: __EH_prolog3.LIBCMT ref: 6BDB7EA7
                                  • GetCurrentThread.KERNEL32 ref: 6BDA90EE
                                  • GetCurrentThreadId.KERNEL32 ref: 6BDA90F7
                                  • GetVersionExW.KERNEL32 ref: 6BDA9193
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CurrentThread$H_prolog3H_prolog3_Version
                                  • String ID:
                                  • API String ID: 786120064-0
                                  • Opcode ID: edd745bf7759b65628c0255600f422f239c6d80e7adb6fb8ad1d306069943717
                                  • Instruction ID: 61e5c4d08c4e1bdb85ecd7ad30f8f0eada6b93ef4362b8de42bb4c72dfcd671c
                                  • Opcode Fuzzy Hash: edd745bf7759b65628c0255600f422f239c6d80e7adb6fb8ad1d306069943717
                                  • Instruction Fuzzy Hash: F751EFB5900B14CFD7248F2AC88468AFBF1BF49310F5049AED5AE8B711DB38A944CF51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 6bdbe392-6bdbe3e8 call 6bdbf17e call 6bda3a38 GetDeviceCaps 5 6bdbe3ea-6bdbe3f6 0->5 6 6bdbe400-6bdbe408 0->6 5->6 7 6bdbe3f8 5->7 8 6bdbe40a-6bdbe40e 6->8 9 6bdbe41e-6bdbe426 6->9 7->6 8->9 10 6bdbe410-6bdbe418 call 6bda2d30 DeleteObject 8->10 11 6bdbe428-6bdbe42c 9->11 12 6bdbe43c-6bdbe444 9->12 10->9 11->12 16 6bdbe42e-6bdbe436 call 6bda2d30 DeleteObject 11->16 13 6bdbe45a-6bdbe462 12->13 14 6bdbe446-6bdbe44a 12->14 18 6bdbe478-6bdbe480 13->18 19 6bdbe464-6bdbe468 13->19 14->13 17 6bdbe44c-6bdbe454 call 6bda2d30 DeleteObject 14->17 16->12 17->13 25 6bdbe482-6bdbe486 18->25 26 6bdbe496-6bdbe49e 18->26 19->18 24 6bdbe46a-6bdbe472 call 6bda2d30 DeleteObject 19->24 24->18 25->26 31 6bdbe488-6bdbe490 call 6bda2d30 DeleteObject 25->31 27 6bdbe4a0-6bdbe4a4 26->27 28 6bdbe4b4-6bdbe4bc 26->28 27->28 32 6bdbe4a6-6bdbe4ae call 6bda2d30 DeleteObject 27->32 33 6bdbe4be-6bdbe4c2 28->33 34 6bdbe4d2-6bdbe4da 28->34 31->26 32->28 33->34 38 6bdbe4c4-6bdbe4cc call 6bda2d30 DeleteObject 33->38 39 6bdbe4dc-6bdbe4e0 34->39 40 6bdbe4f0-6bdbe4f8 34->40 38->34 39->40 46 6bdbe4e2-6bdbe4ea call 6bda2d30 DeleteObject 39->46 42 6bdbe4fa-6bdbe4fe 40->42 43 6bdbe50e-6bdbe516 40->43 42->43 47 6bdbe500-6bdbe508 call 6bda2d30 DeleteObject 42->47 48 6bdbe518-6bdbe51c 43->48 49 6bdbe52c-6bdbe589 call 6bdbee43 call 6bee40a0 GetTextCharsetInfo 43->49 46->40 47->43 48->49 53 6bdbe51e-6bdbe526 call 6bda2d30 DeleteObject 48->53 62 6bdbe58b-6bdbe58e 49->62 63 6bdbe590-6bdbe594 49->63 53->49 64 6bdbe597-6bdbe5bd lstrcpyW 62->64 63->64 65 6bdbe596 63->65 66 6bdbe62b-6bdbe66c CreateFontIndirectW call 6bda2d04 call 6bef4195 64->66 67 6bdbe5bf-6bdbe5c6 64->67 65->64 78 6bdbe66e-6bdbe670 66->78 79 6bdbe673-6bdbe779 CreateFontIndirectW call 6bda2d04 call 6bdbee43 CreateFontIndirectW call 6bda2d04 CreateFontIndirectW call 6bda2d04 CreateFontIndirectW call 6bda2d04 GetSystemMetrics lstrcpyW CreateFontIndirectW call 6bda2d04 GetStockObject 66->79 67->66 68 6bdbe5c8-6bdbe5e2 EnumFontFamiliesW 67->68 70 6bdbe5f9-6bdbe616 EnumFontFamiliesW 68->70 71 6bdbe5e4-6bdbe5f7 lstrcpyW 68->71 73 6bdbe618-6bdbe61d 70->73 74 6bdbe61f 70->74 71->66 76 6bdbe624-6bdbe625 lstrcpyW 73->76 74->76 76->66 78->79 92 6bdbe849-6bdbe856 call 6bdbee84 79->92 93 6bdbe77f-6bdbe78e GetObjectW 79->93 98 6bdbe881-6bdbe883 92->98 93->92 95 6bdbe794-6bdbe844 lstrcpyW CreateFontIndirectW call 6bda2d04 CreateFontIndirectW call 6bda2d04 GetObjectW CreateFontIndirectW call 6bda2d04 CreateFontIndirectW call 6bda2d04 93->95 95->92 101 6bdbe858-6bdbe85f 98->101 102 6bdbe885-6bdbe895 call 6bd9d1f0 98->102 105 6bdbe8ab-6bdbe8b0 call 6bdb733a 101->105 106 6bdbe861-6bdbe86b call 6bdaa885 101->106 108 6bdbe89a-6bdbe8aa call 6bda3a8d call 6bdbf201 102->108 106->98 117 6bdbe86d-6bdbe87d 106->117 117->98
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDBE39C
                                    • Part of subcall function 6BDA3A38: __EH_prolog3.LIBCMT ref: 6BDA3A3F
                                    • Part of subcall function 6BDA3A38: GetWindowDC.USER32(00000000,00000004,6BDBDFDA,00000000), ref: 6BDA3A6B
                                  • GetDeviceCaps.GDI32(?,00000058), ref: 6BDBE3BC
                                  • DeleteObject.GDI32(00000000), ref: 6BDBE418
                                  • DeleteObject.GDI32(00000000), ref: 6BDBE436
                                  • DeleteObject.GDI32(00000000), ref: 6BDBE454
                                  • DeleteObject.GDI32(00000000), ref: 6BDBE472
                                  • DeleteObject.GDI32(00000000), ref: 6BDBE490
                                  • DeleteObject.GDI32(00000000), ref: 6BDBE4AE
                                  • DeleteObject.GDI32(00000000), ref: 6BDBE4CC
                                  • DeleteObject.GDI32(00000000), ref: 6BDBE4EA
                                  • DeleteObject.GDI32(00000000), ref: 6BDBE508
                                  • DeleteObject.GDI32(00000000), ref: 6BDBE526
                                  • GetTextCharsetInfo.GDI32(?,00000000,00000000), ref: 6BDBE55E
                                  • lstrcpyW.KERNEL32(?,?), ref: 6BDBE5B3
                                  • EnumFontFamiliesW.GDI32(?,00000000,6BDBF03F,Segoe UI), ref: 6BDBE5DA
                                  • lstrcpyW.KERNEL32(?,Segoe UI), ref: 6BDBE5ED
                                  • EnumFontFamiliesW.GDI32(?,00000000,6BDBF03F,Tahoma), ref: 6BDBE60B
                                  • lstrcpyW.KERNEL32(?,MS Sans Serif), ref: 6BDBE625
                                  • CreateFontIndirectW.GDI32(?), ref: 6BDBE62F
                                  • CreateFontIndirectW.GDI32(?), ref: 6BDBE677
                                  • CreateFontIndirectW.GDI32(?), ref: 6BDBE6B6
                                  • CreateFontIndirectW.GDI32(?), ref: 6BDBE6E2
                                  • CreateFontIndirectW.GDI32(?), ref: 6BDBE703
                                  • GetSystemMetrics.USER32(00000048), ref: 6BDBE722
                                  • lstrcpyW.KERNEL32(?,Marlett), ref: 6BDBE735
                                  • CreateFontIndirectW.GDI32(?), ref: 6BDBE73F
                                  • GetStockObject.GDI32(00000011), ref: 6BDBE76B
                                  • GetObjectW.GDI32(00000000,0000005C,?), ref: 6BDBE786
                                  • lstrcpyW.KERNEL32(?,Arial), ref: 6BDBE7C7
                                  • CreateFontIndirectW.GDI32(?), ref: 6BDBE7D1
                                  • CreateFontIndirectW.GDI32(?), ref: 6BDBE7EA
                                  • GetObjectW.GDI32(?,0000005C,?), ref: 6BDBE808
                                  • CreateFontIndirectW.GDI32(?), ref: 6BDBE816
                                  • CreateFontIndirectW.GDI32(?), ref: 6BDBE837
                                    • Part of subcall function 6BDBEE84: __EH_prolog3_GS.LIBCMT ref: 6BDBEE8B
                                    • Part of subcall function 6BDBEE84: GetTextMetricsW.GDI32(?,?), ref: 6BDBEEC0
                                    • Part of subcall function 6BDBEE84: GetTextMetricsW.GDI32(?,?), ref: 6BDBEF00
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Object$Font$CreateDeleteIndirect$lstrcpy$MetricsText$EnumFamiliesH_prolog3_$CapsCharsetDeviceH_prolog3InfoStockSystemWindow
                                  • String ID: Arial$MS Sans Serif$Marlett$Segoe UI$Tahoma
                                  • API String ID: 2837096512-1395034203
                                  • Opcode ID: 73002a2c95e643a2fb7e64b8af15a479dd0a7c924599f1995928600bab84481d
                                  • Instruction ID: 724a551ff88d650476bfc0cdf70efd915211a40ccef79170edd05dd368dbcf21
                                  • Opcode Fuzzy Hash: 73002a2c95e643a2fb7e64b8af15a479dd0a7c924599f1995928600bab84481d
                                  • Instruction Fuzzy Hash: F3E15CB2910349DBDF15DBB1C808BDEBBB8AF15315F0049A9E45BEB161DB38D648CB60

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 121 6bdbdf74-6bdbdf93 call 6bdbf115 GetSysColor 124 6bdbdf95-6bdbdf9f GetSysColor 121->124 125 6bdbdfa4 121->125 124->125 126 6bdbdfa1-6bdbdfa2 124->126 127 6bdbdfa6-6bdbdfb6 GetSysColor 125->127 126->127 128 6bdbdfc9 127->128 129 6bdbdfb8-6bdbdfc2 GetSysColor 127->129 130 6bdbdfcb-6bdbe102 call 6bda3a38 GetDeviceCaps GetSysColor * 21 128->130 129->128 131 6bdbdfc4-6bdbdfc7 129->131 134 6bdbe10d-6bdbe119 GetSysColor 130->134 135 6bdbe104-6bdbe10b 130->135 131->130 136 6bdbe11f-6bdbe135 GetSysColorBrush 134->136 135->136 137 6bdbe13b-6bdbe148 GetSysColorBrush 136->137 138 6bdbe38c-6bdbe391 call 6bdb733a 136->138 137->138 139 6bdbe14e-6bdbe15b GetSysColorBrush 137->139 139->138 141 6bdbe161-6bdbe2ac call 6bda2d5a CreateSolidBrush call 6bda2d04 call 6bda2d5a CreateSolidBrush call 6bda2d04 call 6bda2d5a CreateSolidBrush call 6bda2d04 call 6bda2d5a CreateSolidBrush call 6bda2d04 call 6bda2d5a CreateSolidBrush call 6bda2d04 call 6bda2d5a CreateSolidBrush call 6bda2d04 call 6bda2d5a CreateSolidBrush call 6bda2d04 call 6bda2d5a CreatePen call 6bda2d04 call 6bda2d5a CreatePen call 6bda2d04 call 6bda2d5a CreatePen call 6bda2d04 139->141 183 6bdbe2bb-6bdbe2c2 141->183 184 6bdbe2ae-6bdbe2b2 141->184 186 6bdbe328-6bdbe334 call 6bdbef42 183->186 187 6bdbe2c4-6bdbe326 CreateSolidBrush call 6bda2d04 183->187 184->183 185 6bdbe2b4-6bdbe2b6 call 6bda2d5a 184->185 185->183 186->138 194 6bdbe336-6bdbe36a call 6bda2d04 CreatePatternBrush call 6bda2d04 call 6bd9d1f0 186->194 193 6bdbe36f-6bdbe38b call 6bdf1ab9 call 6bda3a8d call 6bdbf1ed 187->193 194->193
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDBDF7B
                                  • GetSysColor.USER32(00000016), ref: 6BDBDF84
                                  • GetSysColor.USER32(0000000F), ref: 6BDBDF97
                                  • GetSysColor.USER32(00000015), ref: 6BDBDFAE
                                  • GetSysColor.USER32(0000000F), ref: 6BDBDFBA
                                  • GetDeviceCaps.GDI32(?,0000000C), ref: 6BDBDFE2
                                  • GetSysColor.USER32(0000000F), ref: 6BDBDFF0
                                  • GetSysColor.USER32(00000010), ref: 6BDBDFFE
                                  • GetSysColor.USER32(00000015), ref: 6BDBE00C
                                  • GetSysColor.USER32(00000016), ref: 6BDBE01A
                                  • GetSysColor.USER32(00000014), ref: 6BDBE028
                                  • GetSysColor.USER32(00000012), ref: 6BDBE036
                                  • GetSysColor.USER32(00000011), ref: 6BDBE044
                                  • GetSysColor.USER32(00000006), ref: 6BDBE04F
                                  • GetSysColor.USER32(0000000D), ref: 6BDBE05A
                                  • GetSysColor.USER32(0000000E), ref: 6BDBE065
                                  • GetSysColor.USER32(00000005), ref: 6BDBE070
                                  • GetSysColor.USER32(00000008), ref: 6BDBE07E
                                  • GetSysColor.USER32(00000009), ref: 6BDBE089
                                  • GetSysColor.USER32(00000007), ref: 6BDBE094
                                  • GetSysColor.USER32(00000002), ref: 6BDBE09F
                                  • GetSysColor.USER32(00000003), ref: 6BDBE0AA
                                  • GetSysColor.USER32(0000001B), ref: 6BDBE0B8
                                  • GetSysColor.USER32(0000001C), ref: 6BDBE0C6
                                  • GetSysColor.USER32(0000000A), ref: 6BDBE0D4
                                  • GetSysColor.USER32(0000000B), ref: 6BDBE0E2
                                  • GetSysColor.USER32(00000013), ref: 6BDBE0F0
                                  • GetSysColor.USER32(0000001A), ref: 6BDBE119
                                  • GetSysColorBrush.USER32(00000010), ref: 6BDBE12A
                                  • GetSysColorBrush.USER32(00000014), ref: 6BDBE13D
                                  • GetSysColorBrush.USER32(00000005), ref: 6BDBE150
                                  • CreateSolidBrush.GDI32(?), ref: 6BDBE171
                                  • CreateSolidBrush.GDI32(?), ref: 6BDBE18F
                                  • CreateSolidBrush.GDI32(?), ref: 6BDBE1AD
                                  • CreateSolidBrush.GDI32(?), ref: 6BDBE1CE
                                  • CreateSolidBrush.GDI32(?), ref: 6BDBE1EC
                                  • CreateSolidBrush.GDI32(?), ref: 6BDBE20A
                                  • CreateSolidBrush.GDI32(?), ref: 6BDBE228
                                  • CreatePen.GDI32(00000000,00000001,00000000), ref: 6BDBE24E
                                  • CreatePen.GDI32(00000000,00000001,00000000), ref: 6BDBE272
                                  • CreatePen.GDI32(00000000,00000001,00000000), ref: 6BDBE296
                                  • CreateSolidBrush.GDI32(?), ref: 6BDBE314
                                  • CreatePatternBrush.GDI32(00000000), ref: 6BDBE352
                                    • Part of subcall function 6BDA2D5A: DeleteObject.GDI32(00000000), ref: 6BDA2D69
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Color$BrushCreate$Solid$CapsDeleteDeviceH_prolog3ObjectPattern
                                  • String ID:
                                  • API String ID: 3754413814-0
                                  • Opcode ID: 0aa4c7192fe1a4a3f455f4eeab8c844fb9e9e8a6c812dfaccaf26301b1b04f3a
                                  • Instruction ID: 63a5ae00c0c97b54e6880437e3a0cccdaf860621616f555b1c4851012c39f113
                                  • Opcode Fuzzy Hash: 0aa4c7192fe1a4a3f455f4eeab8c844fb9e9e8a6c812dfaccaf26301b1b04f3a
                                  • Instruction Fuzzy Hash: 5AC1ACB2A14B12BFCF049FB5C84979CBB61BF09715F004115EA5BDB2A0CB78A558DBE0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 206 6bdc4e9d-6bdc4ebf EnterCriticalSection 207 6bdc4ed5-6bdc4ed8 206->207 208 6bdc4ec1-6bdc4ec5 206->208 211 6bdc4eda-6bdc4edd 207->211 212 6bdc4f05-6bdc4f07 207->212 209 6bdc4fda 208->209 210 6bdc4ecb-6bdc4ecf 208->210 214 6bdc4fdd-6bdc4fe8 LeaveCriticalSection call 6bdb7306 209->214 210->207 215 6bdc4f96-6bdc4f9c 210->215 211->209 216 6bdc4ee3-6bdc4ee8 211->216 213 6bdc4f08-6bdc4f11 212->213 217 6bdc4f28-6bdc4f35 GlobalHandle 213->217 218 6bdc4f13-6bdc4f26 call 6bdb6d62 GlobalAlloc 213->218 221 6bdc4f9e 215->221 222 6bdc4fa1-6bdc4fbb LeaveCriticalSection 215->222 220 6bdc4eeb-6bdc4eee 216->220 224 6bdc4fbc-6bdc4fbf 217->224 225 6bdc4f3b-6bdc4f57 GlobalUnlock call 6bdb6d62 GlobalReAlloc 217->225 235 6bdc4f5d-6bdc4f5f 218->235 227 6bdc4ef8-6bdc4efa 220->227 228 6bdc4ef0-6bdc4ef6 220->228 221->222 229 6bdc4fd4-6bdc4fd8 224->229 230 6bdc4fc1-6bdc4fcb GlobalHandle 224->230 225->235 227->215 233 6bdc4f00-6bdc4f03 227->233 228->220 228->227 229->214 230->229 234 6bdc4fcd-6bdc4fce GlobalLock 230->234 233->213 234->229 235->224 237 6bdc4f61-6bdc4f6f GlobalLock 235->237 237->229 238 6bdc4f71-6bdc4f94 call 6bee40a0 237->238 238->215
                                  APIs
                                  • EnterCriticalSection.KERNEL32(000000FF,?,?,?,?,?,?,?,?,?,?,6BDB43D0,?,6BDA8F45,?,6BDB3890), ref: 6BDC4EAE
                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,?,?,?,?,?,6BDB43D0,?,6BDA8F45,?,6BDB3890), ref: 6BDC4F20
                                  • GlobalHandle.KERNEL32(?), ref: 6BDC4F2A
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6BDC4F3C
                                  • GlobalReAlloc.KERNEL32(?,00000000), ref: 6BDC4F57
                                  • GlobalLock.KERNEL32(00000000), ref: 6BDC4F62
                                  • LeaveCriticalSection.KERNEL32(000000FF), ref: 6BDC4FAF
                                  • GlobalHandle.KERNEL32(?), ref: 6BDC4FC3
                                  • GlobalLock.KERNEL32(00000000), ref: 6BDC4FCE
                                  • LeaveCriticalSection.KERNEL32(000000FF,?,?,?,?,?,?,?,?,?,6BDB43D0,?,6BDA8F45,?,6BDB3890,5FCB9D08), ref: 6BDC4FDD
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
                                  • String ID:
                                  • API String ID: 2667261700-0
                                  • Opcode ID: 54343d703a0d88b33dd1303000d59d30b230f43629fe3edb5980c24a0538db31
                                  • Instruction ID: b2178eac8b36cb1d848b0da18c4f92f7b8055f42ed49ae1a2675649ab4e68ea7
                                  • Opcode Fuzzy Hash: 54343d703a0d88b33dd1303000d59d30b230f43629fe3edb5980c24a0538db31
                                  • Instruction Fuzzy Hash: AB418B72900209EFDB048F68C889B8ABBF8FB01321F004169E852DB550DB74EA54DFA1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 241 6bf088be-6bf088ee call 6bf08d58 244 6bf088f0-6bf088fb call 6bee50e9 241->244 245 6bf08909-6bf08915 call 6bef0d0d 241->245 250 6bf088fd-6bf08904 call 6bee50d6 244->250 251 6bf08917-6bf0892c call 6bee50e9 call 6bee50d6 245->251 252 6bf0892e-6bf08977 call 6bf08cc3 245->252 261 6bf08be3-6bf08be7 250->261 251->250 259 6bf089e4-6bf089ed GetFileType 252->259 260 6bf08979-6bf08982 252->260 265 6bf08a36-6bf08a39 259->265 266 6bf089ef-6bf08a20 GetLastError call 6bee50fc CloseHandle 259->266 263 6bf08984-6bf08988 260->263 264 6bf089b9-6bf089df GetLastError call 6bee50fc 260->264 263->264 270 6bf0898a-6bf089b7 call 6bf08cc3 263->270 264->250 268 6bf08a42-6bf08a48 265->268 269 6bf08a3b-6bf08a40 265->269 266->250 280 6bf08a26-6bf08a31 call 6bee50d6 266->280 273 6bf08a4c-6bf08a9a call 6bef0eb1 268->273 274 6bf08a4a 268->274 269->273 270->259 270->264 283 6bf08ab9-6bf08ae1 call 6bf08f7c 273->283 284 6bf08a9c-6bf08aa8 call 6bf08ed2 273->284 274->273 280->250 290 6bf08ae3-6bf08ae4 283->290 291 6bf08ae6-6bf08b27 283->291 284->283 292 6bf08aaa 284->292 293 6bf08aac-6bf08ab4 call 6bf01230 290->293 294 6bf08b48-6bf08b56 291->294 295 6bf08b29-6bf08b2d 291->295 292->293 293->261 297 6bf08be1 294->297 298 6bf08b5c-6bf08b60 294->298 295->294 296 6bf08b2f-6bf08b43 295->296 296->294 297->261 298->297 300 6bf08b62-6bf08b95 CloseHandle call 6bf08cc3 298->300 304 6bf08b97-6bf08bc3 GetLastError call 6bee50fc call 6bef0e20 300->304 305 6bf08bc9-6bf08bdd 300->305 304->305 305->297
                                  APIs
                                    • Part of subcall function 6BF08CC3: CreateFileW.KERNEL32(6BD8A690,00000000,?,6BF08967,?,?,00000000,?,6BF08967,6BD8A690,0000000C), ref: 6BF08CE0
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6BF089D2
                                  • __dosmaperr.LIBCMT ref: 6BF089D9
                                  • GetFileType.KERNEL32(00000000), ref: 6BF089E5
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6BF089EF
                                  • __dosmaperr.LIBCMT ref: 6BF089F8
                                  • CloseHandle.KERNEL32(00000000), ref: 6BF08A18
                                  • CloseHandle.KERNEL32(6BEFF9BC), ref: 6BF08B65
                                  • GetLastError.KERNEL32 ref: 6BF08B97
                                  • __dosmaperr.LIBCMT ref: 6BF08B9E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                  • String ID:
                                  • API String ID: 4237864984-0
                                  • Opcode ID: a239441bfdfb4095ec431f955dc199b9479f9d6397485349ce266670b4ae70b5
                                  • Instruction ID: 8a371eb5c7d38634ee60dfa028cd69d3cf3fda6a9061c37c3f6339a865bcf512
                                  • Opcode Fuzzy Hash: a239441bfdfb4095ec431f955dc199b9479f9d6397485349ce266670b4ae70b5
                                  • Instruction Fuzzy Hash: 00A11333A141559FCF099F78D862BAE7BB1AB07324F14029DE8119B3B1DB39D806DB51

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 6BD99FE0: GetModuleFileNameA.KERNEL32 ref: 6BD9A03C
                                  • CreateThread.KERNEL32 ref: 6BD9A68D
                                  • CreateThread.KERNEL32 ref: 6BD9A6C9
                                  • WaitForSingleObject.KERNEL32 ref: 6BD9A6F6
                                    • Part of subcall function 6BD9A1C0: GetModuleFileNameA.KERNEL32 ref: 6BD9A21C
                                    • Part of subcall function 6BD99F60: GetModuleFileNameA.KERNEL32 ref: 6BD99FA8
                                    • Part of subcall function 6BD9A3B0: GetModuleHandleA.KERNEL32 ref: 6BD9A3EE
                                    • Part of subcall function 6BD993B0: GetModuleHandleA.KERNEL32 ref: 6BD993C8
                                    • Part of subcall function 6BD993B0: FindResourceW.KERNEL32 ref: 6BD9942D
                                    • Part of subcall function 6BD993B0: LoadResource.KERNEL32 ref: 6BD99455
                                    • Part of subcall function 6BD993B0: SizeofResource.KERNEL32 ref: 6BD9946E
                                    • Part of subcall function 6BD993B0: LockResource.KERNEL32 ref: 6BD99480
                                    • Part of subcall function 6BD97EE0: WSAStartup.WS2_32 ref: 6BD97F58
                                    • Part of subcall function 6BD97EE0: getaddrinfo.WS2_32 ref: 6BD98061
                                    • Part of subcall function 6BD97EE0: WSACleanup.WS2_32 ref: 6BD9807A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Module$Resource$FileName$CreateHandleThread$CleanupFindLoadLockObjectSingleSizeofStartupWaitgetaddrinfo
                                  • String ID: IiViS$Update.d$dll
                                  • API String ID: 2807835635-876813718
                                  • Opcode ID: 2f964841488abd418a324cd777948668bb6f0e58967d6eee58675c0341326ceb
                                  • Instruction ID: c3f5307dfb08ad8767587ae35f84ee6fdeaeb40d7ebe8fdde02aa7a7bab3c4fd
                                  • Opcode Fuzzy Hash: 2f964841488abd418a324cd777948668bb6f0e58967d6eee58675c0341326ceb
                                  • Instruction Fuzzy Hash: 6BA14AB1900208CFDB14FF64E95679DBBB0FF15318F0085A9D45A9B390DB799A48CFA2

                                  Control-flow Graph

                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BE20AE9
                                    • Part of subcall function 6BDC2F60: EnterCriticalSection.KERNEL32(6BF78410,?,?,0000007C,?,6BDAF318,00000001), ref: 6BDC2F91
                                    • Part of subcall function 6BDC2F60: InitializeCriticalSection.KERNEL32(00000000,?,6BDAF318,00000001), ref: 6BDC2FA7
                                    • Part of subcall function 6BDC2F60: LeaveCriticalSection.KERNEL32(6BF78410,?,6BDAF318,00000001), ref: 6BDC2FB5
                                    • Part of subcall function 6BDC2F60: EnterCriticalSection.KERNEL32(00000000,?,0000007C,?,6BDAF318,00000001), ref: 6BDC2FC2
                                  • GetProfileIntW.KERNEL32(windows,DragMinDist,00000002), ref: 6BE20B3C
                                  • GetProfileIntW.KERNEL32(windows,DragDelay,000000C8), ref: 6BE20B52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterProfile$H_prolog3InitializeLeave
                                  • String ID: DragDelay$DragMinDist$windows
                                  • API String ID: 3965097884-2101198082
                                  • Opcode ID: 2cdd388d8b87c2f999a544df66e7d710be07ad5c697103c1c2cb17c4a29ec4b2
                                  • Instruction ID: 1bf429ea05831f16c05d8f50206d4c06cd571602bd45d4b5fcae31e9e018658a
                                  • Opcode Fuzzy Hash: 2cdd388d8b87c2f999a544df66e7d710be07ad5c697103c1c2cb17c4a29ec4b2
                                  • Instruction Fuzzy Hash: 40017CB1851740AFDB60CF78D54271ABBF0BB08714F90496EE44ADBBA1DB78AA04CF15

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 547 6bf02622-6bf02632 548 6bf02634-6bf02647 call 6bee50e9 call 6bee50d6 547->548 549 6bf0264c-6bf0264e 547->549 565 6bf029a6 548->565 551 6bf02654-6bf0265a 549->551 552 6bf0298e-6bf0299b call 6bee50e9 call 6bee50d6 549->552 551->552 555 6bf02660-6bf02689 551->555 570 6bf029a1 call 6bef1977 552->570 555->552 558 6bf0268f-6bf02698 555->558 561 6bf026b2-6bf026b4 558->561 562 6bf0269a-6bf026ad call 6bee50e9 call 6bee50d6 558->562 563 6bf0298a-6bf0298c 561->563 564 6bf026ba-6bf026be 561->564 562->570 569 6bf029a9-6bf029ac 563->569 564->563 568 6bf026c4-6bf026c8 564->568 565->569 568->562 573 6bf026ca-6bf026e1 568->573 570->565 576 6bf026e3-6bf026e6 573->576 577 6bf02716-6bf0271c 573->577 580 6bf026e8-6bf026ee 576->580 581 6bf0270c-6bf02714 576->581 578 6bf026f0-6bf02707 call 6bee50e9 call 6bee50d6 call 6bef1977 577->578 579 6bf0271e-6bf02725 577->579 613 6bf028c1 578->613 583 6bf02727 579->583 584 6bf02729-6bf02747 call 6bef8f91 call 6bef8f57 * 2 579->584 580->578 580->581 582 6bf02789-6bf027a8 581->582 586 6bf02864-6bf0286d call 6bf061ff 582->586 587 6bf027ae-6bf027ba 582->587 583->584 617 6bf02764-6bf02787 call 6beff74e 584->617 618 6bf02749-6bf0275f call 6bee50d6 call 6bee50e9 584->618 601 6bf028de 586->601 602 6bf0286f-6bf02881 586->602 587->586 590 6bf027c0-6bf027c2 587->590 590->586 594 6bf027c8-6bf027e9 590->594 594->586 598 6bf027eb-6bf02801 594->598 598->586 604 6bf02803-6bf02805 598->604 606 6bf028e2-6bf028f8 ReadFile 601->606 602->601 603 6bf02883-6bf02892 GetConsoleMode 602->603 603->601 608 6bf02894-6bf02898 603->608 604->586 609 6bf02807-6bf0282a 604->609 611 6bf02956-6bf02961 GetLastError 606->611 612 6bf028fa-6bf02900 606->612 608->606 614 6bf0289a-6bf028b2 ReadConsoleW 608->614 609->586 616 6bf0282c-6bf02842 609->616 619 6bf02963-6bf02975 call 6bee50d6 call 6bee50e9 611->619 620 6bf0297a-6bf0297d 611->620 612->611 621 6bf02902 612->621 615 6bf028c4-6bf028ce call 6bef8f57 613->615 624 6bf028d3-6bf028dc 614->624 625 6bf028b4 GetLastError 614->625 615->569 616->586 629 6bf02844-6bf02846 616->629 617->582 618->613 619->613 626 6bf02983-6bf02985 620->626 627 6bf028ba-6bf028c0 call 6bee50fc 620->627 623 6bf02905-6bf02917 621->623 623->615 634 6bf02919-6bf0291d 623->634 624->623 625->627 626->615 627->613 629->586 637 6bf02848-6bf0285f 629->637 640 6bf02936-6bf02943 634->640 641 6bf0291f-6bf0292f call 6bf02a2b 634->641 637->586 646 6bf02945 call 6bf029ad 640->646 647 6bf0294f-6bf02954 call 6bf02ccf 640->647 652 6bf02932-6bf02934 641->652 653 6bf0294a-6bf0294d 646->653 647->653 652->615 653->652
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 85a8eb2d2ea55ab046ea1ca4abe25fd2e8592892026597bb53993d9cd6f69103
                                  • Instruction ID: 26a0e2a6e4df3eadc5d791441e7fbcbe38e41591b135abba14f6e3aad9a75c36
                                  • Opcode Fuzzy Hash: 85a8eb2d2ea55ab046ea1ca4abe25fd2e8592892026597bb53993d9cd6f69103
                                  • Instruction Fuzzy Hash: 8CB1F676E04209AFDB01CFA8C861BAD7BF5BF46304F204199E514972B1CB7AD946DBB0

                                  Control-flow Graph

                                  APIs
                                  • GetCommandLineW.KERNEL32(00000001), ref: 00431C61
                                  • CommandLineToArgvW.SHELL32(00000000), ref: 00431C68
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00430000), ref: 00431CD3
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 00431CF3
                                  • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,00430000,00000000,00000000,00000000,00432778,00000014), ref: 00431D25
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1782592592.0000000000431000.00000020.00000001.01000000.00000005.sdmp, Offset: 00430000, based on PE: true
                                  • Associated: 00000003.00000002.1782575451.0000000000430000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782606665.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782621103.0000000000433000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000434000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_430000_Update.jbxd
                                  Similarity
                                  • API ID: ByteCharCommandLineMultiWide$ArgvFreeLocal
                                  • String ID:
                                  • API String ID: 4060259846-0
                                  • Opcode ID: 628a5320a387f6e6e1f81bc830c4847bb9d0c355a84808aceffff345246cce01
                                  • Instruction ID: 945662166d01b75d7ef68633b48d9a37af251fb65e93f3e9c990bbc6e0dcf838
                                  • Opcode Fuzzy Hash: 628a5320a387f6e6e1f81bc830c4847bb9d0c355a84808aceffff345246cce01
                                  • Instruction Fuzzy Hash: 10310170604305ABE714EF289D41B1B77E4EF88714F10492EFA569B2D0D774ED088B6A

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 881 6bee1b48-6bee1b59 call 6bdbd350 884 6bee1b6a-6bee1b71 881->884 885 6bee1b5b-6bee1b61 881->885 887 6bee1b7d-6bee1b91 dllmain_raw 884->887 888 6bee1b73-6bee1b76 884->888 885->884 886 6bee1b63-6bee1b65 885->886 889 6bee1c43-6bee1c52 886->889 891 6bee1c3a-6bee1c41 887->891 892 6bee1b97-6bee1ba8 dllmain_crt_dispatch 887->892 888->887 890 6bee1b78-6bee1b7b 888->890 893 6bee1bae-6bee1bc0 call 6be4e29f 890->893 891->889 892->891 892->893 896 6bee1be9-6bee1beb 893->896 897 6bee1bc2-6bee1bc4 893->897 899 6bee1bed-6bee1bf0 896->899 900 6bee1bf2-6bee1c03 dllmain_crt_dispatch 896->900 897->896 898 6bee1bc6-6bee1be4 call 6be4e29f call 6bee1a1c dllmain_raw 897->898 898->896 899->891 899->900 900->891 902 6bee1c05-6bee1c37 dllmain_raw 900->902 902->891
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: dllmain_raw$dllmain_crt_dispatch
                                  • String ID:
                                  • API String ID: 3136044242-0
                                  • Opcode ID: 9cb37ed245e8f22df4fd936e798027164389d55040d3c38aefa4eebea58d33e4
                                  • Instruction ID: a4814068a10e4c1cf131abf480eabb67ea00f7da11469466a547e399958b6876
                                  • Opcode Fuzzy Hash: 9cb37ed245e8f22df4fd936e798027164389d55040d3c38aefa4eebea58d33e4
                                  • Instruction Fuzzy Hash: 9B217472E04639EBDB118FE5CC4196E3A69EB85F98F214199F81597210E33C8D938BB1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 907 6bdba271-6bdba284 GetModuleHandleW 908 6bdba2ab-6bdba2ad 907->908 909 6bdba286-6bdba297 GetProcAddress 907->909 910 6bdba2aa 909->910 911 6bdba299-6bdba2a8 909->911 910->908 911->910
                                  APIs
                                  • GetModuleHandleW.KERNEL32(Shell32,00000000,?,6BD9CADA), ref: 6BDBA27C
                                  • GetProcAddress.KERNEL32(00000000,SetCurrentProcessExplicitAppUserModelID), ref: 6BDBA28D
                                  Strings
                                  • SetCurrentProcessExplicitAppUserModelID, xrefs: 6BDBA287
                                  • Shell32, xrefs: 6BDBA275
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: SetCurrentProcessExplicitAppUserModelID$Shell32
                                  • API String ID: 1646373207-2658420654
                                  • Opcode ID: fbe82e8817625f6f8eab2c3541837b3ad3a44fbd62dbcaaf1572c87edb56d483
                                  • Instruction ID: 4ab775e25b8cbf8b1264956a54800b269388dbe6962a1e100c5b146b8245feca
                                  • Opcode Fuzzy Hash: fbe82e8817625f6f8eab2c3541837b3ad3a44fbd62dbcaaf1572c87edb56d483
                                  • Instruction Fuzzy Hash: 2FE0267361022A7786101B75E81CD1B7F1CEB91761300043AF802C7210CF3ADC00C6E0
                                  APIs
                                  • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003), ref: 6BDBDF14
                                  • VerSetConditionMask.KERNEL32(00000000), ref: 6BDBDF1C
                                  • VerifyVersionInfoW.KERNEL32(0000011C,00000003,00000000), ref: 6BDBDF2D
                                  • GetSystemMetrics.USER32(00001000), ref: 6BDBDF3E
                                    • Part of subcall function 6BDBDF74: __EH_prolog3.LIBCMT ref: 6BDBDF7B
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000016), ref: 6BDBDF84
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(0000000F), ref: 6BDBDF97
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000015), ref: 6BDBDFAE
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(0000000F), ref: 6BDBDFBA
                                    • Part of subcall function 6BDBDF74: GetDeviceCaps.GDI32(?,0000000C), ref: 6BDBDFE2
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(0000000F), ref: 6BDBDFF0
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000010), ref: 6BDBDFFE
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000015), ref: 6BDBE00C
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000016), ref: 6BDBE01A
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000014), ref: 6BDBE028
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000012), ref: 6BDBE036
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000011), ref: 6BDBE044
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000006), ref: 6BDBE04F
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(0000000D), ref: 6BDBE05A
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(0000000E), ref: 6BDBE065
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000005), ref: 6BDBE070
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000008), ref: 6BDBE07E
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000009), ref: 6BDBE089
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000007), ref: 6BDBE094
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000002), ref: 6BDBE09F
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(00000003), ref: 6BDBE0AA
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(0000001B), ref: 6BDBE0B8
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(0000001C), ref: 6BDBE0C6
                                    • Part of subcall function 6BDBDF74: GetSysColor.USER32(0000000A), ref: 6BDBE0D4
                                    • Part of subcall function 6BDBE392: __EH_prolog3_GS.LIBCMT ref: 6BDBE39C
                                    • Part of subcall function 6BDBE392: GetDeviceCaps.GDI32(?,00000058), ref: 6BDBE3BC
                                    • Part of subcall function 6BDBE392: DeleteObject.GDI32(00000000), ref: 6BDBE418
                                    • Part of subcall function 6BDBE392: DeleteObject.GDI32(00000000), ref: 6BDBE436
                                    • Part of subcall function 6BDBE392: DeleteObject.GDI32(00000000), ref: 6BDBE454
                                    • Part of subcall function 6BDBE392: DeleteObject.GDI32(00000000), ref: 6BDBE472
                                    • Part of subcall function 6BDBE392: DeleteObject.GDI32(00000000), ref: 6BDBE490
                                    • Part of subcall function 6BDBE392: DeleteObject.GDI32(00000000), ref: 6BDBE4AE
                                    • Part of subcall function 6BDBE392: DeleteObject.GDI32(00000000), ref: 6BDBE4CC
                                    • Part of subcall function 6BDBE392: DeleteObject.GDI32(00000000), ref: 6BDBE4EA
                                    • Part of subcall function 6BDBE8B1: GetSystemMetrics.USER32(00000031), ref: 6BDBE8BF
                                    • Part of subcall function 6BDBE8B1: GetSystemMetrics.USER32(00000032), ref: 6BDBE8CD
                                    • Part of subcall function 6BDBE8B1: SetRectEmpty.USER32(?), ref: 6BDBE8E0
                                    • Part of subcall function 6BDBE8B1: EnumDisplayMonitors.USER32(00000000,00000000,6BDBF089,?,?,?), ref: 6BDBE8F0
                                    • Part of subcall function 6BDBE8B1: SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 6BDBE8FF
                                    • Part of subcall function 6BDBE8B1: SystemParametersInfoW.USER32(00001002,00000000,?,00000000), ref: 6BDBE92C
                                    • Part of subcall function 6BDBE8B1: SystemParametersInfoW.USER32(00001012,00000000,?,00000000), ref: 6BDBE940
                                    • Part of subcall function 6BDBE8B1: SystemParametersInfoW.USER32(0000100A,00000000,?,00000000), ref: 6BDBE966
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Color$DeleteObject$System$Info$Parameters$Metrics$CapsConditionDeviceMask$DisplayEmptyEnumH_prolog3H_prolog3_MonitorsRectVerifyVersion
                                  • String ID:
                                  • API String ID: 2442922003-0
                                  • Opcode ID: 7ff1ef87c7e25279ccbedfc9329b31850e7398a160838b77581abbc6d64cf715
                                  • Instruction ID: 06d4cbb5d7eb2edf64e85b6be36cfe60145e6779265a25521317940cad09dfc3
                                  • Opcode Fuzzy Hash: 7ff1ef87c7e25279ccbedfc9329b31850e7398a160838b77581abbc6d64cf715
                                  • Instruction Fuzzy Hash: 671194B1A00218ABDB159F709C56BEAB7BCEB89704F00045DE14797181CBB48A448BA0
                                  APIs
                                  • DeleteFileW.KERNEL32(6BEF5E01,?,6BEF5E01,?), ref: 6BF02E91
                                  • GetLastError.KERNEL32(?,6BEF5E01,?), ref: 6BF02E9B
                                  • __dosmaperr.LIBCMT ref: 6BF02EA2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: DeleteErrorFileLast__dosmaperr
                                  • String ID:
                                  • API String ID: 1545401867-0
                                  • Opcode ID: cad069fe8544223352ffbd0d7d35718eb907c71386bcee427efa8d317547cd3d
                                  • Instruction ID: c254653290b47dd4df164398e592aca79d878ad8543b362e15f94db74bb9325d
                                  • Opcode Fuzzy Hash: cad069fe8544223352ffbd0d7d35718eb907c71386bcee427efa8d317547cd3d
                                  • Instruction Fuzzy Hash: A6D01233158108678F001AF5BC0991B7F9CEA91374B641655F52EC58B0DF36D451D560
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,2]k,?,?,6BEF9230,00000001,00000364,?,FFFFFFFF,000000FF,?,?,6BEF5D32,?,6BD75477), ref: 6BEFC2E9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID: 2]k
                                  • API String ID: 1279760036-4091972633
                                  • Opcode ID: 2e1f45ea87f6c8b661f68a2a5ec95e04af562795801b5a5a1adb9014d12827eb
                                  • Instruction ID: a2b48bf04cd9d38ed707a0835cd9b96ffbd95dcda4ed5866bceeaa71c0ae7aa7
                                  • Opcode Fuzzy Hash: 2e1f45ea87f6c8b661f68a2a5ec95e04af562795801b5a5a1adb9014d12827eb
                                  • Instruction Fuzzy Hash: BFF0BB3274592957FB114ABE9805B56378CEF47B74B3040A5EC14E6390EB28D41386E0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c54c7927254e3361a517840f4cf3029b0d0bcaff36cc32b7101b609c319c0c86
                                  • Instruction ID: 0456537f1afbf3b3e7cf0887842e8d0148f755990063b3336ce5a4e30cebb8be
                                  • Opcode Fuzzy Hash: c54c7927254e3361a517840f4cf3029b0d0bcaff36cc32b7101b609c319c0c86
                                  • Instruction Fuzzy Hash: 7CE159B8604B00DFD364CF29C580B96BBE1BF49714F11896EE9AACB761E734B844CB51
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6BD798FD
                                    • Part of subcall function 6BD79C00: std::_Lockit::_Lockit.LIBCPMT ref: 6BD79C27
                                    • Part of subcall function 6BD79C00: std::_Lockit::~_Lockit.LIBCPMT ref: 6BD79C75
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6BD799F9
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                  • String ID:
                                  • API String ID: 593203224-0
                                  • Opcode ID: 48024fbd7ac0d9d368f4d17a1c56f806d557bccc123845af05474191f1a9ef25
                                  • Instruction ID: 61fd37a9fc06cc56dd575f1fc9de95e87e11706cb589c66e6e078e3770bb15c6
                                  • Opcode Fuzzy Hash: 48024fbd7ac0d9d368f4d17a1c56f806d557bccc123845af05474191f1a9ef25
                                  • Instruction Fuzzy Hash: 5F41D7B6D00208EFDB14EFA8D5816DDBBF0FB09720F104169E855AB351D738AA44CFA1
                                  APIs
                                  • __RTC_Initialize.LIBCMT ref: 6BEE1962
                                    • Part of subcall function 6BEE1D0E: InitializeSListHead.KERNEL32(6BF7A058,6BEE196C,6BF6F578,00000010,6BEE1B05,?,00000000,?,00000007,6BF6F598,00000010,6BEE1B18,?,?,6BEE1BA1,?), ref: 6BEE1D13
                                  • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6BEE19CC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                  • String ID:
                                  • API String ID: 3231365870-0
                                  • Opcode ID: bb64c3fdbf0f5d6bd96dc07dc13b605e820043e7e0aa1e44e5c1645c7b4728ef
                                  • Instruction ID: e4507f6132c034c770bc3bbde3128e17337f01726f815418a9b1242a56bc2d5f
                                  • Opcode Fuzzy Hash: bb64c3fdbf0f5d6bd96dc07dc13b605e820043e7e0aa1e44e5c1645c7b4728ef
                                  • Instruction Fuzzy Hash: 5B213773648364AADB005FF8E8027DC33A1AF0536EF2008ADD4566B291DB6F9596C277
                                  APIs
                                  • __RTC_Initialize.LIBCMT ref: 6BEE1A63
                                  • ___scrt_uninitialize_crt.LIBCMT ref: 6BEE1A7D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Initialize___scrt_uninitialize_crt
                                  • String ID:
                                  • API String ID: 2442719207-0
                                  • Opcode ID: 388cf743705425d6c86312f6c144fc114c53408a670debd39b5aeb4b97390617
                                  • Instruction ID: c396978af0abbc690b4c80d9970c3aa53f60734b5c4bdbc6504a8397a4f661b4
                                  • Opcode Fuzzy Hash: 388cf743705425d6c86312f6c144fc114c53408a670debd39b5aeb4b97390617
                                  • Instruction Fuzzy Hash: 03210872A48365EBDB009FF8D8027AD37A4FF05769F30456ED41596280DB7D86838672
                                  APIs
                                  • SetFilePointerEx.KERNEL32(00000000,00000000,?,00008000,?,00008000,6BEFF9BC,?,?,?,6BEFF777,6BEFF9BC,?,00000000,?,?), ref: 6BEFF92B
                                  • GetLastError.KERNEL32(00000000,?,?,?,6BEFF777,6BEFF9BC,?,00000000,?,?,00000000,00008000,6BEFF9BC,?,?,6BF088DB), ref: 6BEFF938
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID:
                                  • API String ID: 2976181284-0
                                  • Opcode ID: 540480e4bb20b6bc95f4106f7ad2792bc59a0a3d871342a5f9e2129a8a9c941f
                                  • Instruction ID: 04121b76f364ee1231ee5ffddb4e62e73b6bb5004a63f067f2e4a0da7216fb9b
                                  • Opcode Fuzzy Hash: 540480e4bb20b6bc95f4106f7ad2792bc59a0a3d871342a5f9e2129a8a9c941f
                                  • Instruction Fuzzy Hash: 97010032610615BFCF058FA8DC15D9E3B6EEB86324F340249F8119B291E779EA52CBD0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Yarn
                                  • String ID:
                                  • API String ID: 1767336200-0
                                  • Opcode ID: e8d2f6383c598bd03d2ccd55548dfcf8e70541655831c27d76cfacbea58b10f9
                                  • Instruction ID: b789f3051d8f4b7c22c89ffaceeb1c3db1b84b0956865a4232e58d3712a33565
                                  • Opcode Fuzzy Hash: e8d2f6383c598bd03d2ccd55548dfcf8e70541655831c27d76cfacbea58b10f9
                                  • Instruction Fuzzy Hash: 63E030723083006BEB089775AC12B7673D99B046B4F20402DE91FCA5D0EA25ED108561
                                  APIs
                                  • RtlFreeHeap.NTDLL(00000000,00000000,?,6BF04BDA,?,00000000,?,?,6BF0487A,?,00000007,?,?,6BF04025,?,?), ref: 6BEF8F6D
                                  • GetLastError.KERNEL32(?,?,6BF04BDA,?,00000000,?,?,6BF0487A,?,00000007,?,?,6BF04025,?,?), ref: 6BEF8F78
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 485612231-0
                                  • Opcode ID: e989b169b3d37e8b4442d45610a5ba580f0b877c983634576d0d15dd2fc8c997
                                  • Instruction ID: 44181d97704dbd6ed1ce1e454ee63d26c2ecb4b29f17e174b39d5df7d7eee9fd
                                  • Opcode Fuzzy Hash: e989b169b3d37e8b4442d45610a5ba580f0b877c983634576d0d15dd2fc8c997
                                  • Instruction Fuzzy Hash: 56E08C33214218AFCB011BB1A809B993BADEF41369F6500A8F60986660EB38C951CBA0
                                  APIs
                                    • Part of subcall function 00431721: GetModuleHandleW.KERNEL32(00000000,004311DF,00430000,00000000,00000000,00000000,00432778,00000014), ref: 00431723
                                  • _c_exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00431227
                                  • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000007,00432778,00000014), ref: 00431256
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1782592592.0000000000431000.00000020.00000001.01000000.00000005.sdmp, Offset: 00430000, based on PE: true
                                  • Associated: 00000003.00000002.1782575451.0000000000430000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782606665.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782621103.0000000000433000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000434000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_430000_Update.jbxd
                                  Similarity
                                  • API ID: HandleModule_c_exit_exit
                                  • String ID:
                                  • API String ID: 750871209-0
                                  • Opcode ID: 16fa93b7bc53292110ca8a16250e65417d72c628d38c51941cfc6685c9766e0c
                                  • Instruction ID: 08292b87a255911718db251ef88854483a2434b6f7694c7aa4fda6c5e1713c66
                                  • Opcode Fuzzy Hash: 16fa93b7bc53292110ca8a16250e65417d72c628d38c51941cfc6685c9766e0c
                                  • Instruction Fuzzy Hash: 1CE08632D042498FCF109BA4D8023DEB771FB49368F10256BD912B33B1D73D58128A58
                                  APIs
                                  • CloseHandle.KERNEL32(00000000,?,00000000,?,6BF0124F,6BF08AB1,?,00000000,00000000), ref: 6BF012B6
                                  • GetLastError.KERNEL32(?,00000000,?,6BF0124F,6BF08AB1,?,00000000,00000000), ref: 6BF012C0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CloseErrorHandleLast
                                  • String ID:
                                  • API String ID: 918212764-0
                                  • Opcode ID: 068575ffbf9f783f0f0ccff370c2098fdeaaf8e6ba9fe63898a3567af4d46824
                                  • Instruction ID: 9603f3082025730c2e6cd3812e7813a21af073a3c8fd5290000a121eec607acc
                                  • Opcode Fuzzy Hash: 068575ffbf9f783f0f0ccff370c2098fdeaaf8e6ba9fe63898a3567af4d46824
                                  • Instruction Fuzzy Hash: 7611E933A045341AD7100775A93575E3B998F8373CF25029DF915C75F2DF6DC6459250
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4f028bc79165a067a111ae19d0e7bd1aab371d0d3bdfe1c37ea9910b767dcce1
                                  • Instruction ID: e35f3a5b2b3241430d13560e4c4efbe3c92537a697c059d6a7a9a6c20b92d0e5
                                  • Opcode Fuzzy Hash: 4f028bc79165a067a111ae19d0e7bd1aab371d0d3bdfe1c37ea9910b767dcce1
                                  • Instruction Fuzzy Hash: 4B519074A10208AFDF00CF68C881E997BF9AF5A328F35C199E9189B351D375DA52CB90
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDBDB62
                                    • Part of subcall function 6BDBDEB7: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003), ref: 6BDBDF14
                                    • Part of subcall function 6BDBDEB7: VerSetConditionMask.KERNEL32(00000000), ref: 6BDBDF1C
                                    • Part of subcall function 6BDBDEB7: VerifyVersionInfoW.KERNEL32(0000011C,00000003,00000000), ref: 6BDBDF2D
                                    • Part of subcall function 6BDBDEB7: GetSystemMetrics.USER32(00001000), ref: 6BDBDF3E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ConditionMask$H_prolog3InfoMetricsSystemVerifyVersion
                                  • String ID:
                                  • API String ID: 2710481357-0
                                  • Opcode ID: 3137890e8b919684cd40115ce8a25dc2eeba413ce3b485e3565187e26fd3f552
                                  • Instruction ID: da0ac522bafab3e473b65f7c8baaaf83804fb96f7a96ece28ca7d08dab89917d
                                  • Opcode Fuzzy Hash: 3137890e8b919684cd40115ce8a25dc2eeba413ce3b485e3565187e26fd3f552
                                  • Instruction Fuzzy Hash: 4E51DEB0946F418FD3A9CF3A85417C6FAE0BF89310F108A2E91AED6660EB746184CF55
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6BD7A0A4
                                    • Part of subcall function 6BDBBFAE: _Yarn.LIBCPMT ref: 6BDBBFCE
                                    • Part of subcall function 6BDBBFAE: _Yarn.LIBCPMT ref: 6BDBBFF2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Yarn$LockitLockit::_std::_
                                  • String ID:
                                  • API String ID: 360232963-0
                                  • Opcode ID: 852c4be030017a166c59f03f65cd6b8a31abe9ca13cb762e23f0a18f551b9ceb
                                  • Instruction ID: 3326c63fc20de95d15b8018b5d7b5ed991e44cb83f7bbc045ede9f9e382bfc5d
                                  • Opcode Fuzzy Hash: 852c4be030017a166c59f03f65cd6b8a31abe9ca13cb762e23f0a18f551b9ceb
                                  • Instruction Fuzzy Hash: 6C31EBB1D006088BDB18EFA8D892AEDBBB1FF49728F04453DD5066F340D7399A50CBA5
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: __wsopen_s
                                  • String ID:
                                  • API String ID: 3347428461-0
                                  • Opcode ID: ec67af23697862f5bf958201d9ffc76dd38ce927bbe72c52a9ba5952bc6e67e9
                                  • Instruction ID: f084cb5a2b35d5e300cc02bf01c2d8019f578faa4fbfa8fec793137d7313553e
                                  • Opcode Fuzzy Hash: ec67af23697862f5bf958201d9ffc76dd38ce927bbe72c52a9ba5952bc6e67e9
                                  • Instruction Fuzzy Hash: C7114F72A0420AAFCF05DF98E94199B7BF8EF48304F154099F804EB351D675D912CBA4
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,6BEFCF02,?,?,6BEFCF02,00000220,?,00000000,?), ref: 6BEF8FC3
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 6e6a8e94abc6ac44a991dc32ed6b8668de63b1e76ca13f0f9a43e96fab008f08
                                  • Instruction ID: 0a795faadf4ad020064ef3390baaf464410e4c28ef96fde1bee3e819dc9a3c74
                                  • Opcode Fuzzy Hash: 6e6a8e94abc6ac44a991dc32ed6b8668de63b1e76ca13f0f9a43e96fab008f08
                                  • Instruction Fuzzy Hash: 04E0E53315512EEFE7111A778C01B46B68EEF43BB4F3100A0EC1496390EB6CC51392E0
                                  APIs
                                  • CreateFileW.KERNEL32(6BD8A690,00000000,?,6BF08967,?,?,00000000,?,6BF08967,6BD8A690,0000000C), ref: 6BF08CE0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: b210c539002df39fa1b42f181444326e1a470b00af2a2af247d03c38f43dcb56
                                  • Instruction ID: d18754ba80265367f31024a45e8b841232ae35d0283c60b5078c75651eff51cc
                                  • Opcode Fuzzy Hash: b210c539002df39fa1b42f181444326e1a470b00af2a2af247d03c38f43dcb56
                                  • Instruction Fuzzy Hash: 14D06C3201020DBBDF028E84DC06EDA3FAAFB48714F018000FA18A6020C732E821AB91
                                  APIs
                                  • TCGamerUpdateMain.UPDATE(?,?), ref: 0043100B
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1782592592.0000000000431000.00000020.00000001.01000000.00000005.sdmp, Offset: 00430000, based on PE: true
                                  • Associated: 00000003.00000002.1782575451.0000000000430000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782606665.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782621103.0000000000433000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000434000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_430000_Update.jbxd
                                  Similarity
                                  • API ID: GamerMainUpdate
                                  • String ID:
                                  • API String ID: 3533789159-0
                                  • Opcode ID: 0dc032e54f475a4c8a862538ffc73d883b9d6e7095286aea5a65631e74e2db75
                                  • Instruction ID: ac666ce95d41af0bb7979ed4d2a34f2b21ffb277ba548e1cd6a866acdadeb373
                                  • Opcode Fuzzy Hash: 0dc032e54f475a4c8a862538ffc73d883b9d6e7095286aea5a65631e74e2db75
                                  • Instruction Fuzzy Hash: 43B09B7655020C678744DED9DC41C55339C564C654F404015BD1C4B741D535F55047A5
                                  APIs
                                  • DeleteObject.GDI32(00000000), ref: 6BDA2D69
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: DeleteObject
                                  • String ID:
                                  • API String ID: 1531683806-0
                                  • Opcode ID: 70692119da386fb4d79416ab6443452ba77fd6979a03e034cd5f5e7ac84bce31
                                  • Instruction ID: b8e7a371ce63ac7953aeca1edc1565ef3faef38817f0208436d519a880b4130e
                                  • Opcode Fuzzy Hash: 70692119da386fb4d79416ab6443452ba77fd6979a03e034cd5f5e7ac84bce31
                                  • Instruction Fuzzy Hash: 72B092B0821100AACE405772CA0870A3A649B92B2EF008894E009C9002DB3DC1499590
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: 73be0d045feacb1e0cb1ded5c38c054530c1d0bb5ead68ee025e1c5fd3708c84
                                  • Instruction ID: d4c4042bdda4a2992b93c944939f15c2255bc2e6fdb98a34dbcc35aff45342f9
                                  • Opcode Fuzzy Hash: 73be0d045feacb1e0cb1ded5c38c054530c1d0bb5ead68ee025e1c5fd3708c84
                                  • Instruction Fuzzy Hash: C93116B1A04249CFCB25AFA8D8426DDBBB1FB0A728F10442AD5459F350D7389905CBA2
                                  APIs
                                    • Part of subcall function 6BD99550: CreateToolhelp32Snapshot.KERNEL32 ref: 6BD995A2
                                  • Sleep.KERNEL32 ref: 6BD99A2F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CreateSleepSnapshotToolhelp32
                                  • String ID:
                                  • API String ID: 684154974-0
                                  • Opcode ID: 23b2e141e17f124da574c790bbcaefc7329020a4c0f2feabdac5a717f70170f7
                                  • Instruction ID: d231b31bfdb9db33f6b2033e995ba983baf0d156bb76d3f6ee55d22fa9b948a9
                                  • Opcode Fuzzy Hash: 23b2e141e17f124da574c790bbcaefc7329020a4c0f2feabdac5a717f70170f7
                                  • Instruction Fuzzy Hash: 122119B1D00359DFCB14EFA8D8416DEBBB4FF09724F000629D4666B384D779A609CBA2
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: a01934df4c79b1133b2320eb8bb77bf02f2d9d8054f2fab2651c038ee51c08ce
                                  • Instruction ID: 85ca7bd83b4052b05ed84878b20c1a3c126ba56ee306947292b47bcd92c2c92e
                                  • Opcode Fuzzy Hash: a01934df4c79b1133b2320eb8bb77bf02f2d9d8054f2fab2651c038ee51c08ce
                                  • Instruction Fuzzy Hash: 62D09E75D012089FC740EFBCE54558DBFF4AF54310F004075E989D7300E6749698CB96
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDDB056
                                    • Part of subcall function 6BE26CF4: __EH_prolog3_catch.LIBCMT ref: 6BE26CFB
                                  • IsWindow.USER32(00000000), ref: 6BDDB15D
                                  • GetCursorPos.USER32(?), ref: 6BDDB17B
                                  • ScreenToClient.USER32(?,?), ref: 6BDDB188
                                  • GetParent.USER32(?), ref: 6BDDB255
                                  • SetTimer.USER32(?,0000EC18,FFFFFFFE,00000000), ref: 6BDDB2B3
                                  • InvalidateRect.USER32(?,00000054,00000001), ref: 6BDDB2C2
                                  • UpdateWindow.USER32(?), ref: 6BDDB2CB
                                  • KillTimer.USER32(0000EC18,0000EC18,00000000), ref: 6BDDB2E6
                                  • GetParent.USER32(?), ref: 6BDDB3BC
                                  • GetParent.USER32(?), ref: 6BDDB425
                                  • SendMessageW.USER32(?,0000011F,00000080,?), ref: 6BDDB4BD
                                  • KillTimer.USER32(?,0000EC18), ref: 6BDDB4F2
                                  • GetKeyState.USER32(00000010), ref: 6BDDB55D
                                  • IsRectEmpty.USER32(?), ref: 6BDDB874
                                  • IsRectEmpty.USER32(?), ref: 6BDDB95C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ParentRectTimer$EmptyKillWindow$ClientCursorH_prolog3H_prolog3_catchInvalidateMessageScreenSendStateUpdate
                                  • String ID:
                                  • API String ID: 1309801314-0
                                  • Opcode ID: 542915979732013b5089754e164e6e1be5353396656bc9061984c3a831d5931b
                                  • Instruction ID: 32334cfc80ee46a813a72f097e5286050f1376b820fe3a71f5f1811b7e57989c
                                  • Opcode Fuzzy Hash: 542915979732013b5089754e164e6e1be5353396656bc9061984c3a831d5931b
                                  • Instruction Fuzzy Hash: CE629D71A00215DBDF04CFA8C894BAD7BB5FF49728F1041B9E895AF291DB78E940DB60
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDD9C4B
                                  • GetParent.USER32(?), ref: 6BDD9CC7
                                  • SendMessageW.USER32(?,00000117,?,?), ref: 6BDD9D70
                                  • GetMenuItemCount.USER32(?), ref: 6BDD9D7F
                                  • GetMenuItemInfoW.USER32(00000000,00000000,00000001,?), ref: 6BDD9E65
                                  • GetMenuState.USER32(00000000,00000000,00000400), ref: 6BDD9E86
                                  • CharUpperW.USER32(?), ref: 6BDD9FFA
                                  • GetMenuDefaultItem.USER32(?,00000000,00000001), ref: 6BDDA21E
                                  • __EH_prolog3.LIBCMT ref: 6BDDA246
                                  • CreatePopupMenu.USER32 ref: 6BDDA25C
                                  • AppendMenuW.USER32(00000000,?,?,-00000010), ref: 6BDDA32C
                                  • AppendMenuW.USER32(00000000,00000000,?,?), ref: 6BDDA34E
                                  • SetMenuDefaultItem.USER32(00000000,?,00000000,00000000), ref: 6BDDA377
                                  • KillTimer.USER32(6BF1EDF4,0000EC17,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00000000), ref: 6BDDA3B9
                                  • SetTimer.USER32(6BF1EDF4,0000EC17,?,00000000), ref: 6BDDA406
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Menu$Item$AppendDefaultTimer$CharCountCreateH_prolog3H_prolog3_InfoKillMessageParentPopupSendStateUpper
                                  • String ID: 0$7$@
                                  • API String ID: 2255036064-3997377745
                                  • Opcode ID: cad326dc5514fffb891eb966bf89091ed214e324d3f0ee930bd4d5f293b987c5
                                  • Instruction ID: 09a9324da9cce8ece3603a580f0e0264afe5606e7a4e951bdc9c33ba25915219
                                  • Opcode Fuzzy Hash: cad326dc5514fffb891eb966bf89091ed214e324d3f0ee930bd4d5f293b987c5
                                  • Instruction Fuzzy Hash: F522AC71A00229DBDB15CF74CC95BEDB7B5BF05324F0081E9E959AB290DB38AA44DF60
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDD1DB2
                                  • GetClientRect.USER32(?,?), ref: 6BDD1E66
                                    • Part of subcall function 6BDA3959: __EH_prolog3.LIBCMT ref: 6BDA3960
                                    • Part of subcall function 6BDA3959: GetDC.USER32(00000000), ref: 6BDA398C
                                  • GetFocus.USER32 ref: 6BDD20D2
                                  • NotifyWinEvent.USER32(00008005,?,000000FC,00000000), ref: 6BDD2106
                                  • InvalidateRect.USER32(?,?,00000001,?), ref: 6BDD22D8
                                  • InflateRect.USER32(?,00000000,?), ref: 6BDD231E
                                  • RedrawWindow.USER32(?,?,00000000,00000401), ref: 6BDD2331
                                  • InvalidateRect.USER32(?,?,00000001,?), ref: 6BDD23C4
                                  • InflateRect.USER32(?,00000000,?), ref: 6BDD240A
                                  • RedrawWindow.USER32(?,?,00000000,00000401), ref: 6BDD241E
                                  • NotifyWinEvent.USER32(00008005,?,000000FC,00000001), ref: 6BDD2504
                                  • InvalidateRect.USER32(?,?,00000001,?), ref: 6BDD2575
                                  • InflateRect.USER32(?,00000000,?), ref: 6BDD25BB
                                  • RedrawWindow.USER32(?,?,00000000,00000401), ref: 6BDD25CE
                                  • InvalidateRect.USER32(?,?,00000001,?), ref: 6BDD2640
                                  • InflateRect.USER32(?,00000000,?), ref: 6BDD2686
                                  • RedrawWindow.USER32(?,?,00000000,00000401), ref: 6BDD2699
                                  • UpdateWindow.USER32(?), ref: 6BDD26A2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Window$InflateInvalidateRedraw$EventNotify$ClientFocusH_prolog3H_prolog3_Update
                                  • String ID:
                                  • API String ID: 387073690-0
                                  • Opcode ID: c0691636b3b659f099f63bc810eb16cd5695b10a98afec0a4fa7c399a90654f3
                                  • Instruction ID: 918e32afeae3130c91ed09c3381bdf79a6f89fdceaf31f1aaeca831722173d37
                                  • Opcode Fuzzy Hash: c0691636b3b659f099f63bc810eb16cd5695b10a98afec0a4fa7c399a90654f3
                                  • Instruction Fuzzy Hash: D8528135E1061ADFDF04CFA4C894BADBBB5FF09328F104169E855AB254DB38A945CFA0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Cleanup$closesocket$AllocStartupVirtualconnectfreeaddrinfogetaddrinforecvsocket
                                  • String ID: $@
                                  • API String ID: 1138076629-1077428164
                                  • Opcode ID: c9be6c73150b482935bae961a270642405129f688c8b2fd17d572f0b9912cc71
                                  • Instruction ID: 4a814874e51ebe2decf3bb26c1da8e66bb31d2ef2b3aadd50f8868507792001e
                                  • Opcode Fuzzy Hash: c9be6c73150b482935bae961a270642405129f688c8b2fd17d572f0b9912cc71
                                  • Instruction Fuzzy Hash: 17F107B4A152248FDB14EF28D985BD9BBF0FF4A310F0085E9D8899B350D7359A85CF92
                                  APIs
                                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 6BDCB99D
                                  • GetDlgItem.USER32(?,00003020), ref: 6BDCB9ED
                                  • GetDlgItem.USER32(?,00003020), ref: 6BDCBA18
                                  • GetWindowRect.USER32(00000000,?), ref: 6BDCBA2C
                                  • MapDialogRect.USER32(?,?), ref: 6BDCBA4F
                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000016), ref: 6BDCBA79
                                  • GetDlgItem.USER32(?,00000001), ref: 6BDCBA8A
                                  • GetWindowRect.USER32(00000000,?), ref: 6BDCBA9C
                                  • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000015,?), ref: 6BDCBAC0
                                  • GetWindowRect.USER32(?,?), ref: 6BDCBAD5
                                  • GetWindowRect.USER32(?,?), ref: 6BDCBB33
                                  • GetDlgItem.USER32(?,00000001), ref: 6BDCBB45
                                  • GetWindowRect.USER32(00000000,?), ref: 6BDCBB54
                                  • GetDlgItem.USER32(?,00000001), ref: 6BDCBB7D
                                  • ShowWindow.USER32(00000000,00000000), ref: 6BDCBB8C
                                  • EnableWindow.USER32(00000000,00000000), ref: 6BDCBB95
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Rect$Item$DialogEnableMessageSendShow
                                  • String ID:
                                  • API String ID: 966972710-0
                                  • Opcode ID: 8d9f41c0cb8a21eefb6d11ff1b81eb5c1e1c7aa96425574c6acc54f3e9c48751
                                  • Instruction ID: ab57654f9e1b73f1e862e0a2bd12dfc9233e75062e918dd87fdad8846b62f5c8
                                  • Opcode Fuzzy Hash: 8d9f41c0cb8a21eefb6d11ff1b81eb5c1e1c7aa96425574c6acc54f3e9c48751
                                  • Instruction Fuzzy Hash: FBA18072A10609AFDB10CFB4CD89BAFBBB9FF49314F104129E556AB190DB74A940DB21
                                  APIs
                                  • SetRectEmpty.USER32(?), ref: 6BDD82F9
                                  • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 6BDD8317
                                  • ReleaseCapture.USER32 ref: 6BDD831D
                                  • SetCapture.USER32(?), ref: 6BDD8330
                                  • ReleaseCapture.USER32 ref: 6BDD83BD
                                  • SetCapture.USER32(?), ref: 6BDD83D0
                                  • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 6BDD84C4
                                  • UpdateWindow.USER32(?), ref: 6BDD8550
                                  • SendMessageW.USER32(?,00000111,00000000,00000000), ref: 6BDD859F
                                  • IsWindow.USER32(?), ref: 6BDD85AB
                                  • IsIconic.USER32(?), ref: 6BDD85B6
                                  • IsZoomed.USER32(?), ref: 6BDD85C1
                                  • IsWindow.USER32(?), ref: 6BDD85DF
                                  • UpdateWindow.USER32(?), ref: 6BDD863B
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Capture$MessageReleaseSendUpdate$EmptyIconicRectRedrawZoomed
                                  • String ID:
                                  • API String ID: 2500574155-0
                                  • Opcode ID: 69c207a6593702567421ef66ea81a469732ddc1d382bb2c92eed152de5152bcd
                                  • Instruction ID: e42731fc0129a6eb832e6a7de60bc29b3322178562a62b61a8bfe220f8efd41f
                                  • Opcode Fuzzy Hash: 69c207a6593702567421ef66ea81a469732ddc1d382bb2c92eed152de5152bcd
                                  • Instruction Fuzzy Hash: 52C18C31A00615DFCF068F64C894BAD3BB6BF49324F0405B9EC6AAF2A5CB35D905DB50
                                  APIs
                                    • Part of subcall function 6BDAA828: GetParent.USER32(?), ref: 6BDAA832
                                  • ScreenToClient.USER32(?,?), ref: 6BDC4044
                                  • GetKeyState.USER32(00000001), ref: 6BDC40B5
                                  • GetKeyState.USER32(00000001), ref: 6BDC4110
                                  • IsWindow.USER32(?), ref: 6BDC41D1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: State$ClientParentScreenWindow
                                  • String ID: 0
                                  • API String ID: 1527269598-4108050209
                                  • Opcode ID: d7569231494aecb38f371d7faeaf6d109969ad101fad5b01fdfc364cde59ef50
                                  • Instruction ID: 214b9fe2ded097ec6e99fd29d8d18574ba1022773221173ba7b5c3b0e52f8f5b
                                  • Opcode Fuzzy Hash: d7569231494aecb38f371d7faeaf6d109969ad101fad5b01fdfc364cde59ef50
                                  • Instruction Fuzzy Hash: 9261B034F10318DBDF109F64C899BAE7BB9BF05724F10016AE852AB291DB7899019F92
                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6BDA9F7C,6BDA9005,00000003,?,00000004,6BDA9005), ref: 6BDC5BA3
                                  • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 6BDC5BB3
                                  • EncodePointer.KERNEL32(00000000,?,6BDA9F7C,6BDA9005,00000003,?,00000004,6BDA9005), ref: 6BDC5BBC
                                  • DecodePointer.KERNEL32(00000000,?,?,6BDA9F7C,6BDA9005,00000003,?,00000004,6BDA9005), ref: 6BDC5BCA
                                  • GetLocaleInfoW.KERNEL32(00000000,00000004,?,00000003,?,6BDA9F7C,6BDA9005,00000003,?,00000004,6BDA9005), ref: 6BDC5C01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleInfoLocaleModuleProc
                                  • String ID: GetLocaleInfoEx$kernel32.dll
                                  • API String ID: 1461536855-1547310189
                                  • Opcode ID: c6f30655c03917a8295af72ee1ff73a528bb0ee3fc62b61c40b530df93b6f4ea
                                  • Instruction ID: 93af4e9ca116ed390ad1a54434ca49571053cb66d6732adfef6a782a03677719
                                  • Opcode Fuzzy Hash: c6f30655c03917a8295af72ee1ff73a528bb0ee3fc62b61c40b530df93b6f4ea
                                  • Instruction Fuzzy Hash: DF011D37414219EBCF015FA5ED09E5A3F6EFB0A7647044461FE06D6530DB35D8249BA2
                                  APIs
                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6BE1EDC1
                                    • Part of subcall function 6BDA3A38: __EH_prolog3.LIBCMT ref: 6BDA3A3F
                                    • Part of subcall function 6BDA3A38: GetWindowDC.USER32(00000000,00000004,6BDBDFDA,00000000), ref: 6BDA3A6B
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BE1EE01
                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6BE1EE23
                                    • Part of subcall function 6BDA3826: SelectObject.GDI32(6BDAF2CB,?), ref: 6BDA382F
                                  • FillRect.USER32(?,?,?), ref: 6BE1EE6D
                                  • OpenClipboard.USER32(?), ref: 6BE1EE9D
                                  • EmptyClipboard.USER32 ref: 6BE1EEDB
                                  • SetClipboardData.USER32(00000002,00000000), ref: 6BE1EEFF
                                  • CloseClipboard.USER32 ref: 6BE1EF19
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Clipboard$CompatibleCreate$BitmapCloseDataEmptyFillH_prolog3H_prolog3_catch_ObjectOpenRectSelectWindow
                                  • String ID:
                                  • API String ID: 2940850299-0
                                  • Opcode ID: dea62451f0efd61f6d0ba0b496d24c2f561693ca0fce02b2a2e626c3d2083a4c
                                  • Instruction ID: fb9803bdec8498972a791025db14c416ea31af8730090605a609dd9b13608d0a
                                  • Opcode Fuzzy Hash: dea62451f0efd61f6d0ba0b496d24c2f561693ca0fce02b2a2e626c3d2083a4c
                                  • Instruction Fuzzy Hash: 2F414A72D14119AFCB04DBF4CD56ADDBB78AF19728F204119E412BA6A0DB789A09CB70
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDE7D79
                                  • PathIsUNCW.SHLWAPI(?,?,?,?,6BE19BF2,00000024,?,?,?), ref: 6BDE7E29
                                  • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000,?,6BE19BF2,00000024,?,?,?), ref: 6BDE7E4D
                                  • GetFullPathNameW.KERNEL32(?,00000104,?,?,00000268,6BDE7BEB,?,?,00000000,?,6BE19BF2,00000024,?,?,?), ref: 6BDE7DAC
                                    • Part of subcall function 6BDE7D2D: GetLastError.KERNEL32(?,?,?,6BDE7E5E,?,?,?,6BE19BF2,00000024,?,?,?), ref: 6BDE7D39
                                    • Part of subcall function 6BDE7C62: PathStripToRootW.SHLWAPI(00000000,?,?,6BE19BF2,00000024,?,?,?), ref: 6BDE7C96
                                  • CharUpperW.USER32(?,?,6BE19BF2,00000024,?,?,?), ref: 6BDE7E7B
                                  • FindFirstFileW.KERNEL32(?,?,?,6BE19BF2,00000024,?,?,?), ref: 6BDE7E93
                                  • FindClose.KERNEL32(00000000,?,6BE19BF2,00000024,?,?,?), ref: 6BDE7E9F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Path$Find$CharCloseErrorFileFirstFullH_prolog3_InformationLastNameRootStripUpperVolume
                                  • String ID:
                                  • API String ID: 2323451338-0
                                  • Opcode ID: fc9f94dd186fb1b65f15184705e414426eb5ea3c14f502818dec55dbc3b839a6
                                  • Instruction ID: c05aaa2349ee6d39a4b412a4265a484ddec2de516fb33668701ba768144705b3
                                  • Opcode Fuzzy Hash: fc9f94dd186fb1b65f15184705e414426eb5ea3c14f502818dec55dbc3b839a6
                                  • Instruction Fuzzy Hash: 874193B1514106FBEB54AB74CC89BAE737CFF00738F100699E4199A151EB39DE46CA31
                                  APIs
                                  • GetAsyncKeyState.USER32(00000012), ref: 6BDF0E9A
                                  • GetAsyncKeyState.USER32(00000012), ref: 6BDF0EB8
                                  • GetKeyboardState.USER32(?), ref: 6BDF0EEA
                                  • GetKeyboardLayout.USER32(?), ref: 6BDF0EFD
                                  • MapVirtualKeyW.USER32(?,00000000), ref: 6BDF0F08
                                  • ToUnicodeEx.USER32(?,00000000,?,?,00000002,00000001,00000000), ref: 6BDF0F23
                                  • CharUpperW.USER32(?), ref: 6BDF0F39
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: State$AsyncKeyboard$CharLayoutUnicodeUpperVirtual
                                  • String ID:
                                  • API String ID: 298839909-0
                                  • Opcode ID: fbad5bb2794fdf51ae65189bf2a4b5815b6238953ff1f8eda5b9f914b57ddeb4
                                  • Instruction ID: 4b5e37c3d2d0c12fec982462612619f7c6d6a0e8b5b30a8c7a5dc3e0ef511fa0
                                  • Opcode Fuzzy Hash: fbad5bb2794fdf51ae65189bf2a4b5815b6238953ff1f8eda5b9f914b57ddeb4
                                  • Instruction Fuzzy Hash: 824147326091099BCB109F20C805FEE777DEF557A0F0140AAF946EB150DB78D946C7E0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: __floor_pentium4
                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                  • API String ID: 4168288129-2761157908
                                  • Opcode ID: 3aeefd770db02e91fd0043166ad8bb332eeb32f9d68a17363af91e72a9cf7c4c
                                  • Instruction ID: bc5f5c43a054267548c0970843f7e52a49674e0af5ca284ef812c5508f12338d
                                  • Opcode Fuzzy Hash: 3aeefd770db02e91fd0043166ad8bb332eeb32f9d68a17363af91e72a9cf7c4c
                                  • Instruction Fuzzy Hash: 5BD25C72E082299FDB64CE28CD507DAB7B5EB45305F1441EAE40DE7260EB78AE81DF41
                                  APIs
                                  • GetWindowRect.USER32(?,?), ref: 6BDB8B9B
                                  • EqualRect.USER32(?,00000000), ref: 6BDB8BB9
                                    • Part of subcall function 6BDBB9D8: SetWindowPos.USER32(?,00000115,00000000,00000000,00000002,00000002,00000000,?,?,6BDB906B,00000000,00000002,00000002,00000000,00000000,00000115), ref: 6BDBBA00
                                  • IsWindowVisible.USER32(?), ref: 6BDB8C74
                                  • CopyRect.USER32(?,?), ref: 6BDB8CB4
                                  • GetParent.USER32(?), ref: 6BDB8D96
                                  • SetParent.USER32(?,?), ref: 6BDB8DAC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: RectWindow$Parent$CopyEqualVisible
                                  • String ID:
                                  • API String ID: 3103310903-0
                                  • Opcode ID: e08c591b87959cbb939c9d4bbecdecd32f86d284298650cc8cde75eee7a0ce86
                                  • Instruction ID: f2e29d8876680a2f2fd5b33dc18671ac6aacd45fe1ab1559f5a452be61a17965
                                  • Opcode Fuzzy Hash: e08c591b87959cbb939c9d4bbecdecd32f86d284298650cc8cde75eee7a0ce86
                                  • Instruction Fuzzy Hash: 8D81B6B1A00619EBDF149F34CC99BAAB775FF14324F1002A9E91B9B190DB399E44CF60
                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 004315DC
                                  • memset.VCRUNTIME140(?,00000000,00000003), ref: 00431602
                                  • memset.VCRUNTIME140(?,00000000,00000050), ref: 0043168C
                                  • IsDebuggerPresent.KERNEL32 ref: 004316A8
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004316C8
                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 004316D2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1782592592.0000000000431000.00000020.00000001.01000000.00000005.sdmp, Offset: 00430000, based on PE: true
                                  • Associated: 00000003.00000002.1782575451.0000000000430000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782606665.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782621103.0000000000433000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000434000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_430000_Update.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandledmemset$DebuggerFeatureProcessor
                                  • String ID:
                                  • API String ID: 1045392073-0
                                  • Opcode ID: 7834b537cf13ac7a9f6d60b481f43d32371d7b976f9a5a12a1512848c7099468
                                  • Instruction ID: 57d119f6f4c7e018d9e3608e1937dc2dbb197d0dae00682d77756081bdddf184
                                  • Opcode Fuzzy Hash: 7834b537cf13ac7a9f6d60b481f43d32371d7b976f9a5a12a1512848c7099468
                                  • Instruction Fuzzy Hash: 1A311C75D0121C9BDB21DFA4D9897CDBBF8AF08304F1051EAE509A7250EB755A84CF58
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(?,2000000B,6BF0570B,00000002,00000000,?,?,?,6BF0570B,?,00000000), ref: 6BF05DD3
                                  • GetLocaleInfoW.KERNEL32(?,20001004,6BF0570B,00000002,00000000,?,?,?,6BF0570B,?,00000000), ref: 6BF05DFC
                                  • GetACP.KERNEL32(?,?,6BF0570B,?,00000000), ref: 6BF05E11
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: ACP$OCP
                                  • API String ID: 2299586839-711371036
                                  • Opcode ID: 5bf1e3fbd5f623c1fc1af425c734f8e924caf0bf45177986b86fa10754d1e657
                                  • Instruction ID: 86efb72b0d39f644e461f15350ee51a638de9f1c99b3e4ed96bba10a5ba575d8
                                  • Opcode Fuzzy Hash: 5bf1e3fbd5f623c1fc1af425c734f8e924caf0bf45177986b86fa10754d1e657
                                  • Instruction Fuzzy Hash: BC21D833A49100EAEB108B54C9A8B8773BBEF54F50B4280A5EB45CB134EFB6DD40D750
                                  APIs
                                  • GetClientRect.USER32(?,?), ref: 6BDA4251
                                  • InflateRect.USER32(?,?,?), ref: 6BDA426D
                                  • BeginDeferWindowPos.USER32(?), ref: 6BDA42E1
                                  • InvalidateRect.USER32(?,00000000,00000001,00000018,00000008,00000000,0000EA20), ref: 6BDA4350
                                  • EndDeferWindowPos.USER32(00000000), ref: 6BDA454E
                                    • Part of subcall function 6BDBB7F7: GetDlgItem.USER32(?,?), ref: 6BDBB808
                                    • Part of subcall function 6BDA5F4B: GetClientRect.USER32(?,?), ref: 6BDA5F6D
                                    • Part of subcall function 6BDA5F4B: GetParent.USER32(?), ref: 6BDA5F86
                                    • Part of subcall function 6BDA5F4B: GetClientRect.USER32(?,?), ref: 6BDA5FB5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Client$DeferWindow$BeginInflateInvalidateItemParent
                                  • String ID:
                                  • API String ID: 939197390-0
                                  • Opcode ID: 662895989575955c857e6fe246e98e5d0047be32abcedd729f561f33c2795fe4
                                  • Instruction ID: 3519a0c9ec615125ad83a57cce96defe19ff907580ebb3ee219cc021eb701046
                                  • Opcode Fuzzy Hash: 662895989575955c857e6fe246e98e5d0047be32abcedd729f561f33c2795fe4
                                  • Instruction Fuzzy Hash: 93B11771E0064AEFDB05CFA8C890BADFBB9FF48314F104129E519AB250DB74A955CF90
                                  APIs
                                    • Part of subcall function 6BEF91E3: GetLastError.KERNEL32(?,?,6BEF5D32,?,6BD75477), ref: 6BEF91E7
                                    • Part of subcall function 6BEF91E3: SetLastError.KERNEL32(00000000,?,6BD75477), ref: 6BEF9289
                                  • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 6BF056DD
                                  • IsValidCodePage.KERNEL32(00000000), ref: 6BF0571B
                                  • IsValidLocale.KERNEL32(?,00000001), ref: 6BF0572E
                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 6BF05776
                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 6BF05791
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                  • String ID:
                                  • API String ID: 415426439-0
                                  • Opcode ID: 72529d76c7291c30bf256261d9d154a42ad08ae067be4ebbcfd5d46cc204f3ed
                                  • Instruction ID: 0651d40eb2d41879e96a821431673b8ae588ba82f2ac8b0d8027adc2f6caaaf1
                                  • Opcode Fuzzy Hash: 72529d76c7291c30bf256261d9d154a42ad08ae067be4ebbcfd5d46cc204f3ed
                                  • Instruction Fuzzy Hash: 1D518173A11209EBEF10DFA5CC91BAA77B9EF05704F104469EA10EB170EBB8D544DB60
                                  APIs
                                  • GetWindowRect.USER32(?,?), ref: 6BDA8264
                                    • Part of subcall function 6BDBB9D8: SetWindowPos.USER32(?,00000115,00000000,00000000,00000002,00000002,00000000,?,?,6BDB906B,00000000,00000002,00000002,00000000,00000000,00000115), ref: 6BDBBA00
                                  • SetRectEmpty.USER32(?), ref: 6BDA82F2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: RectWindow$Empty
                                  • String ID: @
                                  • API String ID: 650961088-2766056989
                                  • Opcode ID: 9d1310513ef8b5db3a7c382b338237ff1c38c00ba576c33e7b6c04ce4c945b74
                                  • Instruction ID: aeeb5c99534dedd22e8a05dfb0e84ec8cad1d17ab141f653814b3b5e0290be2a
                                  • Opcode Fuzzy Hash: 9d1310513ef8b5db3a7c382b338237ff1c38c00ba576c33e7b6c04ce4c945b74
                                  • Instruction Fuzzy Hash: C2E13A71E00219DFDB04CFA8C995AEEBBB5FF49320F14416AE815BB350DB35A941CB64
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3aeab8a016dfc0029dc42923af8b0f5f0589c612216399bfcb611bcd9c829c81
                                  • Instruction ID: b11789e60ed18eaffd9b89a64ef3dd5b937848e0120a2ffc2b18f3e1b74cd11b
                                  • Opcode Fuzzy Hash: 3aeab8a016dfc0029dc42923af8b0f5f0589c612216399bfcb611bcd9c829c81
                                  • Instruction Fuzzy Hash: 2A025E75E002199FDB14CFA9D88069EFBF1FF48318F2482A9D519EB341D735A942CBA0
                                  APIs
                                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6BEFEE7C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: FileFindFirst
                                  • String ID:
                                  • API String ID: 1974802433-0
                                  • Opcode ID: e7fa47eab6245ac1fa6d2bd28dc48f04bc4ad438e0b1d506c92626d50004f9d2
                                  • Instruction ID: 9663de354fce5569bfb7f48b2252a7f517dfb0d226a73989b731b6474ea1e043
                                  • Opcode Fuzzy Hash: e7fa47eab6245ac1fa6d2bd28dc48f04bc4ad438e0b1d506c92626d50004f9d2
                                  • Instruction Fuzzy Hash: 38711572C155589FDF209F38DC89AAAB7BDEB05308F2041DDE01DA7210DB39AE969F50
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Parent$H_prolog3Iconic
                                  • String ID:
                                  • API String ID: 881905488-0
                                  • Opcode ID: ce3aeb5639715cfb5b318f240099126b1bbd52bcfac7fc5620a535ab7396dd4e
                                  • Instruction ID: 9b25dc968855b49c7ceccbf4ebf2e10424e4e838be177472ed3fbc4abd59fe1b
                                  • Opcode Fuzzy Hash: ce3aeb5639715cfb5b318f240099126b1bbd52bcfac7fc5620a535ab7396dd4e
                                  • Instruction Fuzzy Hash: 46218136900205EBCF015F74C805B5F7B6ABF45778F004568FD569F124DB39DA11AB61
                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(00000017,00000001), ref: 6BDBD242
                                  • IsDebuggerPresent.KERNEL32 ref: 6BDBD30E
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6BDBD327
                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 6BDBD331
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                  • String ID:
                                  • API String ID: 254469556-0
                                  • Opcode ID: 92a61ed3ff4011c5d1c238a3c73e6259ef6d3c3fc5981040638140871ba17624
                                  • Instruction ID: 95b4a71c1562a94a7477261781690388a254b2ce32a5cf97de861f6433432cf1
                                  • Opcode Fuzzy Hash: 92a61ed3ff4011c5d1c238a3c73e6259ef6d3c3fc5981040638140871ba17624
                                  • Instruction Fuzzy Hash: A13103B5D01218ABDF20DFA4D9497CDBBB8AF08304F1041EAE40DAB250EB759A84DF45
                                  APIs
                                    • Part of subcall function 6BDBB682: GetWindowLongW.USER32(458BF84D,000000F0), ref: 6BDBB68F
                                  • GetKeyState.USER32(00000010), ref: 6BDACD1B
                                  • GetKeyState.USER32(00000011), ref: 6BDACD28
                                  • GetKeyState.USER32(00000012), ref: 6BDACD35
                                  • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 6BDACD4F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: State$LongMessageSendWindow
                                  • String ID:
                                  • API String ID: 1063413437-0
                                  • Opcode ID: b8a20ce920deddb60b4f5b296fca7730a219805f37266cfaabc8cb7e6bb3fd5b
                                  • Instruction ID: f293c46d1142a2b27c67c20a2a8ff4b1e4556cd7e3c60cc486f345377d318b6f
                                  • Opcode Fuzzy Hash: b8a20ce920deddb60b4f5b296fca7730a219805f37266cfaabc8cb7e6bb3fd5b
                                  • Instruction Fuzzy Hash: 18F0B43276026957ED102B31CC05BAA7E24AB61BB9F040525A64BFD1E0CF98C50191A0
                                  APIs
                                  • CryptStringToBinaryA.CRYPT32 ref: 6BD7FE00
                                  • CryptStringToBinaryA.CRYPT32 ref: 6BD7FEA7
                                    • Part of subcall function 6BEE1DA1: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,?,?,?,6BD764E3,?,?,?,?,6BD763C6), ref: 6BEE1E02
                                  Strings
                                  • Failed to calculate base64 decoded size., xrefs: 6BD7FE15
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: BinaryCryptString$ExceptionRaise
                                  • String ID: Failed to calculate base64 decoded size.
                                  • API String ID: 754323452-3365390155
                                  • Opcode ID: 78cfac82fb8060d75cac9faed9b933075352da7b0aa6865a7b15524f6ca432d8
                                  • Instruction ID: f7e4c44d22c23668366ddd5ee81563a1ad0ab215bab6bc3d3d84af5fb7ffaaef
                                  • Opcode Fuzzy Hash: 78cfac82fb8060d75cac9faed9b933075352da7b0aa6865a7b15524f6ca432d8
                                  • Instruction Fuzzy Hash: 74412CB59043488FCB14EFA8D5557DEBBF0BF48314F10852DD849AB350E7389A49CBA2
                                  APIs
                                  • OutputDebugStringA.KERNEL32(IsolationAware function called after IsolationAwareCleanup,0000007C,?,6BDAA257,?,6BF62380,00000010,6BDAF2FD,?), ref: 6BDA0ADC
                                  • GetLastError.KERNEL32(6BDAF2FD,0000007C,?,6BDAA257,?,6BF62380,00000010,6BDAF2FD,?), ref: 6BDA0B13
                                    • Part of subcall function 6BDA0CEA: GetModuleFileNameW.KERNEL32(?,?,00000105,?,6BDAA257,?,6BF62380,00000010,6BDAF2FD,?), ref: 6BDA0D9A
                                    • Part of subcall function 6BDA0CEA: SetLastError.KERNEL32(0000006F,?,6BDAA257,?,6BF62380,00000010,6BDAF2FD,?), ref: 6BDA0DAE
                                  Strings
                                  • IsolationAware function called after IsolationAwareCleanup, xrefs: 6BDA0AD7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ErrorLast$DebugFileModuleNameOutputString
                                  • String ID: IsolationAware function called after IsolationAwareCleanup
                                  • API String ID: 3265401609-2690750368
                                  • Opcode ID: 3418214835f47af046d0a8abc8fa9982633a8ec8f9251397d151fe6d4abc4f77
                                  • Instruction ID: 703c6c885e9d7e30f4c1f91101987a2447ab715cafe57b987c0c3659b2a936ee
                                  • Opcode Fuzzy Hash: 3418214835f47af046d0a8abc8fa9982633a8ec8f9251397d151fe6d4abc4f77
                                  • Instruction Fuzzy Hash: 8EF0C232616230DB5F140BBCDA4076A379EAA06BF976004BAFA11C95A0D73CE444E7E2
                                  APIs
                                    • Part of subcall function 6BEF91E3: GetLastError.KERNEL32(?,?,6BEF5D32,?,6BD75477), ref: 6BEF91E7
                                    • Part of subcall function 6BEF91E3: SetLastError.KERNEL32(00000000,?,6BD75477), ref: 6BEF9289
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6BF05915
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6BF0595F
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6BF05A25
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: InfoLocale$ErrorLast
                                  • String ID:
                                  • API String ID: 661929714-0
                                  • Opcode ID: 717c6a12ea0952d8515abe9dde5ea168794fed453fdb5160d93cff8d43dd1dd0
                                  • Instruction ID: b3f7f834ae8092ad72e0a10bdf0fe65b8739497b0c66de851e414e16f585a52c
                                  • Opcode Fuzzy Hash: 717c6a12ea0952d8515abe9dde5ea168794fed453fdb5160d93cff8d43dd1dd0
                                  • Instruction Fuzzy Hash: D761A472A501179FEB148F28CCD2B6AB7B8EF04714F1041BAEA15C65A0EFBCD941EB50
                                  APIs
                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 6BEF1AD0
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 6BEF1ADA
                                  • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 6BEF1AE7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                  • String ID:
                                  • API String ID: 3906539128-0
                                  • Opcode ID: 2d2c7be56cf683413eca662b2e48e4d55058a666cc0a5af75aa69d53c0f6593c
                                  • Instruction ID: 4fa7e6fda36675b236feaa65186ab179b9306b8dba53867174daeff17c6c427b
                                  • Opcode Fuzzy Hash: 2d2c7be56cf683413eca662b2e48e4d55058a666cc0a5af75aa69d53c0f6593c
                                  • Instruction Fuzzy Hash: F931C2B590122CABCB21DF64D9887CCBBB8BF08314F6041EAE41DA7250E7749B85CF55
                                  APIs
                                  • FindResourceW.KERNEL32(?,?,000000F0), ref: 6BDAAA3B
                                  • LoadResource.KERNEL32(?,00000000), ref: 6BDAAA47
                                  • LockResource.KERNEL32(00000000), ref: 6BDAAA52
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Resource$FindLoadLock
                                  • String ID:
                                  • API String ID: 2752051264-0
                                  • Opcode ID: ce53b844272480cab58a748381674cafbee5a82c703b41a4696c1c1373ba906b
                                  • Instruction ID: 7c74aa4f078f97e8c74039cca553d1447269017427b03092e9d60c7ff3da5c59
                                  • Opcode Fuzzy Hash: ce53b844272480cab58a748381674cafbee5a82c703b41a4696c1c1373ba906b
                                  • Instruction Fuzzy Hash: B0E03072210215BBAA015B60DD48A7A77ACEB95B75700813AF902DB141DB78D844A6B8
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: H_prolog3
                                  • String ID:
                                  • API String ID: 431132790-0
                                  • Opcode ID: 10dfac16e62d8d7cacf3b782ed3532103b8788772eb0b9a544d0059f8523d067
                                  • Instruction ID: 5b22e4b20cda8de6365e14fa0f2b0bc960956924cdbb6a1c342f53e5afa02683
                                  • Opcode Fuzzy Hash: 10dfac16e62d8d7cacf3b782ed3532103b8788772eb0b9a544d0059f8523d067
                                  • Instruction Fuzzy Hash: D0E19D70A44219DFDF08CF68C890BAEB7B5BF45724F1044A9EC55AF2A0DB38EA41DB51
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: IconicVisibleWindow
                                  • String ID:
                                  • API String ID: 1797901696-0
                                  • Opcode ID: c2e13cdf97fae7c33601cc797bb964520fddc7fc841a3302e54a47b12a680106
                                  • Instruction ID: 6603b667edcce8ddb37323d71924fabd898f9e2371681c7fd9140f381a466a5f
                                  • Opcode Fuzzy Hash: c2e13cdf97fae7c33601cc797bb964520fddc7fc841a3302e54a47b12a680106
                                  • Instruction Fuzzy Hash: 69F02E73B1042067C504573DCC449AE765DEF8B7747040236EEA7971E0DBB4DC5516D1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: IconicVisibleWindow
                                  • String ID:
                                  • API String ID: 1797901696-0
                                  • Opcode ID: cff6b7b346134cd4cdea02b46d5ee37b98396fd137a7a08eb6879a9d961d1871
                                  • Instruction ID: e4d6c8daeae9e5ba56cfacd25c5252344c12a2dc43065133f192ac639876c0b1
                                  • Opcode Fuzzy Hash: cff6b7b346134cd4cdea02b46d5ee37b98396fd137a7a08eb6879a9d961d1871
                                  • Instruction Fuzzy Hash: 4AE01233720112EBDF051B39D848BADB775FF9976130401B6E84AC7674EB64DC91AB80
                                  APIs
                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6BEF00C1,?,?,00000008,?,?,6BF0965B,00000000), ref: 6BEF0393
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ExceptionRaise
                                  • String ID:
                                  • API String ID: 3997070919-0
                                  • Opcode ID: 6f67e8bbd85968416f5b833da1bbe864e6ba198295fcf3717017e08af3ffda29
                                  • Instruction ID: 9a3bfd4b13a60b8c0655f8cc1b0f061a47d4df13e2e32372af7c5f324a769ab9
                                  • Opcode Fuzzy Hash: 6f67e8bbd85968416f5b833da1bbe864e6ba198295fcf3717017e08af3ffda29
                                  • Instruction Fuzzy Hash: FDB14D31610608DFE705CF28C486B557BE5FF45369F258698E8A9CF3A2C339E992CB40
                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6BDBCF0B
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: FeaturePresentProcessor
                                  • String ID:
                                  • API String ID: 2325560087-0
                                  • Opcode ID: d2ec3b39007c265c0733164f5c1279958d0e0a03f70e09121f29764766968722
                                  • Instruction ID: 8248ba47258d7986064d5c573e50cb1db95cc44f6155c239a1a90ac14cc645ec
                                  • Opcode Fuzzy Hash: d2ec3b39007c265c0733164f5c1279958d0e0a03f70e09121f29764766968722
                                  • Instruction Fuzzy Hash: C8A177B1965725DFDB04CF65D881B9ABBB0FB4A320F2481AED416EB2A0C779E444CF50
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6BD9B512
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: f0ae870bc020179dbd78eb0fffb1ac2718a596a4b4c2647d6d170571460eccb5
                                  • Instruction ID: c1dc30901c8c89051c5158af5d525fed58b2995578c2deab5040053bdc3ac07a
                                  • Opcode Fuzzy Hash: f0ae870bc020179dbd78eb0fffb1ac2718a596a4b4c2647d6d170571460eccb5
                                  • Instruction Fuzzy Hash: A891D5B4E046199FCB44DFBCC88169EBBF1BF49320F24861AE865EB3D0D334A9408B55
                                  APIs
                                    • Part of subcall function 6BEFC2A8: RtlAllocateHeap.NTDLL(00000008,2]k,?,?,6BEF9230,00000001,00000364,?,FFFFFFFF,000000FF,?,?,6BEF5D32,?,6BD75477), ref: 6BEFC2E9
                                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6BEFEE7C
                                  • FindNextFileW.KERNEL32(00000000,?), ref: 6BEFEF70
                                  • FindClose.KERNEL32(00000000), ref: 6BEFEFAF
                                  • FindClose.KERNEL32(00000000), ref: 6BEFEFE2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Find$CloseFile$AllocateFirstHeapNext
                                  • String ID:
                                  • API String ID: 4087847297-0
                                  • Opcode ID: fa366c4bf99f560b8bf8b0cbbd944676374c90c571b4a0d059783255c2ba7275
                                  • Instruction ID: 4bf914022380daecfd51afa1ba348c54bd3b398bb60f8238d1c34d304afb1b56
                                  • Opcode Fuzzy Hash: fa366c4bf99f560b8bf8b0cbbd944676374c90c571b4a0d059783255c2ba7275
                                  • Instruction Fuzzy Hash: 66513476904518AFDB108F389C85ABE77BEEF85218F2041EDE41D97300EB39AD579B60
                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 004318BA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1782592592.0000000000431000.00000020.00000001.01000000.00000005.sdmp, Offset: 00430000, based on PE: true
                                  • Associated: 00000003.00000002.1782575451.0000000000430000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782606665.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782621103.0000000000433000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000434000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_430000_Update.jbxd
                                  Similarity
                                  • API ID: FeaturePresentProcessor
                                  • String ID:
                                  • API String ID: 2325560087-0
                                  • Opcode ID: 2bc5575418e7a3c740df576ab782e6aee14ef6cf337efd6df1967b2109ddf0d7
                                  • Instruction ID: 04d7ea4925bf26a946647bce984136b138750cf928fe8059d1aefb6938e1bcdf
                                  • Opcode Fuzzy Hash: 2bc5575418e7a3c740df576ab782e6aee14ef6cf337efd6df1967b2109ddf0d7
                                  • Instruction Fuzzy Hash: E7519CB1E016058BEB28CF55D9817AEBBF0FB48311F14957AC455EB364D3799E00CB58
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 0
                                  • API String ID: 0-4108050209
                                  • Opcode ID: ec78aab19caa654098ca6182a9b60bb1dc442926fe1a726d4c5da7b8420d7f09
                                  • Instruction ID: 98e2ff0c89359f9d505a3fbe044d1301954303b123abaf2a5c3b404f7eaee32d
                                  • Opcode Fuzzy Hash: ec78aab19caa654098ca6182a9b60bb1dc442926fe1a726d4c5da7b8420d7f09
                                  • Instruction Fuzzy Hash: 93C10130904A068FCB11CF68C58066ABBB1FF46318F30469DE66A97792C739E957CB71
                                  APIs
                                    • Part of subcall function 6BEF91E3: GetLastError.KERNEL32(?,?,6BEF5D32,?,6BD75477), ref: 6BEF91E7
                                    • Part of subcall function 6BEF91E3: SetLastError.KERNEL32(00000000,?,6BD75477), ref: 6BEF9289
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6BF05BC7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale
                                  • String ID:
                                  • API String ID: 3736152602-0
                                  • Opcode ID: b74785ed807489c950c4211402f3479c3eb762d81f30986ab9589a38a84f712c
                                  • Instruction ID: 40604adc505f99d2de3d9ea468c43520955cd9da92f25db29f2f5a23611504b2
                                  • Opcode Fuzzy Hash: b74785ed807489c950c4211402f3479c3eb762d81f30986ab9589a38a84f712c
                                  • Instruction Fuzzy Hash: C321A773A14206ABDB189F35DC91A6A77BCEF45714F1040BEEE05C6260EFB8E941DB50
                                  APIs
                                    • Part of subcall function 6BEF91E3: GetLastError.KERNEL32(?,?,6BEF5D32,?,6BD75477), ref: 6BEF91E7
                                    • Part of subcall function 6BEF91E3: SetLastError.KERNEL32(00000000,?,6BD75477), ref: 6BEF9289
                                  • EnumSystemLocalesW.KERNEL32(6BF058C1,00000001,00000000,?,-00000050,?,6BF056B1,00000000,-00000002,00000000,?,00000055,?), ref: 6BF05898
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: f3d3eb8f86d0ca405ce2e259e867ec160743912437a72152331e762cd73c9705
                                  • Instruction ID: 07d9c84c94309064e042bd1c0045bf04ac9e2e3d6559cdd5279a7aa34ff6badf
                                  • Opcode Fuzzy Hash: f3d3eb8f86d0ca405ce2e259e867ec160743912437a72152331e762cd73c9705
                                  • Instruction Fuzzy Hash: 0611293B6083059FDB089F38C8E166ABBE5FF80358B14442CDE4747A20D7B5B542DB40
                                  APIs
                                    • Part of subcall function 6BEF91E3: GetLastError.KERNEL32(?,?,6BEF5D32,?,6BD75477), ref: 6BEF91E7
                                    • Part of subcall function 6BEF91E3: SetLastError.KERNEL32(00000000,?,6BD75477), ref: 6BEF9289
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6BF05CE7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale
                                  • String ID:
                                  • API String ID: 3736152602-0
                                  • Opcode ID: e51df242451f89af1b827a9a15325a3f76637932c5a5d154d9d40ecac8b2a53a
                                  • Instruction ID: 05a00ff2f92896dd24c7f6f4d9e0a15ba030f4a559efe55360760193954a8ae8
                                  • Opcode Fuzzy Hash: e51df242451f89af1b827a9a15325a3f76637932c5a5d154d9d40ecac8b2a53a
                                  • Instruction Fuzzy Hash: 85110677A11107ABDB149F38DC96AAA77ACEF05314B2040BEE602C7160EFBCE9059750
                                  APIs
                                    • Part of subcall function 6BEF91E3: GetLastError.KERNEL32(?,?,6BEF5D32,?,6BD75477), ref: 6BEF91E7
                                    • Part of subcall function 6BEF91E3: SetLastError.KERNEL32(00000000,?,6BD75477), ref: 6BEF9289
                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,6BF05ADD,00000000,00000000,?), ref: 6BF05E6C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale
                                  • String ID:
                                  • API String ID: 3736152602-0
                                  • Opcode ID: e636cc7d3b7dfb826f43532b420c2743fbffb36663defa65f46f1441a72bd22a
                                  • Instruction ID: 45bc2641c6ba6d1aba77223c34fc0b129faaba02d64728cebc51a9df7ab1a37c
                                  • Opcode Fuzzy Hash: e636cc7d3b7dfb826f43532b420c2743fbffb36663defa65f46f1441a72bd22a
                                  • Instruction Fuzzy Hash: B5012633A10112AFDB188A748CA5BBB7768EF40754F114478EE96A31A0EFB8FD41D690
                                  APIs
                                    • Part of subcall function 6BEF91E3: GetLastError.KERNEL32(?,?,6BEF5D32,?,6BD75477), ref: 6BEF91E7
                                    • Part of subcall function 6BEF91E3: SetLastError.KERNEL32(00000000,?,6BD75477), ref: 6BEF9289
                                  • EnumSystemLocalesW.KERNEL32(6BF05B73,00000001,?,?,-00000050,?,6BF05679,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 6BF05B5E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: 9cc53385f035796a020d92690d537e268aa57a16ea1072be50492ec76d7c5d70
                                  • Instruction ID: cc5cb8858bef93bc25dd8e3bdc8c110cdd50a5920f63128a32a30de7f849f96d
                                  • Opcode Fuzzy Hash: 9cc53385f035796a020d92690d537e268aa57a16ea1072be50492ec76d7c5d70
                                  • Instruction Fuzzy Hash: 94F046772043041FDB145F359CD0B6A7B94EF80368F15446CEA014B6B0DBF9E842E750
                                  APIs
                                    • Part of subcall function 6BEF206C: EnterCriticalSection.KERNEL32(?,?,6BEF969C,?,6BF6FAB0,00000008,6BEF958E,?,?,?), ref: 6BEF207B
                                  • EnumSystemLocalesW.KERNEL32(6BEFB79E,00000001,6BF6FB90,0000000C,6BEFB088,-00000050), ref: 6BEFB7E3
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                  • String ID:
                                  • API String ID: 1272433827-0
                                  • Opcode ID: 5ce8d72f5188a0e354d53698f16351d14e40557df291d2a080c220bd72891379
                                  • Instruction ID: 2fb614be8cd517371b2a12f60bb50d55170137a27a22f548bede4715c3046c7a
                                  • Opcode Fuzzy Hash: 5ce8d72f5188a0e354d53698f16351d14e40557df291d2a080c220bd72891379
                                  • Instruction Fuzzy Hash: A8F04976A10210EFDB10CFA8E446B9D7BF0FB49725F20916AE415DB2A0DB7A9909CF50
                                  APIs
                                    • Part of subcall function 6BEF91E3: GetLastError.KERNEL32(?,?,6BEF5D32,?,6BD75477), ref: 6BEF91E7
                                    • Part of subcall function 6BEF91E3: SetLastError.KERNEL32(00000000,?,6BD75477), ref: 6BEF9289
                                  • EnumSystemLocalesW.KERNEL32(6BF05C93,00000001,?,?,?,6BF056D3,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 6BF05C7F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: dacc2842b11d6f7b22e842e25b19c383369a3e3cd1684517bcd1f92d6fea5d80
                                  • Instruction ID: 4b82d1a0786389637fbd6dd7c605d77810df0fdc2bfa6ee876a1cf0382cb6217
                                  • Opcode Fuzzy Hash: dacc2842b11d6f7b22e842e25b19c383369a3e3cd1684517bcd1f92d6fea5d80
                                  • Instruction Fuzzy Hash: 4DF05C3770020457CB049F35C8547667F94EFC1710B07409CEB058B160C7B5D543D790
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,6BEFAD6E,?,20001004,00000000,00000002,?,?,6BEF9C80), ref: 6BEFB1C0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: 9c356efe3fc8ff5fea8a086dc12f6108718445ef6d2fcc6876887469972b993d
                                  • Instruction ID: 3931e61ca7057c1be76f1285fd744382bfcfc6e49bcb467b8abebe642b7d9391
                                  • Opcode Fuzzy Hash: 9c356efe3fc8ff5fea8a086dc12f6108718445ef6d2fcc6876887469972b993d
                                  • Instruction Fuzzy Hash: 02E04F3294012CBBCF121F70DC08B9E3E2DEF45750F104014FC1566221DB75C9229B94
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Iconic
                                  • String ID:
                                  • API String ID: 110040809-0
                                  • Opcode ID: e314b119e3c99ae35221b70d32b078085d0e968aa83bb7f8cfc0eb0bb5f399f3
                                  • Instruction ID: 93420be4ee786ebe5e24085b0c58d7a6263ff7c21da78baba540c2078cd19fde
                                  • Opcode Fuzzy Hash: e314b119e3c99ae35221b70d32b078085d0e968aa83bb7f8cfc0eb0bb5f399f3
                                  • Instruction Fuzzy Hash: 92D01232624B61CBC7515B55F444BC273EEBB49739B1004AED0868A470D7E9E8C0DB41
                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00001770,004310D3), ref: 00431769
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1782592592.0000000000431000.00000020.00000001.01000000.00000005.sdmp, Offset: 00430000, based on PE: true
                                  • Associated: 00000003.00000002.1782575451.0000000000430000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782606665.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782621103.0000000000433000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000434000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_430000_Update.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: 7e37a0e1a77c79441b5f494bd9fe2ad14062cd0568695a3439c7a98765f51027
                                  • Instruction ID: cc732035894c425fe2e46955fa0af2bef4bd00a27741ad10150ebf476729df92
                                  • Opcode Fuzzy Hash: 7e37a0e1a77c79441b5f494bd9fe2ad14062cd0568695a3439c7a98765f51027
                                  • Instruction Fuzzy Hash:
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: "
                                  • API String ID: 0-123907689
                                  • Opcode ID: 57b569de983a09754c94dcf55c5223a1ecc920047799b49ae8e10de60dc1e462
                                  • Instruction ID: 4e13259a70b939bd28776f4ac107fdff8f08bb643f88dad337cb4c8681087c66
                                  • Opcode Fuzzy Hash: 57b569de983a09754c94dcf55c5223a1ecc920047799b49ae8e10de60dc1e462
                                  • Instruction Fuzzy Hash: D2510AB5D04258DFCF00DFA8D5856DEBBF0AF1A324F20515AE864AB390C3396A49DB61
                                  APIs
                                    • Part of subcall function 6BDA004B: AcquireSRWLockExclusive.KERNEL32(6BF76068,?,?,?,6BD776C2,6BD77619,?,?,6BD7741E,?), ref: 6BDA0056
                                    • Part of subcall function 6BDA004B: ReleaseSRWLockExclusive.KERNEL32(6BF76068,?,6BD776C2,6BD77619,?,?,6BD7741E,?), ref: 6BDA0090
                                  • GetProcessHeap.KERNEL32(?,?,?,?,?,?,6BD716B4), ref: 6BD725F5
                                    • Part of subcall function 6BDA009A: AcquireSRWLockExclusive.KERNEL32(6BF76068,?,?,6BD776F2,6BD77619,?,?,6BD7741E,?), ref: 6BDA00A4
                                    • Part of subcall function 6BDA009A: ReleaseSRWLockExclusive.KERNEL32(6BF76068,?,6BD776F2,6BD77619,?,?,6BD7741E,?), ref: 6BDA00D7
                                    • Part of subcall function 6BDA009A: WakeAllConditionVariable.KERNEL32(6BF76064,?,6BD776F2,6BD77619,?,?,6BD7741E,?), ref: 6BDA00E2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ExclusiveLock$AcquireRelease$ConditionHeapProcessVariableWake
                                  • String ID:
                                  • API String ID: 1755742941-0
                                  • Opcode ID: fe18562908f6e0645254be3ac7a34fb391f750a949ba10191c133c390797686a
                                  • Instruction ID: dbcd4c0e55466276d6179c958e69391f486339c66e2ed493eb9e4a7889e40ae1
                                  • Opcode Fuzzy Hash: fe18562908f6e0645254be3ac7a34fb391f750a949ba10191c133c390797686a
                                  • Instruction Fuzzy Hash: 49310675914294CFCF10EF78D180A9DBBB5FB0A368F4044BAC9949B360D739E649CB22
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 470ad489d1007bd007ca715e195201b18afefa5917549b3a015bff42ec42a1ac
                                  • Instruction ID: 16c016adc958a6242d7be6665282ac09a08c0433593172d1a2c582482b0440cd
                                  • Opcode Fuzzy Hash: 470ad489d1007bd007ca715e195201b18afefa5917549b3a015bff42ec42a1ac
                                  • Instruction Fuzzy Hash: 7652CE79604B40CFC365DF38C591BD6BBE1AB4A320F048A5EE5EA8B7A1D634B940DF50
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bebdad33da28c49fa08a99ed359846b16f3fc4aea284608b21fedddc6808e164
                                  • Instruction ID: 3a8dca0175ca2cf43d46f0468e40b92674afc15a72a0c64ba15df445f66b2d98
                                  • Opcode Fuzzy Hash: bebdad33da28c49fa08a99ed359846b16f3fc4aea284608b21fedddc6808e164
                                  • Instruction Fuzzy Hash: B0F1C77560D381CFD360DF28D441B8EBBE1AB8A324F148A2EE9E997391D7349945CB13
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ebda52cca2b66c10768f24f7dff3cd2c41660a9e72025f165151d41b61d5cd34
                                  • Instruction ID: f8bf96a7eb108c22ff5798d56dfd45d14682cd6191c985d5a99a56458844e613
                                  • Opcode Fuzzy Hash: ebda52cca2b66c10768f24f7dff3cd2c41660a9e72025f165151d41b61d5cd34
                                  • Instruction Fuzzy Hash: 2E71E775E05289DFCB15CFACD9806DDBFF1AF0A324F1441A9E864EB391C2389A41DB25
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dcb111d49da4ca658234945b7a9510b6f1feb34640ac57bb13348b8b178b50d2
                                  • Instruction ID: 3345db88cb673ec3324db5809dc3277b61af5c0b948d2cd2a3c5a865924e3001
                                  • Opcode Fuzzy Hash: dcb111d49da4ca658234945b7a9510b6f1feb34640ac57bb13348b8b178b50d2
                                  • Instruction Fuzzy Hash: 4C516172D40119EFDB04CF99C850AEEBBB6FF88304F59849DD515AB301D738AA51CBA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction ID: 9d3a4b17205f11fdf99efb69e706bb3fb5ef3f5ee70cde3a2e32d9efc77c59fe
                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction Fuzzy Hash: 1C112B7724508343E6008D2DC8B06A6A795EBF932CF3943FAD0624F758D32BE177A924
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BE21E3D
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,6BF57A80,00000000,6BF57E58,00000000,6BF55250,00000000,?,?,00000A88,6BE242E9,?,00000000,00000038), ref: 6BE21EDC
                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,6BF55250,00000000,?,?,00000A88,6BE242E9,?,00000000,00000038), ref: 6BE21F8F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: File$CreateH_prolog3_ModuleName
                                  • String ID:
                                  • API String ID: 3408945735-3916222277
                                  • Opcode ID: 878838effc8a3ac26aa71420a6ffb4fce8157fb47361fbd91da4e1f2e98581e5
                                  • Instruction ID: 284ea499c51ad9a6b506c956b9c9fa2b6373e0efb142d7df03500d9a1bf9a93a
                                  • Opcode Fuzzy Hash: 878838effc8a3ac26aa71420a6ffb4fce8157fb47361fbd91da4e1f2e98581e5
                                  • Instruction Fuzzy Hash: CEC18F72A10218ABDF208F70CC44FAA77B8EF5A314F104199F91AE6550DB799F94CF62
                                  APIs
                                  • RegisterClipboardFormatW.USER32(Native), ref: 6BEE11B6
                                  • RegisterClipboardFormatW.USER32(OwnerLink), ref: 6BEE11C3
                                  • RegisterClipboardFormatW.USER32(ObjectLink), ref: 6BEE11D1
                                  • RegisterClipboardFormatW.USER32(Embedded Object), ref: 6BEE11DF
                                  • RegisterClipboardFormatW.USER32(Embed Source), ref: 6BEE11ED
                                  • RegisterClipboardFormatW.USER32(Link Source), ref: 6BEE11FB
                                  • RegisterClipboardFormatW.USER32(Object Descriptor), ref: 6BEE1209
                                  • RegisterClipboardFormatW.USER32(Link Source Descriptor), ref: 6BEE1217
                                  • RegisterClipboardFormatW.USER32(FileName), ref: 6BEE1225
                                  • RegisterClipboardFormatW.USER32(FileNameW), ref: 6BEE1233
                                  • RegisterClipboardFormatW.USER32(Rich Text Format), ref: 6BEE1241
                                  • RegisterClipboardFormatW.USER32(RichEdit Text and Objects), ref: 6BEE124F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ClipboardFormatRegister
                                  • String ID: Embed Source$Embedded Object$FileName$FileNameW$Link Source$Link Source Descriptor$Native$Object Descriptor$ObjectLink$OwnerLink$Rich Text Format$RichEdit Text and Objects
                                  • API String ID: 1228543026-2889995556
                                  • Opcode ID: 8a1dcf1af243e4f18097bebbff1da76db1bfb629f1ad62888b3f44036d6d602a
                                  • Instruction ID: 284531a10be075b96be37dcea8c46ef4ba920ed99781073b608d048342ece7e9
                                  • Opcode Fuzzy Hash: 8a1dcf1af243e4f18097bebbff1da76db1bfb629f1ad62888b3f44036d6d602a
                                  • Instruction Fuzzy Hash: 8C115C73811B409FCB24DFBD944C64A7EE0BA266063408D19E187C7534DB3AD4A5CF60
                                  APIs
                                    • Part of subcall function 6BDBB6AC: GetWindowLongW.USER32(?,000000EC), ref: 6BDBB6B9
                                  • GetClientRect.USER32(00000000,?), ref: 6BDDDA6F
                                  • CopyRect.USER32(?,?), ref: 6BDDDA9C
                                    • Part of subcall function 6BDA3B50: ScreenToClient.USER32(?,6BDB8FA1), ref: 6BDA3B5F
                                    • Part of subcall function 6BDA3B50: ScreenToClient.USER32(?,6BDB8FA9), ref: 6BDA3B6C
                                  • IntersectRect.USER32(?,?,?), ref: 6BDDDAEF
                                  • SetRectEmpty.USER32(?), ref: 6BDDDAFD
                                  • IntersectRect.USER32(?,?,?), ref: 6BDDDB26
                                  • SetRectEmpty.USER32(?), ref: 6BDDDB34
                                  • IsRectEmpty.USER32(?), ref: 6BDDDB3E
                                  • IsRectEmpty.USER32(?), ref: 6BDDDB4C
                                  • GetWindowRect.USER32(00000000,?), ref: 6BDDDB6E
                                  • GetWindowRect.USER32(00000000,?), ref: 6BDDDB91
                                  • UnionRect.USER32(?,?,?), ref: 6BDDDBAD
                                  • EqualRect.USER32(?,?), ref: 6BDDDBBB
                                  • GetWindowRect.USER32(00000000,?), ref: 6BDDDC4F
                                  • IsRectEmpty.USER32(?), ref: 6BDDDCB0
                                  • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 6BDDDCCC
                                  • RedrawWindow.USER32(00000000,?,00000000,00000185), ref: 6BDDDCE0
                                  • IsRectEmpty.USER32(?), ref: 6BDDDCF4
                                  • EqualRect.USER32(?,?), ref: 6BDDDD06
                                  • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 6BDDDD22
                                  • RedrawWindow.USER32(00000000,?,00000000,00000185), ref: 6BDDDD36
                                  • UpdateWindow.USER32(00000000), ref: 6BDDDD45
                                  • IsRectEmpty.USER32(?), ref: 6BDDDD8D
                                  • InvalidateRect.USER32(00000000,?,00000001), ref: 6BDDDDA0
                                  • IsRectEmpty.USER32(?), ref: 6BDDDDAA
                                  • EqualRect.USER32(?,?), ref: 6BDDDDBC
                                  • InvalidateRect.USER32(00000000,?,00000001), ref: 6BDDDDCF
                                  • UpdateWindow.USER32(00000000), ref: 6BDDDDD8
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Window$Empty$ClientEqual$IntersectInvalidatePointsRedrawScreenUpdate$CopyLongUnion
                                  • String ID:
                                  • API String ID: 4119827998-0
                                  • Opcode ID: 85025c1d3755fda4f3343e759e6a41b96c34c02cedb5ac13190da578d45f952d
                                  • Instruction ID: a80cda4b2663d33c916205d59ec4a551523596b3ef59f249f6be55becc41b869
                                  • Opcode Fuzzy Hash: 85025c1d3755fda4f3343e759e6a41b96c34c02cedb5ac13190da578d45f952d
                                  • Instruction Fuzzy Hash: 70D10872900209EFDF01CFA4C948BDEB7B9BF09315F1041A5E94AEB151DB75AA49CF20
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BE23171
                                  • CopyImage.USER32(?,00000000,00000000,00000000,00002000), ref: 6BE231A7
                                    • Part of subcall function 6BE24754: __EH_prolog3_GS.LIBCMT ref: 6BE2475E
                                    • Part of subcall function 6BE24754: GetObjectW.GDI32(?,00000018,?), ref: 6BE24783
                                    • Part of subcall function 6BE24754: GetObjectW.GDI32(?,00000054,?), ref: 6BE247C8
                                  • GetObjectW.GDI32(?,00000018,?), ref: 6BE231E1
                                  • DeleteObject.GDI32(?), ref: 6BE23266
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BE23294
                                  • GetObjectW.GDI32(?,00000018,?), ref: 6BE232B0
                                  • GetObjectW.GDI32(?,00000018,?), ref: 6BE232FA
                                  • SelectObject.GDI32(?,?), ref: 6BE2331D
                                  • SelectObject.GDI32(?,?), ref: 6BE23354
                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6BE2337A
                                  • SelectObject.GDI32(?,00000000), ref: 6BE23395
                                  • CreateCompatibleDC.GDI32(?), ref: 6BE233C5
                                  • SelectObject.GDI32(?,?), ref: 6BE233E3
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6BE23422
                                  • SelectObject.GDI32(?,?), ref: 6BE23437
                                  • BitBlt.GDI32(?,?,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6BE2346D
                                  • SelectObject.GDI32(?,?), ref: 6BE2347F
                                  • SelectObject.GDI32(?,00000000), ref: 6BE23490
                                  • DeleteObject.GDI32(?), ref: 6BE234A1
                                  • DeleteObject.GDI32(?), ref: 6BE234E9
                                  • SelectObject.GDI32(?,?), ref: 6BE23501
                                  • SelectObject.GDI32(?,00000000), ref: 6BE23512
                                  • DeleteObject.GDI32(?), ref: 6BE2351E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Object$Select$Delete$CompatibleCreate$H_prolog3_$BitmapCopyImage
                                  • String ID:
                                  • API String ID: 1780083495-0
                                  • Opcode ID: 8f642e288d88b7b99eb07fea7efe7a67ebff462d7f52c5ef200b01ebf15579cf
                                  • Instruction ID: b9f5e5739b4abd297a2b8cd3d85cd6664b84ad3ee2d226a6e0691f5c61271ef9
                                  • Opcode Fuzzy Hash: 8f642e288d88b7b99eb07fea7efe7a67ebff462d7f52c5ef200b01ebf15579cf
                                  • Instruction Fuzzy Hash: D6A10571910629EFDF218F61CC48BE9BBB9BF09715F1041D9E51DA2260DB349EA4CFA0
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDA297B
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BDA29D0
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BDA29E8
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BDA2A00
                                  • GetObjectW.GDI32(00000004,00000018,?), ref: 6BDA2A20
                                  • CreateBitmap.GDI32(?,?,?,?,00000000), ref: 6BDA2A46
                                  • CreateBitmap.GDI32(00000008,00000008,00000001,00000001,6BF1DA40), ref: 6BDA2A69
                                  • CreatePatternBrush.GDI32(?), ref: 6BDA2A7B
                                  • DeleteObject.GDI32(?), ref: 6BDA2AAA
                                  • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 6BDA2ABB
                                  • GetPixel.GDI32(?,00000000,00000000), ref: 6BDA2B03
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6BDA2B29
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00EE0086), ref: 6BDA2B51
                                  • FillRect.USER32(?,?,?), ref: 6BDA2BB3
                                    • Part of subcall function 6BDA3C00: __EH_prolog3.LIBCMT ref: 6BDA3C07
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 6BDA2BE1
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,008800C6), ref: 6BDA2BFC
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 6BDA2C13
                                  • DeleteDC.GDI32(00000000), ref: 6BDA2C80
                                  • DeleteDC.GDI32(00000000), ref: 6BDA2C9C
                                  • DeleteDC.GDI32(00000000), ref: 6BDA2CBB
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Create$Delete$BitmapCompatible$Object$BrushFillH_prolog3H_prolog3_PatternPixelRect
                                  • String ID:
                                  • API String ID: 308707564-0
                                  • Opcode ID: 9d0e823a6b5d5e51a9e4da619ada2efd796ca13b588d18e944b67c4c99bc7811
                                  • Instruction ID: fb2105ac82d2f583f41c7e6b4f7c762a2e8b6c9e5ffab02a2188fb6c9414fa56
                                  • Opcode Fuzzy Hash: 9d0e823a6b5d5e51a9e4da619ada2efd796ca13b588d18e944b67c4c99bc7811
                                  • Instruction Fuzzy Hash: A8B1E4B2C00218AFDF159FE6CD85AAEBF7AFF18368F104019E515AA160DB359E05DB60
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BE23E31
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BE23E79
                                  • GetObjectW.GDI32(?,00000018,?), ref: 6BE23E9A
                                  • SelectObject.GDI32(?,?), ref: 6BE23ED5
                                  • CreateCompatibleDC.GDI32(?), ref: 6BE23F02
                                  • CreateDIBSection.GDI32(?,?,00000000,?,00000000,00000000), ref: 6BE23F6A
                                  • SelectObject.GDI32(?,00000000), ref: 6BE23F81
                                  • SelectObject.GDI32(?,00000000), ref: 6BE23F93
                                  • SelectObject.GDI32(?,00000000), ref: 6BE23FAA
                                  • DeleteObject.GDI32(?), ref: 6BE23FB6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Object$Select$Create$Compatible$DeleteH_prolog3_Section
                                  • String ID: $(
                                  • API String ID: 1429849173-55695022
                                  • Opcode ID: 0366d0e7413e5b4091ac6b4a6663e40e2913843824a2f1fe272c47a21fb60bba
                                  • Instruction ID: bd9cfbed6b45738b6b23d8291dd5607a16b5a557e3399c9472009fc35cb1c244
                                  • Opcode Fuzzy Hash: 0366d0e7413e5b4091ac6b4a6663e40e2913843824a2f1fe272c47a21fb60bba
                                  • Instruction Fuzzy Hash: F9B14B71D00269DFDF25CF65CC44BAABBB5FF56304F1081EAE949AA251DB349A84CF20
                                  APIs
                                    • Part of subcall function 6BDBB682: GetWindowLongW.USER32(458BF84D,000000F0), ref: 6BDBB68F
                                  • GetParent.USER32(?), ref: 6BDAB874
                                  • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 6BDAB896
                                  • GetWindowRect.USER32(?,?), ref: 6BDAB8BA
                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 6BDAB8DA
                                  • MonitorFromWindow.USER32(00000000,00000001), ref: 6BDAB913
                                  • GetMonitorInfoW.USER32(00000000), ref: 6BDAB91A
                                  • CopyRect.USER32(?,?), ref: 6BDAB928
                                  • GetWindowRect.USER32(00000000,?), ref: 6BDAB935
                                  • MonitorFromWindow.USER32(00000000,00000002), ref: 6BDAB942
                                  • GetMonitorInfoW.USER32(00000000), ref: 6BDAB949
                                  • CopyRect.USER32(?,?), ref: 6BDAB957
                                  • GetParent.USER32(?), ref: 6BDAB961
                                  • GetClientRect.USER32(00000000,?), ref: 6BDAB96E
                                  • GetClientRect.USER32(00000000,?), ref: 6BDAB979
                                  • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 6BDAB987
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Rect$Monitor$ClientCopyFromInfoLongParent$MessagePointsSend
                                  • String ID: (
                                  • API String ID: 3610148278-3887548279
                                  • Opcode ID: 87257bbddce2cb5616463316de3ea38bd66a80a8c29d5fcad1840f4df7258bc8
                                  • Instruction ID: a530f222d0aca52f4cbff909a14f92a8f7299d804bf1bf4e1c49c5181b3a879a
                                  • Opcode Fuzzy Hash: 87257bbddce2cb5616463316de3ea38bd66a80a8c29d5fcad1840f4df7258bc8
                                  • Instruction Fuzzy Hash: 35614D7290060DAFCF01CFB8C988BEEBBB9EF49714F150255E552AB190DB34E946CB60
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BE0F778
                                  • IsWindow.USER32(?), ref: 6BE0F80F
                                  • GetMenuItemCount.USER32(?), ref: 6BE0F9B4
                                  • AppendMenuW.USER32(?,00000000,00000000,?), ref: 6BE0F9E5
                                  • SendMessageW.USER32(?,0000040C,00000000,00000000), ref: 6BE0FA6B
                                  • SendMessageW.USER32(00000000,0000041C,00000000,?), ref: 6BE0FAAC
                                  • GetMenuItemCount.USER32(?), ref: 6BE0FB1F
                                  • AppendMenuW.USER32(?,00000800,00000000,00000000), ref: 6BE0FB35
                                  • AppendMenuW.USER32(?,00000000,00000000,?), ref: 6BE0FB50
                                  • GetMenuItemCount.USER32(?), ref: 6BE0FBBF
                                  • AppendMenuW.USER32(?,00000800,00000000,00000000), ref: 6BE0FBD5
                                  • AppendMenuW.USER32(?,00000000,00000000,?), ref: 6BE0FBEF
                                  • AppendMenuW.USER32(?,00000800,00000000,00000000), ref: 6BE0F9CA
                                    • Part of subcall function 6BDBB793: GetDlgCtrlID.USER32(?), ref: 6BDBB79E
                                  • AppendMenuW.USER32(?,00000000,00000000,?), ref: 6BE0FCD9
                                  • GetWindow.USER32(?,00000005), ref: 6BE0FD09
                                  • AppendMenuW.USER32(?,00000000,00000000,?), ref: 6BE0FD84
                                  • GetMenuItemCount.USER32(?), ref: 6BE0FDC8
                                  • AppendMenuW.USER32(?,00000800,00000000,00000000), ref: 6BE0FDDE
                                  • AppendMenuW.USER32(?,00000000,00000000,?), ref: 6BE0FDF5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Menu$Append$CountItem$MessageSendWindow$CtrlH_prolog3_
                                  • String ID:
                                  • API String ID: 465015882-0
                                  • Opcode ID: 19f60f5d4a6d5b2aa7f224aac8eabf1ccc8a5754034302d53f8fa28c4a8a995f
                                  • Instruction ID: dfda5ca6fdbf14b1e3f944c3b7157916da5c4e7138a2442906d4d414fc2cb5e9
                                  • Opcode Fuzzy Hash: 19f60f5d4a6d5b2aa7f224aac8eabf1ccc8a5754034302d53f8fa28c4a8a995f
                                  • Instruction Fuzzy Hash: 77028E35A00219DFDF149B74C895BACBB75BF45314F2440A9E80AAB391DF38AD61CFA4
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDC053C
                                  • CreateRectRgnIndirect.GDI32(?), ref: 6BDC0574
                                  • CopyRect.USER32(?,?), ref: 6BDC0588
                                  • InflateRect.USER32(?,?,?), ref: 6BDC059E
                                  • IntersectRect.USER32(?,?,?), ref: 6BDC05AA
                                  • CreateRectRgnIndirect.GDI32(?), ref: 6BDC05B4
                                  • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6BDC05C9
                                  • CombineRgn.GDI32(?,?,?,00000003), ref: 6BDC05E3
                                  • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6BDC062A
                                  • SetRectRgn.GDI32(?,?,00000004,?,?), ref: 6BDC0647
                                  • CopyRect.USER32(?,?), ref: 6BDC0652
                                  • InflateRect.USER32(?,?,?), ref: 6BDC0668
                                  • IntersectRect.USER32(?,?,?), ref: 6BDC0674
                                  • SetRectRgn.GDI32(?,?,?,?,?), ref: 6BDC0689
                                  • CombineRgn.GDI32(?,?,?,00000003), ref: 6BDC069A
                                  • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6BDC06AE
                                  • CombineRgn.GDI32(?,?,?,00000003), ref: 6BDC06C8
                                    • Part of subcall function 6BDC0491: CreateBitmap.GDI32(00000008,00000008,00000001,00000001,?), ref: 6BDC04D8
                                    • Part of subcall function 6BDC0491: CreatePatternBrush.GDI32(00000000), ref: 6BDC04E5
                                    • Part of subcall function 6BDC0491: DeleteObject.GDI32(00000000), ref: 6BDC04F1
                                  • PatBlt.GDI32(00000004,?,?,?,?,005A0049), ref: 6BDC0726
                                    • Part of subcall function 6BDA3083: SelectObject.GDI32(?,00000000), ref: 6BDA30A3
                                    • Part of subcall function 6BDA3083: SelectObject.GDI32(?,00000000), ref: 6BDA30B9
                                    • Part of subcall function 6BDA34DA: SelectClipRgn.GDI32(?,00000000), ref: 6BDA34FA
                                    • Part of subcall function 6BDA34DA: SelectClipRgn.GDI32(?,00000000), ref: 6BDA3510
                                  • PatBlt.GDI32(00000004,?,?,?,?,005A0049), ref: 6BDC0789
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Create$Select$CombineObject$ClipCopyIndirectInflateIntersect$BitmapBrushDeleteH_prolog3_Pattern
                                  • String ID:
                                  • API String ID: 770706554-0
                                  • Opcode ID: 5dff3cef1323ebfec203fb91941e19c6cad2c265a648344e0af80c65031c737e
                                  • Instruction ID: da4e01e1dfa07ce5ee35c964bcc00aae6b76ddddb8876397a5dbe314d9898e08
                                  • Opcode Fuzzy Hash: 5dff3cef1323ebfec203fb91941e19c6cad2c265a648344e0af80c65031c737e
                                  • Instruction Fuzzy Hash: 7D91F5B2910218AFCF05DFE4D995DEEBBBAFF48310B144019F916B7260DB78A905CB60
                                  APIs
                                  • InflateRect.USER32(?,00000004,00000004), ref: 6BE06563
                                  • InvalidateRect.USER32(?,?,00000001), ref: 6BE06575
                                  • UpdateWindow.USER32(?), ref: 6BE0657E
                                  • GetMessageW.USER32(?,00000000,0000000F,0000000F), ref: 6BE065BF
                                  • DispatchMessageW.USER32(?), ref: 6BE065D1
                                  • PeekMessageW.USER32(?,00000000,0000000F,0000000F,00000000), ref: 6BE065E1
                                  • GetCapture.USER32 ref: 6BE065EB
                                  • SetCapture.USER32(?), ref: 6BE065FC
                                  • GetCapture.USER32 ref: 6BE06608
                                  • GetWindowRect.USER32(?,?), ref: 6BE06630
                                  • SetCursorPos.USER32(?,?), ref: 6BE06657
                                  • GetCapture.USER32 ref: 6BE0665D
                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 6BE06676
                                  • DispatchMessageW.USER32(?), ref: 6BE066A0
                                  • ReleaseCapture.USER32 ref: 6BE066E0
                                  • IsWindow.USER32(?), ref: 6BE066E9
                                  • SendMessageW.USER32(8589084D,00000010,00000000,00000000), ref: 6BE06702
                                  • SetTimer.USER32(?,0000EC05,00000000), ref: 6BE0A1BC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Message$Capture$RectWindow$Dispatch$CursorInflateInvalidatePeekReleaseSendTimerUpdate
                                  • String ID:
                                  • API String ID: 3094444671-0
                                  • Opcode ID: 8277c468c330385edacb04c62dd77745e6d59b344ccedc1193b2ca7f712d34f6
                                  • Instruction ID: 6be52b8cb78b88877191e31cad925da67c79be0ce2f313ce0bad30d945cde275
                                  • Opcode Fuzzy Hash: 8277c468c330385edacb04c62dd77745e6d59b344ccedc1193b2ca7f712d34f6
                                  • Instruction Fuzzy Hash: C0B1B376A00215AFDF048BB8D888BAD77B5FF46724F240169F902EB294DF34D965CB60
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: #32768$AfxOldWndProc423
                                  • API String ID: 0-2141921550
                                  • Opcode ID: 9c92ecc6d96a1d286a1871ffdc8616bcdff787de634f9c4d8901405b65222369
                                  • Instruction ID: 212b07095f32bc64572a2371290afd382f2f5167cfeeb8715c943d6e7af3c7b1
                                  • Opcode Fuzzy Hash: 9c92ecc6d96a1d286a1871ffdc8616bcdff787de634f9c4d8901405b65222369
                                  • Instruction Fuzzy Hash: 5C510A76920228EBCF119F60CC48FAA7B74BF15724F1005D5F81AAB1A1CB38DA45DBA0
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BE23927
                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 6BE23965
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BE239A4
                                  • SelectObject.GDI32(?,00000000), ref: 6BE239C7
                                  • GetObjectW.GDI32(?,00000054,?), ref: 6BE23A14
                                  • CreateDIBSection.GDI32(?,?), ref: 6BE23A76
                                  • CreateCompatibleDC.GDI32(?), ref: 6BE23AB0
                                  • SelectObject.GDI32(?,00000000), ref: 6BE23AC9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Object$Create$CompatibleSelect$H_prolog3_Section
                                  • String ID: (
                                  • API String ID: 1338481308-3887548279
                                  • Opcode ID: 43e32f022742fb59206740caab362bc42f84cbe10da127f36b5416ae2af21561
                                  • Instruction ID: 2218b869eca25a4e67bb1e72a50a834aaf9d1f78c671997370aa5f0c9f719fb1
                                  • Opcode Fuzzy Hash: 43e32f022742fb59206740caab362bc42f84cbe10da127f36b5416ae2af21561
                                  • Instruction Fuzzy Hash: 04A14675900208DFDB61CF64CC81B9ABBB5FF09314F1081A9E95EA7251DB34AA89CF20
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BE8EFDD
                                  • GetCursorPos.USER32(?), ref: 6BE8F096
                                  • IsRectEmpty.USER32(?), ref: 6BE8F0CA
                                  • IsRectEmpty.USER32(?), ref: 6BE8F0F1
                                  • IsRectEmpty.USER32(?), ref: 6BE8F113
                                  • GetWindowRect.USER32(?,?), ref: 6BE8F141
                                  • GetWindowRect.USER32(?,?), ref: 6BE8F171
                                  • PtInRect.USER32(?,?,?), ref: 6BE8F1BE
                                  • OffsetRect.USER32(?,?,00000000), ref: 6BE8F1D6
                                    • Part of subcall function 6BE905C2: __EH_prolog3.LIBCMT ref: 6BE905C9
                                    • Part of subcall function 6BE905C2: SetRectEmpty.USER32 ref: 6BE906C9
                                    • Part of subcall function 6BE905C2: SetRectEmpty.USER32(?), ref: 6BE906D0
                                  • SetRectEmpty.USER32(?), ref: 6BE8F1F9
                                  • OffsetRect.USER32(?,?,?), ref: 6BE8F38A
                                  • IsRectEmpty.USER32(?), ref: 6BE8F3AA
                                  • IsRectEmpty.USER32(?), ref: 6BE8F3DD
                                  • PtInRect.USER32(?,00000000,00000000), ref: 6BE8F3F1
                                  • OffsetRect.USER32(?,?,?), ref: 6BE8F41D
                                  • IsRectEmpty.USER32(?), ref: 6BE8F43C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Empty$Offset$Window$CursorH_prolog3H_prolog3_
                                  • String ID:
                                  • API String ID: 359163869-0
                                  • Opcode ID: 7761a45e541cc81969147051e6a26445030e137c9e36b43aae0144a19c655001
                                  • Instruction ID: c69eea5792e9d6ed5cca09953fac83101edd3101823ba3ea9234c8ab21fa56b7
                                  • Opcode Fuzzy Hash: 7761a45e541cc81969147051e6a26445030e137c9e36b43aae0144a19c655001
                                  • Instruction Fuzzy Hash: CBE1E036A00608DFCF05CFA4C884AAD7BB5FF49314F2445AAE809AF255EB3CD955CB90
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BE25D37
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BE25D65
                                  • GetObjectW.GDI32(?,00000018,?), ref: 6BE25D7E
                                  • SelectObject.GDI32(?,?), ref: 6BE25D9A
                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6BE25DBB
                                  • SelectObject.GDI32(?,00000000), ref: 6BE25DCC
                                  • CreateCompatibleDC.GDI32(?), ref: 6BE25DE6
                                  • SelectObject.GDI32(?,?), ref: 6BE25DFB
                                  • SelectObject.GDI32(?,00000000), ref: 6BE25E0C
                                  • DeleteObject.GDI32(?), ref: 6BE25E15
                                  • BitBlt.GDI32(?,00000000,00000000,000000FF,?,?,00000000,00000000,00CC0020), ref: 6BE25E35
                                  • GetPixel.GDI32(?,?,00000000), ref: 6BE25E5B
                                  • SetPixel.GDI32(?,?,00000000,00000000), ref: 6BE25EA2
                                  • SelectObject.GDI32(?,?), ref: 6BE25EC9
                                  • SelectObject.GDI32(?,00000000), ref: 6BE25ED3
                                  • DeleteObject.GDI32(?), ref: 6BE25EDB
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Object$Select$CompatibleCreate$DeletePixel$BitmapH_prolog3
                                  • String ID:
                                  • API String ID: 3639146769-0
                                  • Opcode ID: 0ff4b8f3c358956e65b8088e985a718249645437b80262b7196e3c08f2c1f88a
                                  • Instruction ID: 3d49688a975db5449ffd3ca56171f443eeb78eaaf4e6c66280730d3f09ab25bb
                                  • Opcode Fuzzy Hash: 0ff4b8f3c358956e65b8088e985a718249645437b80262b7196e3c08f2c1f88a
                                  • Instruction Fuzzy Hash: 0A515B7291021AEFCF119FA1CE48AAEBBB5FF09714F200125F612A6264DB35DE65CF50
                                  APIs
                                  • GetKeyState.USER32(00000001), ref: 6BDC4569
                                  • GetCursorPos.USER32(?), ref: 6BDC458E
                                  • ScreenToClient.USER32(?,?), ref: 6BDC459B
                                  • GetCapture.USER32 ref: 6BDC460D
                                  • ClientToScreen.USER32(?,?), ref: 6BDC4650
                                  • WindowFromPoint.USER32(?,?), ref: 6BDC465C
                                  • IsChild.USER32(?,?), ref: 6BDC4674
                                  • KillTimer.USER32(?,0000EC0A), ref: 6BDC46B4
                                  • KillTimer.USER32(?,0000EC09), ref: 6BDC46DD
                                    • Part of subcall function 6BDAE820: GetForegroundWindow.USER32 ref: 6BDAE82D
                                    • Part of subcall function 6BDAE820: GetLastActivePopup.USER32(?), ref: 6BDAE83E
                                  • GetParent.USER32(?), ref: 6BDC4734
                                  • IsAppThemed.UXTHEME ref: 6BDC478E
                                  • OpenThemeData.UXTHEME(?,REBAR), ref: 6BDC47A0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ClientKillScreenTimerWindow$ActiveCaptureChildCursorDataForegroundFromLastOpenParentPointPopupStateThemeThemed
                                  • String ID: REBAR
                                  • API String ID: 214255902-925029515
                                  • Opcode ID: d92e753cefa903eddcf222d7efd12479a47878d317e1f2c2eb1fb33f9e586265
                                  • Instruction ID: 58e1769d24b2da15e18d28c685502267d69e42d9f08ee41aecf848504423dfa6
                                  • Opcode Fuzzy Hash: d92e753cefa903eddcf222d7efd12479a47878d317e1f2c2eb1fb33f9e586265
                                  • Instruction Fuzzy Hash: EC61B371B10215EFDF059F74C894AAE7BB9BF45324B100569E812DB2A0EB78D901DF92
                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,?), ref: 6BDC5C3D
                                  • GetProcAddress.KERNEL32(00000000,GetThreadPreferredUILanguages), ref: 6BDC5C4D
                                  • EncodePointer.KERNEL32(00000000,?,?), ref: 6BDC5C56
                                  • DecodePointer.KERNEL32(00000000,?,?), ref: 6BDC5C64
                                  • GetUserDefaultUILanguage.KERNEL32(?,?), ref: 6BDC5C8B
                                  • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6BDC5C9B
                                  • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6BDC5CCF
                                  • GetSystemDefaultUILanguage.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6BDC5D02
                                  • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6BDC5D12
                                  • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6BDC5D4F
                                  • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6BDC5D8A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: DownlevelLocaleName___crt$DefaultLanguagePointer$AddressDecodeEncodeHandleModuleProcSystemUser
                                  • String ID: GetThreadPreferredUILanguages$kernel32.dll
                                  • API String ID: 404278886-1646127487
                                  • Opcode ID: 7e60016a4cdbf03b55238f031ac5428ad5fb2b954ca2c96a2b59d683986b5b54
                                  • Instruction ID: 96d187e9eece3f6212b63e0963b50de062bb3e6e2180742d92d0b78067cee108
                                  • Opcode Fuzzy Hash: 7e60016a4cdbf03b55238f031ac5428ad5fb2b954ca2c96a2b59d683986b5b54
                                  • Instruction Fuzzy Hash: EC512CB290021AAFCB04DFA4CD85EAF77BDEF49314F100565E615A7251DB38EA05CBA1
                                  APIs
                                  • GetDlgCtrlID.USER32(?), ref: 6BDB34A7
                                    • Part of subcall function 6BDBBA35: ShowWindow.USER32(?,00000000,?,?,6BDB921A,00000000), ref: 6BDBBA46
                                    • Part of subcall function 6BDB3233: GetDesktopWindow.USER32 ref: 6BDB323C
                                    • Part of subcall function 6BDB3233: GetWindow.USER32(00000000), ref: 6BDB3243
                                    • Part of subcall function 6BDB3233: GetWindowLongW.USER32(00000000,000000F0), ref: 6BDB3271
                                    • Part of subcall function 6BDB3233: ShowWindow.USER32(00000000,00000000), ref: 6BDB328C
                                    • Part of subcall function 6BDB3233: GetWindow.USER32(00000000,00000002), ref: 6BDB32BA
                                  • GetDlgItem.USER32(?,?), ref: 6BDB3564
                                  • ShowWindow.USER32(00000000,00000000,?,?,?), ref: 6BDB3572
                                  • GetMenu.USER32(?), ref: 6BDB3584
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 6BDB35A0
                                  • GetDlgItem.USER32(?,0000E900), ref: 6BDB35EC
                                  • SetWindowLongW.USER32(00000000,000000F4,0000EA21), ref: 6BDB3600
                                  • GetDlgItem.USER32(?,0000EA21), ref: 6BDB361C
                                  • GetDlgItem.USER32(?,0000E900), ref: 6BDB3632
                                  • SetWindowLongW.USER32(00000000,000000F4,0000EA21), ref: 6BDB3644
                                  • SetWindowLongW.USER32(?,000000F4,0000E900), ref: 6BDB3650
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 6BDB3663
                                  • SetMenu.USER32(?,00000000), ref: 6BDB367A
                                  • GetDlgItem.USER32(?,?), ref: 6BDB36D7
                                  • ShowWindow.USER32(?,00000005), ref: 6BDB36E5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Item$LongShow$InvalidateMenuRect$CtrlDesktop
                                  • String ID:
                                  • API String ID: 2951210208-0
                                  • Opcode ID: 4170d33c9e3576396b7f29735760dfc5c9d409ee4e298d455260bf114425d3f6
                                  • Instruction ID: b568d0810b340ed7015843eccc4f02f335fd29624bdaf72434e35c95e18ab43b
                                  • Opcode Fuzzy Hash: 4170d33c9e3576396b7f29735760dfc5c9d409ee4e298d455260bf114425d3f6
                                  • Instruction Fuzzy Hash: 76D17D71B10615EBDF148F68C898BADBBB1FF09320F0045A9E916AB390DB74E944DB90
                                  APIs
                                    • Part of subcall function 6BDBFCA7: GetFocus.USER32 ref: 6BDBFCAB
                                    • Part of subcall function 6BDBFCA7: GetParent.USER32(00000000), ref: 6BDBFCCC
                                    • Part of subcall function 6BDBFCA7: GetWindowLongW.USER32(00000000,000000F0), ref: 6BDBFCEB
                                    • Part of subcall function 6BDBFCA7: GetParent.USER32(00000000), ref: 6BDBFCF9
                                    • Part of subcall function 6BDBFCA7: GetDesktopWindow.USER32 ref: 6BDBFD01
                                    • Part of subcall function 6BDBFCA7: SendMessageW.USER32(00000000,0000014F,00000000,00000000), ref: 6BDBFD15
                                  • GetMenu.USER32(?), ref: 6BDB4709
                                  • GetMenuItemCount.USER32(?), ref: 6BDB4747
                                  • GetSubMenu.USER32(?,00000000), ref: 6BDB475D
                                  • GetMenuItemCount.USER32(?), ref: 6BDB4782
                                  • GetMenuItemID.USER32(?,00000000), ref: 6BDB479C
                                  • GetSubMenu.USER32(?,?), ref: 6BDB47B8
                                  • GetMenuItemID.USER32(?,00000000), ref: 6BDB47D0
                                  • GetMenuItemCount.USER32(?), ref: 6BDB47F1
                                  • GetMenuItemID.USER32(?,?), ref: 6BDB4827
                                  • SendMessageW.USER32(?,00000362,-0000E001,00000000), ref: 6BDB48E3
                                  • UpdateWindow.USER32(?), ref: 6BDB4904
                                  • GetKeyState.USER32(00000079), ref: 6BDB4922
                                  • GetKeyState.USER32(00000012), ref: 6BDB4933
                                  • GetParent.USER32(?), ref: 6BDB49F5
                                  • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 6BDB4A0F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Menu$Item$CountMessageParentWindow$SendState$DesktopFocusLongPostUpdate
                                  • String ID:
                                  • API String ID: 1315724587-0
                                  • Opcode ID: c6d9126f3c59bd5b5cf31e0f37099e9497dce2d292383f48ab3804fbaac4c2b3
                                  • Instruction ID: 12b49dbbc11a958534d3df41dd5aa9240a92331ef3c423db5f53a37ee08d1d27
                                  • Opcode Fuzzy Hash: c6d9126f3c59bd5b5cf31e0f37099e9497dce2d292383f48ab3804fbaac4c2b3
                                  • Instruction Fuzzy Hash: A6C1A0B5A00215EFDF04DF64C884BADBBB5FF45724F1081A9E866AB250DB78D940DFA0
                                  APIs
                                  • GetClientRect.USER32(?,?), ref: 6BDDED6F
                                  • InflateRect.USER32(?,00000000,00000000), ref: 6BDDEDA9
                                  • SetRectEmpty.USER32(?), ref: 6BDDEE4D
                                  • SetRectEmpty.USER32(?), ref: 6BDDEE5A
                                  • GetSystemMetrics.USER32(00000002), ref: 6BDDEE7F
                                  • KillTimer.USER32(?,0000EC16,?,00000000,00000000), ref: 6BDDEF2F
                                  • EqualRect.USER32(?,?), ref: 6BDDEF4C
                                  • EqualRect.USER32(?,?), ref: 6BDDEF61
                                  • EqualRect.USER32(?,?), ref: 6BDDEFD0
                                  • InvalidateRect.USER32(?,?,00000001,?,00000000,00000000), ref: 6BDDEFE5
                                  • InvalidateRect.USER32(?,?,00000001,?,00000000,00000000), ref: 6BDDEFF6
                                  • EqualRect.USER32(?,?), ref: 6BDDF009
                                  • InvalidateRect.USER32(?,?,00000001,?,00000000,00000000), ref: 6BDDF01B
                                  • InvalidateRect.USER32(?,?,00000001,?,00000000,00000000), ref: 6BDDF02C
                                  • UpdateWindow.USER32(?), ref: 6BDDF03D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$EqualInvalidate$Empty$ClientInflateKillMetricsSystemTimerUpdateWindow
                                  • String ID:
                                  • API String ID: 2140115980-0
                                  • Opcode ID: 3b336f0a3678f142b3e7cdf768e5eea1804ba006895a04c0fb7c9bd839c77801
                                  • Instruction ID: 9176f4d1809856e63da72c0479407a8aad2843e510bcc6f10bb355f230076865
                                  • Opcode Fuzzy Hash: 3b336f0a3678f142b3e7cdf768e5eea1804ba006895a04c0fb7c9bd839c77801
                                  • Instruction Fuzzy Hash: 2BA1F87291011ADFCF10CFA8C998AEEB7B5BF49310F0441B5ED4AAF215DB34A945DB60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDA26C6
                                  • GetSysColor.USER32(00000014), ref: 6BDA26FD
                                    • Part of subcall function 6BDA2E07: __EH_prolog3.LIBCMT ref: 6BDA2E0E
                                    • Part of subcall function 6BDA2E07: CreateSolidBrush.GDI32(6BDAF2CB), ref: 6BDA2E29
                                  • GetSysColor.USER32(00000010), ref: 6BDA2712
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BDA2726
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BDA273E
                                  • GetObjectW.GDI32(10C2C95B,00000018,?), ref: 6BDA2761
                                  • CreateBitmap.GDI32(?,?,?,?,00000000), ref: 6BDA2782
                                  • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 6BDA27A3
                                    • Part of subcall function 6BDA3826: SelectObject.GDI32(6BDAF2CB,?), ref: 6BDA382F
                                  • GetPixel.GDI32(?,00000000,00000000), ref: 6BDA27EB
                                    • Part of subcall function 6BDA3136: SetBkColor.GDI32(?,6BDAF2CB), ref: 6BDA314B
                                    • Part of subcall function 6BDA3136: SetBkColor.GDI32(?,6BDAF2CB), ref: 6BDA315D
                                  • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6BDA2814
                                  • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,001100A6), ref: 6BDA283E
                                  • BitBlt.GDI32(?,00000001,00000001,?,?,?,00000000,00000000,00E20746), ref: 6BDA28A9
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00E20746), ref: 6BDA28D2
                                  • DeleteDC.GDI32(00000000), ref: 6BDA2947
                                  • DeleteDC.GDI32(00000000), ref: 6BDA2966
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Create$Color$BitmapCompatibleDeleteH_prolog3Object$BrushPixelSelectSolid
                                  • String ID:
                                  • API String ID: 2254850417-0
                                  • Opcode ID: c015c76bfd0753107b336bef9c878a0f101f0fb754586f0f0d452411302121bf
                                  • Instruction ID: f6e6064ae865c881911925c0719debbd204455e128a7bbf7d4dcf550a771e6b9
                                  • Opcode Fuzzy Hash: c015c76bfd0753107b336bef9c878a0f101f0fb754586f0f0d452411302121bf
                                  • Instruction Fuzzy Hash: 958127B2D00208EBDF119FE1DD82AEEBF7AEF18724F100028F511BA1A0DB755A55DB60
                                  APIs
                                  • IsRectEmpty.USER32(?), ref: 6BDB934D
                                  • GetClientRect.USER32(?,?), ref: 6BDB9398
                                  • BeginDeferWindowPos.USER32(?), ref: 6BDB93C3
                                  • GetWindowRect.USER32(?,?), ref: 6BDB94A9
                                  • OffsetRect.USER32(?,?,00000000), ref: 6BDB94E0
                                  • OffsetRect.USER32(?,?,00000000), ref: 6BDB9516
                                  • OffsetRect.USER32(?,00000002,00000000), ref: 6BDB9540
                                  • EqualRect.USER32(?,?), ref: 6BDB954E
                                  • OffsetRect.USER32(?,00000000,?), ref: 6BDB961B
                                  • OffsetRect.USER32(?,00000000,00000002), ref: 6BDB9653
                                  • OffsetRect.USER32(?,00000000,00000002), ref: 6BDB9679
                                  • EqualRect.USER32(?,?), ref: 6BDB96B0
                                  • EndDeferWindowPos.USER32(00000000), ref: 6BDB97C6
                                  • SetRectEmpty.USER32(?), ref: 6BDB97D7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Offset$Window$DeferEmptyEqual$BeginClient
                                  • String ID:
                                  • API String ID: 3160784657-0
                                  • Opcode ID: 2cc1c1b955e2c803f967339e16407c0040b9a8eaa862092de348f2ef6623295c
                                  • Instruction ID: fe19353604eaddb02a30ed73010f5d9c4bbed5efef16d5a1421c212566db0772
                                  • Opcode Fuzzy Hash: 2cc1c1b955e2c803f967339e16407c0040b9a8eaa862092de348f2ef6623295c
                                  • Instruction Fuzzy Hash: F90248B1A00259CFDF04CFA8C984BADBBF5FF59314F2441A9E806AB252D778A945CF50
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDDE8F5
                                  • GetClientRect.USER32(?,?), ref: 6BDDE913
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BDDE94C
                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6BDDE9A1
                                  • CreateDIBSection.GDI32(?,?), ref: 6BDDEA13
                                  • CreateDIBSection.GDI32(?,00000028,00000000,?,00000000,00000000), ref: 6BDDEA4C
                                  • CreateDIBSection.GDI32(?,00000028,00000000,?,00000000,00000000), ref: 6BDDEA7F
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,?,?,00CC0020), ref: 6BDDEAE7
                                  • GetWindowRect.USER32(?,?), ref: 6BDDEB56
                                  • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 6BDDECA6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Create$Section$CompatibleRect$BitmapClientH_prolog3_Window
                                  • String ID: (
                                  • API String ID: 2918208214-3887548279
                                  • Opcode ID: d8893a633819bc87768c2643a2c743abff28133e0cf36f152d7e9f9ea27f924d
                                  • Instruction ID: ddd0da9e32260f780b311159acbc053eb573115abe55fdce5040db2354d54a11
                                  • Opcode Fuzzy Hash: d8893a633819bc87768c2643a2c743abff28133e0cf36f152d7e9f9ea27f924d
                                  • Instruction Fuzzy Hash: 4BD12771A00619EFDF15CFA9C984EAEFBB9FF08314B10416AE559AB210DB34AD44DF50
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: UpdateWindow$MessageParent$BeepClientFocusH_prolog3_ScreenSend
                                  • String ID:
                                  • API String ID: 841119998-0
                                  • Opcode ID: 7fedc0e1293c6a7dc0eb313552c2ed5edada46eb5e8ba113540249aba1f84d75
                                  • Instruction ID: 60be40022b6163da9787625fab79924bf37361fdb7fc7b59610b45f825b6aea8
                                  • Opcode Fuzzy Hash: 7fedc0e1293c6a7dc0eb313552c2ed5edada46eb5e8ba113540249aba1f84d75
                                  • Instruction Fuzzy Hash: 9EC19335A00615DFCF059F74C898BAD7BB6BF49334F0002A9E866AB2A1DB3D9905DF50
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BE1B4ED
                                    • Part of subcall function 6BDA0447: __EH_prolog3.LIBCMT ref: 6BDA044E
                                    • Part of subcall function 6BEAB113: __EH_prolog3.LIBCMT ref: 6BEAB11A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: H_prolog3
                                  • String ID: MFCButton$MFCColorButton$MFCEditBrowse$MFCFontComboBox$MFCLink$MFCMaskedEdit$MFCMenuButton$MFCPropertyGrid$MFCShellList$MFCShellTree$MFCVSListBox
                                  • API String ID: 431132790-2110171958
                                  • Opcode ID: a9a390bfc5e7ec914c65cd949ab198208d35a8468b95124817177305f2f707c1
                                  • Instruction ID: 2217a3408e30cca3ee1e26322903b654e962ad4041793eb9e483931293452b07
                                  • Opcode Fuzzy Hash: a9a390bfc5e7ec914c65cd949ab198208d35a8468b95124817177305f2f707c1
                                  • Instruction Fuzzy Hash: AA619022D0C346A9EF04DBB8A90A7AE77D45F5526CF30065AA160EF2C1EF3D9714C635
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BE2C975
                                    • Part of subcall function 6BE1DE20: __EH_prolog3.LIBCMT ref: 6BE1DE27
                                  • GetWindowRect.USER32(?,?), ref: 6BE2CA5B
                                    • Part of subcall function 6BDBB793: GetDlgCtrlID.USER32(?), ref: 6BDBB79E
                                    • Part of subcall function 6BE2E67B: GetWindowRect.USER32(?,?), ref: 6BE2E689
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: H_prolog3RectWindow$Ctrl
                                  • String ID: %TsPane-%d$%TsPane-%d%x$IsFloating$MRUWidth$Panes$PinState$RecentFrameAlignment$RecentRowIndex$RectRecentDocked$RectRecentFloat
                                  • API String ID: 2598721110-2628993547
                                  • Opcode ID: c45e5f00754866d250d249e609dc6a165082d2f5537f67e3bca1db20965202f5
                                  • Instruction ID: cd5ba5aaa8b9cb846c852daa4acf7ce0d6281ef6eaabbc1406637897d529c888
                                  • Opcode Fuzzy Hash: c45e5f00754866d250d249e609dc6a165082d2f5537f67e3bca1db20965202f5
                                  • Instruction Fuzzy Hash: 6F813A76A00219DFCF04DFA4CC94ABDB772BF89314F1504A8E916AB3A1DB35A915CF60
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BE07BB4
                                  • GetWindowRect.USER32(?,?), ref: 6BE07C48
                                  • SetRect.USER32(?,00000000,00000000,?,?), ref: 6BE07C69
                                  • CreateCompatibleDC.GDI32(?), ref: 6BE07C75
                                  • CreateCompatibleBitmap.GDI32(?,?,00000128), ref: 6BE07C9F
                                  • GetWindowRect.USER32(?,?), ref: 6BE07CF4
                                  • GetClientRect.USER32(?,?), ref: 6BE07D01
                                  • OffsetRect.USER32(?,?,?), ref: 6BE07D22
                                  • IsRectEmpty.USER32(?), ref: 6BE07D52
                                  • SetRectEmpty.USER32(?), ref: 6BE07DE5
                                  • InflateRect.USER32(?,000000FE,00000000), ref: 6BE08065
                                  • CreateRectRgnIndirect.GDI32(?), ref: 6BE07D5D
                                    • Part of subcall function 6BDA34DA: SelectClipRgn.GDI32(?,00000000), ref: 6BDA34FA
                                    • Part of subcall function 6BDA34DA: SelectClipRgn.GDI32(?,00000000), ref: 6BDA3510
                                  • BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 6BE08147
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Create$ClipCompatibleEmptySelectWindow$BitmapClientH_prolog3_IndirectInflateOffset
                                  • String ID:
                                  • API String ID: 3231449308-0
                                  • Opcode ID: 6e1df907eaaf18ea1fec962c1c5d773f92d5c2a1badbb5064fb1ea785e0f399d
                                  • Instruction ID: eac1a019e9cfe94760ff42d76ad25a9c42fcbf33706ef79f39d157634b550d75
                                  • Opcode Fuzzy Hash: 6e1df907eaaf18ea1fec962c1c5d773f92d5c2a1badbb5064fb1ea785e0f399d
                                  • Instruction Fuzzy Hash: 58020531A002299FCF25CBA4C894BEDB7B5BF49314F10419AE51AA7260DB34AE95CF60
                                  APIs
                                  • GetMessageW.USER32(?,00000000,0000000F,0000000F), ref: 6BDE0132
                                  • DispatchMessageW.USER32(?), ref: 6BDE0140
                                  • PeekMessageW.USER32(?,00000000,0000000F,0000000F,00000000), ref: 6BDE014E
                                  • GetCapture.USER32 ref: 6BDE0158
                                  • SetCapture.USER32(?), ref: 6BDE016C
                                  • GetWindowRect.USER32(?,?), ref: 6BDE0189
                                  • GetCapture.USER32 ref: 6BDE01FC
                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 6BDE0219
                                  • DispatchMessageW.USER32(?), ref: 6BDE023F
                                  • GetScrollPos.USER32(00000000,00000002), ref: 6BDE035C
                                  • RedrawWindow.USER32(?,00000000,00000000,00000581), ref: 6BDE0379
                                  • ReleaseCapture.USER32 ref: 6BDE041B
                                  • IsWindow.USER32(?), ref: 6BDE0424
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Message$Capture$Window$Dispatch$PeekRectRedrawReleaseScroll
                                  • String ID:
                                  • API String ID: 1873598099-0
                                  • Opcode ID: 305f9cdb47c83fdd3f673b07b45c118fc5bafd8ccac8e4a9aa561b029b3785e1
                                  • Instruction ID: 4ef7426eb02afc3fa1ca6fe5be52901f42a1db6c4e01a381164962569ccc2caf
                                  • Opcode Fuzzy Hash: 305f9cdb47c83fdd3f673b07b45c118fc5bafd8ccac8e4a9aa561b029b3785e1
                                  • Instruction Fuzzy Hash: 4DA16F31A10214DBDF04DF68C899BEE7BB5FF49750F0401B9E806AF255CB749946CBA0
                                  APIs
                                  • LoadResource.KERNEL32(?,?,?,6BD9C803,00000000,00000000,?,?,?,6BD9C803,?,?,6BD9C64F), ref: 6BDA70EC
                                  • LockResource.KERNEL32(00000000,?,6BD9C803,?,?,6BD9C64F), ref: 6BDA70FB
                                  • GetSysColor.USER32 ref: 6BDA717F
                                  • GetSysColor.USER32 ref: 6BDA7192
                                  • GetSysColor.USER32 ref: 6BDA71AD
                                  • GetDC.USER32(00000000), ref: 6BDA71E3
                                  • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 6BDA71F3
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BDA7201
                                  • SelectObject.GDI32(00000000,?), ref: 6BDA720D
                                  • StretchDIBits.GDI32(00000000,00000000,00000000,6BD9C803,?,00000000,00000000,6BD9C803,?,?,00000000,00000000,00CC0020), ref: 6BDA7240
                                  • SelectObject.GDI32(00000000,00000000), ref: 6BDA7248
                                  • DeleteDC.GDI32(00000000), ref: 6BDA724F
                                  • ReleaseDC.USER32(00000000,00000000), ref: 6BDA725B
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Color$CompatibleCreateObjectResourceSelect$BitmapBitsDeleteLoadLockReleaseStretch
                                  • String ID:
                                  • API String ID: 257281507-0
                                  • Opcode ID: 1e09af52d8871e5717cf4115d84a8c341ef02e3245688d068695e365b180f053
                                  • Instruction ID: dbab0391e503dcd99504ac264df7032e720079cdd8b5baf1f63cfbe007980889
                                  • Opcode Fuzzy Hash: 1e09af52d8871e5717cf4115d84a8c341ef02e3245688d068695e365b180f053
                                  • Instruction Fuzzy Hash: BD41AF72A10114BFDB008FA9C888EBEBFF9EF96711B108059F516EB254D735D905DBA0
                                  APIs
                                  • EnableMenuItem.USER32(?,?,00000403), ref: 6BDBADF2
                                  • GetFocus.USER32 ref: 6BDBAE0C
                                  • GetParent.USER32(?), ref: 6BDBAE17
                                  • SendMessageW.USER32(?,00000028,00000000,00000000), ref: 6BDBAE2C
                                  • CheckMenuItem.USER32(?,?,00000400), ref: 6BDBAE7F
                                  • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 6BDBAE9A
                                  • SendMessageW.USER32(?,000000F1,?,00000000), ref: 6BDBAEB7
                                  • SetMenuItemBitmaps.USER32(?,?,00000400,00000000,00000000), ref: 6BDBAF24
                                  • SetMenuItemInfoW.USER32(?,?,00000001,?), ref: 6BDBAF74
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ItemMenu$MessageSend$BitmapsCheckEnableFocusInfoParent
                                  • String ID: 0$@
                                  • API String ID: 2977031974-1545510068
                                  • Opcode ID: c0276a3905730e35e50062a3fc5706967ee843328dbedb9ff32e9a792cddf7a6
                                  • Instruction ID: 5d62933803449b25a58ffacc6c05e6e6c5db1cfb5830ba76ffeadf350ef850f5
                                  • Opcode Fuzzy Hash: c0276a3905730e35e50062a3fc5706967ee843328dbedb9ff32e9a792cddf7a6
                                  • Instruction Fuzzy Hash: DD51CFB2600605EFDB209F25C848F9ABBB9FF04720F108569F55B9F560DB79E841CBA0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BE2C778
                                    • Part of subcall function 6BE1DE20: __EH_prolog3.LIBCMT ref: 6BE1DE27
                                    • Part of subcall function 6BDBB793: GetDlgCtrlID.USER32(?), ref: 6BDBB79E
                                    • Part of subcall function 6BE29AC4: __EH_prolog3.LIBCMT ref: 6BE29ACB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: H_prolog3$Ctrl
                                  • String ID: %TsPane-%d$%TsPane-%d%x$IsFloating$MRUWidth$Panes$PinState$RecentFrameAlignment$RecentRowIndex$RectRecentDocked$RectRecentFloat
                                  • API String ID: 3879667756-2628993547
                                  • Opcode ID: 4056425b080d960785cd1c6d08302dfbdb8592b94b0e264a1e7b81b754543201
                                  • Instruction ID: e69f0bda812f68a3c29065c82eca1b054e2904dcb2d71c990dbaf8e695f7696f
                                  • Opcode Fuzzy Hash: 4056425b080d960785cd1c6d08302dfbdb8592b94b0e264a1e7b81b754543201
                                  • Instruction Fuzzy Hash: 1C51B676A00129AFCF04DF64C894AFD7776FF49314B140468E816AB391DB39AE15CBA1
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDD6B7E
                                  • SetCursor.USER32(?,00000048,6BDD6025,00000000,00000200,00000000), ref: 6BDD6C1D
                                    • Part of subcall function 6BDA3959: __EH_prolog3.LIBCMT ref: 6BDA3960
                                    • Part of subcall function 6BDA3959: GetDC.USER32(00000000), ref: 6BDA398C
                                    • Part of subcall function 6BDC0535: __EH_prolog3_GS.LIBCMT ref: 6BDC053C
                                    • Part of subcall function 6BDC0535: CreateRectRgnIndirect.GDI32(?), ref: 6BDC0574
                                    • Part of subcall function 6BDC0535: CopyRect.USER32(?,?), ref: 6BDC0588
                                    • Part of subcall function 6BDC0535: InflateRect.USER32(?,?,?), ref: 6BDC059E
                                    • Part of subcall function 6BDC0535: IntersectRect.USER32(?,?,?), ref: 6BDC05AA
                                    • Part of subcall function 6BDC0535: CreateRectRgnIndirect.GDI32(?), ref: 6BDC05B4
                                    • Part of subcall function 6BDC0535: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6BDC05C9
                                    • Part of subcall function 6BDC0535: CombineRgn.GDI32(?,?,?,00000003), ref: 6BDC05E3
                                    • Part of subcall function 6BDC0535: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6BDC062A
                                    • Part of subcall function 6BDC0535: SetRectRgn.GDI32(?,?,00000004,?,?), ref: 6BDC0647
                                    • Part of subcall function 6BDC0535: CopyRect.USER32(?,?), ref: 6BDC0652
                                    • Part of subcall function 6BDA39AE: ReleaseDC.USER32(?,00000000), ref: 6BDA39E2
                                  • GetFocus.USER32 ref: 6BDD6CB4
                                  • SetTimer.USER32(?,0000EC07,000001F4,00000000), ref: 6BDD6DA5
                                  • TrackMouseEvent.USER32(?,?,?,?,?,?,00000000), ref: 6BDD6DDC
                                  • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 6BDD6E62
                                  • InvalidateRect.USER32(?,?,00000001,?,?,?,?,?,?,00000000), ref: 6BDD6F9D
                                  • InflateRect.USER32(?,00000000,?), ref: 6BDD6FE3
                                  • RedrawWindow.USER32(?,?,00000000,00000401,?,?,?,?,?,00000000), ref: 6BDD6FF6
                                  • KillTimer.USER32(?,0000EC07,?,?,?,?,?,00000000), ref: 6BDD7085
                                  • SetTimer.USER32(?,0000EC07,000001F4,00000000), ref: 6BDD70A3
                                  • UpdateWindow.USER32(?), ref: 6BDD70CC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Create$Timer$CopyH_prolog3_IndirectInflateWindow$CombineCursorEventFocusH_prolog3IntersectInvalidateKillMessageMouseRedrawReleaseSendTrackUpdate
                                  • String ID:
                                  • API String ID: 3035320136-0
                                  • Opcode ID: 9fb5a4ea404b13671cdd9bc3e9392864bede605ae3c0510881ce468fd5090baa
                                  • Instruction ID: 822a5fd8097053d72411b6ab90ef8fb6282b5c77430e7379b093f4ff6339865a
                                  • Opcode Fuzzy Hash: 9fb5a4ea404b13671cdd9bc3e9392864bede605ae3c0510881ce468fd5090baa
                                  • Instruction Fuzzy Hash: F2F1B135A00616EFCB14CF74C894BADBBB5FF04334F104269E869AB2D0DB38A955DB90
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BE56A9A
                                  • GetObjectW.GDI32(00000018,00000018,00000000), ref: 6BE56AB1
                                    • Part of subcall function 6BE569F0: CreateDIBSection.GDI32(00000000,00000028,00000000,?,00000000,00000000), ref: 6BE56A67
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BE56B31
                                  • SelectObject.GDI32(?,00000018), ref: 6BE56B44
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BE56B62
                                  • SelectObject.GDI32(?,?), ref: 6BE56B77
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6BE56B96
                                  • SelectObject.GDI32(?,00000000), ref: 6BE56BA4
                                  • SelectObject.GDI32(?,00000000), ref: 6BE56BAE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Object$Select$Create$Compatible$H_prolog3Section
                                  • String ID:
                                  • API String ID: 2431383920-3916222277
                                  • Opcode ID: 51f0f9dee5690569a5135e6bc599f2b5cd2cff44ca20b3e425d17a3afa047107
                                  • Instruction ID: 8fefa1c420ac597954c808441ebbee513c6fc8e89cfe1335db53c4d3fa5f9726
                                  • Opcode Fuzzy Hash: 51f0f9dee5690569a5135e6bc599f2b5cd2cff44ca20b3e425d17a3afa047107
                                  • Instruction Fuzzy Hash: CB418F73D00118AFDF01CFF1CC44AAEBBB5FF55318F204129E511AA260DB7A9969CB60
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDAF00C
                                  • SendMessageW.USER32(?,00000000,00000000,00000080), ref: 6BDAF053
                                  • SendMessageW.USER32(?,00000000,00000000,?), ref: 6BDAF07F
                                  • ValidateRect.USER32(?,00000000,?,?,?,?,?,?,?,?,?,?,000000AC), ref: 6BDAF092
                                    • Part of subcall function 6BDC5499: GetClientRect.USER32(?,?), ref: 6BDC54FD
                                  • GetClientRect.USER32(?,?), ref: 6BDAF103
                                  • BeginPaint.USER32(?,?,?,?,?,?,?,?,?,?,?,?,000000AC), ref: 6BDAF110
                                  • SendMessageW.USER32(?,00000000,00000000,?), ref: 6BDAF146
                                  • SendMessageW.USER32(?,00000000,00000000), ref: 6BDAF168
                                  • EndPaint.USER32(?,?,?,?,?,?,?,?,?,?,?,?,000000AC), ref: 6BDAF180
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessageSend$Rect$ClientPaint$BeginH_prolog3_Validate
                                  • String ID: W
                                  • API String ID: 3883544035-655174618
                                  • Opcode ID: bf13e1364a5183ff0ac0f7edd85306f8d096a96a4052a58714a2cd90c1a93ee2
                                  • Instruction ID: d3ad08de41173f924fa5811aad3e0a7a239cc9a82ade19c09f9f294ffde6c310
                                  • Opcode Fuzzy Hash: bf13e1364a5183ff0ac0f7edd85306f8d096a96a4052a58714a2cd90c1a93ee2
                                  • Instruction Fuzzy Hash: C6419272910605DBDF119F71CC95E6EBBBAFF88328F1045ADE156AB120DB389A44DF20
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDBFA00
                                  • GetObjectW.GDI32(?,00000018,?), ref: 6BDBFA1D
                                  • GetSystemMetrics.USER32(00000032), ref: 6BDBFA30
                                  • GetSystemMetrics.USER32(00000031), ref: 6BDBFA3B
                                  • GetMenuItemInfoW.USER32(00000000,?,00000000,00000030), ref: 6BDBFA7D
                                  • GetMenuItemInfoW.USER32(00000000,?,00000000,00000030), ref: 6BDBFAA8
                                  • GetSystemMetrics.USER32(0000000F), ref: 6BDBFB10
                                  • GetSystemMetrics.USER32(0000000F), ref: 6BDBFB1C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MetricsSystem$InfoItemMenu$H_prolog3Object
                                  • String ID: 0$@
                                  • API String ID: 414968830-1545510068
                                  • Opcode ID: 200314afc76649c522b0998693a86ba0b666c7fb5ad12c831aca6964963147ee
                                  • Instruction ID: 818f34c35aafe93f84de27f0aabee994e1836bedfc8a20f2c46f4430e5a2f497
                                  • Opcode Fuzzy Hash: 200314afc76649c522b0998693a86ba0b666c7fb5ad12c831aca6964963147ee
                                  • Instruction Fuzzy Hash: D8416C76D10219ABCF14CFA0CC46BEDB7B5FF14724F104415E916BB291DB74AA08CBA0
                                  APIs
                                  • CoInitialize.OLE32(00000000), ref: 6BDC573C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Initialize
                                  • String ID: D2D1.dll$D2D1CreateFactory$D2D1MakeRotateMatrix$DWrite.dll$DWriteCreateFactory
                                  • API String ID: 2538663250-1403614551
                                  • Opcode ID: a044f60432a4e48bbfeb728bc41d0017842a2fd3ff0a9a4bb13c87f242dca11f
                                  • Instruction ID: e22c955a90fa0b229781d861cdd31cf77ec8f17288d20c3cb5003bddcbabada9
                                  • Opcode Fuzzy Hash: a044f60432a4e48bbfeb728bc41d0017842a2fd3ff0a9a4bb13c87f242dca11f
                                  • Instruction Fuzzy Hash: D021E076624705EFD7208FA4DC89F137AACEF41769F104A39E657865A0EB39D8048A24
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDDE352
                                  • GetClientRect.USER32(?,?), ref: 6BDDE370
                                  • SetRectEmpty.USER32(?), ref: 6BDDE3C4
                                  • MapWindowPoints.USER32(?,?,?,00000002), ref: 6BDDE40F
                                  • MapWindowPoints.USER32(?,?,?,00000002), ref: 6BDDE498
                                  • GetWindowRect.USER32(?,?), ref: 6BDDE4BD
                                  • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,00CC0020), ref: 6BDDE4E9
                                  • OffsetRect.USER32(?,00000000,00000000), ref: 6BDDE597
                                  • InflateRect.USER32(?,00000000,00000000), ref: 6BDDE5F5
                                  • IsRectEmpty.USER32(?), ref: 6BDDE6F3
                                  • IsRectEmpty.USER32(?), ref: 6BDDE883
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$EmptyWindow$Points$ClientH_prolog3_InflateOffset
                                  • String ID:
                                  • API String ID: 302641110-0
                                  • Opcode ID: 7fe4ae7666c8c878c57f8fe85aff0b957a2e35d5a581475fbb6a8f8f0b315f0b
                                  • Instruction ID: f2e2448ebba8ac89766866c5806f27569a13290d9b72b833a41077ecc37180e3
                                  • Opcode Fuzzy Hash: 7fe4ae7666c8c878c57f8fe85aff0b957a2e35d5a581475fbb6a8f8f0b315f0b
                                  • Instruction Fuzzy Hash: 02129C36E10619DFDF05CFA4C844AEEBBB6FF4A320F100169E856AF254DB75A905CB90
                                  APIs
                                  • EnableMenuItem.USER32(?,0000420F,00000001), ref: 6BDD5C7C
                                  • EnableMenuItem.USER32(?,0000420E,00000001), ref: 6BDD5C97
                                  • CheckMenuItem.USER32(?,00004214,00000008), ref: 6BDD5CCB
                                  • CheckMenuItem.USER32(?,00004212,00000008), ref: 6BDD5CDD
                                  • CheckMenuItem.USER32(?,00004213,00000008), ref: 6BDD5CF0
                                  • EnableMenuItem.USER32(?,00004212,00000001), ref: 6BDD5D12
                                  • EnableMenuItem.USER32(?,00004212,00000001), ref: 6BDD5D41
                                  • EnableMenuItem.USER32(?,00004213,00000001), ref: 6BDD5D50
                                  • EnableMenuItem.USER32(?,00004214,00000001), ref: 6BDD5D5F
                                  • EnableMenuItem.USER32(?,00004215,00000001), ref: 6BDD5DB1
                                  • CheckMenuItem.USER32(?,00004215,00000008), ref: 6BDD5DC9
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ItemMenu$Enable$Check
                                  • String ID:
                                  • API String ID: 1852492618-0
                                  • Opcode ID: c39e974a96b087a9ac2e36773db2dd738aeda52ff6ca3059219bbca75eb8e112
                                  • Instruction ID: 822d73da513bd604e9c4dc9d2d69ff6f99359dcd92f70b5195a2fd0df2c004e5
                                  • Opcode Fuzzy Hash: c39e974a96b087a9ac2e36773db2dd738aeda52ff6ca3059219bbca75eb8e112
                                  • Instruction Fuzzy Hash: 5751BC34A40615EFDF11CF28C948A99BBB0FF15B24F4082A5FA59AF2A5D774D900DFA0
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDC7ACD
                                  • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 6BDC7CA5
                                  • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 6BDC7E6D
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 6BDC7E93
                                  • UpdateWindow.USER32(?), ref: 6BDC7EB5
                                  • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 6BDC7F72
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 6BDC7F98
                                  • UpdateWindow.USER32(?), ref: 6BDC7FBA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessageSend$InvalidateRectUpdateWindow$H_prolog3_
                                  • String ID: :/\
                                  • API String ID: 2009545923-2793184486
                                  • Opcode ID: 78093114a558b93980bd92f422005dc3b95a7837070ac2a20f5ad3e619ab0b66
                                  • Instruction ID: 1dc50da0d4ebf05d420c6ec9962d27d70952eb0ba6ff3898ca28ded805c5805f
                                  • Opcode Fuzzy Hash: 78093114a558b93980bd92f422005dc3b95a7837070ac2a20f5ad3e619ab0b66
                                  • Instruction Fuzzy Hash: 21F13C35610218DFCF14EB24CC99BADB7B9BF89315F1005E8D506AB2A1DB38AE49CF51
                                  APIs
                                    • Part of subcall function 6BDC52DD: __EH_prolog3_catch.LIBCMT ref: 6BDC52E4
                                  • GetModuleHandleW.KERNEL32(comctl32.dll,6BE1C48D,?,00000000,?,?,6BDCC384,?,?,?,0000001C,6BDCB1E1,?,?), ref: 6BE1C341
                                  • GetUserDefaultUILanguage.KERNEL32(?,?,6BDCC384,?,?,?,0000001C,6BDCB1E1,?,?), ref: 6BE1C351
                                  • FindResourceExW.KERNEL32(00000000,00000005,000003EE,0000FC11,?,?,6BDCC384,?,?,?,0000001C,6BDCB1E1,?,?), ref: 6BE1C38F
                                  • FindResourceW.KERNEL32(00000000,000003EE,00000005,?,?,6BDCC384,?,?,?,0000001C,6BDCB1E1,?,?), ref: 6BE1C3AE
                                  • LoadResource.KERNEL32(00000000,00000000,?,?,6BDCC384,?,?,?,0000001C,6BDCB1E1,?,?), ref: 6BE1C3BA
                                    • Part of subcall function 6BE1C4CB: GetDC.USER32(00000000), ref: 6BE1C51E
                                    • Part of subcall function 6BE1C4CB: EnumFontFamiliesExW.GDI32(00000000,?,6BE1C4B5,?,00000000,?,?,?,?,?,00000000,00000000), ref: 6BE1C539
                                    • Part of subcall function 6BE1C4CB: ReleaseDC.USER32(00000000,00000000), ref: 6BE1C541
                                  • GlobalAlloc.KERNEL32(00000040,00000000,?,?,?,0000001C,6BDCB1E1,?,?), ref: 6BE1C3EA
                                  • GlobalFree.KERNEL32(00000001), ref: 6BE1C462
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Resource$FindGlobal$AllocDefaultEnumFamiliesFontFreeH_prolog3_catchHandleLanguageLoadModuleReleaseUser
                                  • String ID: MS UI Gothic$comctl32.dll
                                  • API String ID: 1488066090-3248924666
                                  • Opcode ID: 1ea9ddee6f0e839fc30666fbd1a682139b269e737bf173239a22d4d73df4dcc3
                                  • Instruction ID: dac40792d295024be2889037fcf31d090fe8170850ce3499a63905c4f405c943
                                  • Opcode Fuzzy Hash: 1ea9ddee6f0e839fc30666fbd1a682139b269e737bf173239a22d4d73df4dcc3
                                  • Instruction Fuzzy Hash: F441DE32308605ABE7006B78DC45B7B73ACEF45B29F208079F926DF380DB78D9408662
                                  APIs
                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6BDB0BF1
                                  • GetPropW.USER32(?,AfxOldWndProc423), ref: 6BDB0C08
                                  • CallWindowProcW.USER32(?,?,00000110,?,?), ref: 6BDB0C68
                                    • Part of subcall function 6BDB0A06: GetWindowRect.USER32(?,6BDA128B), ref: 6BDB0A3F
                                    • Part of subcall function 6BDB0A06: GetWindow.USER32(?,00000004), ref: 6BDB0A5C
                                  • SetWindowLongW.USER32(?,000000FC,?), ref: 6BDB0C8B
                                  • RemovePropW.USER32(?,AfxOldWndProc423), ref: 6BDB0C97
                                  • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 6BDB0CA2
                                  • GlobalDeleteAtom.KERNEL32(?), ref: 6BDB0CAC
                                    • Part of subcall function 6BDB09E2: GetWindowRect.USER32(?,00000000), ref: 6BDB09EF
                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 6BDB0CF4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$AtomCallGlobalProcPropRect$DeleteFindH_prolog3_catch_LongRemove
                                  • String ID: AfxOldWndProc423
                                  • API String ID: 3351853316-1060338832
                                  • Opcode ID: 9d74db532a4d58f1a9ed404609c231cba56de3166fc5a67361792ce46ebe338c
                                  • Instruction ID: 756ff60b231cac25ce43d0496ed617a440fe56b6acbb371b0bc7bb89d1b1357f
                                  • Opcode Fuzzy Hash: 9d74db532a4d58f1a9ed404609c231cba56de3166fc5a67361792ce46ebe338c
                                  • Instruction Fuzzy Hash: 9131BCB6811208FBCB049FB4CE49DEE7B79EF5A364B10050AF603BA150DB389A41DB74
                                  APIs
                                  • GetDC.USER32(00000000), ref: 6BDA8BA4
                                  • GetSystemMetrics.USER32(00000048), ref: 6BDA8BC6
                                  • CreateFontW.GDI32(00000000), ref: 6BDA8BCD
                                  • SelectObject.GDI32(00000000,00000000), ref: 6BDA8BDB
                                  • GetCharWidthW.GDI32(00000000,00000036,00000036,6BF708FC), ref: 6BDA8BED
                                  • SelectObject.GDI32(00000000,00000000), ref: 6BDA8BF9
                                  • DeleteObject.GDI32(00000000), ref: 6BDA8C00
                                  • ReleaseDC.USER32(00000000,00000000), ref: 6BDA8C09
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Object$Select$CharCreateDeleteFontMetricsReleaseSystemWidth
                                  • String ID: Marlett
                                  • API String ID: 1397664628-3688754224
                                  • Opcode ID: 0e4c2288277e9cd52773e102e872fce34bfa9a72933994fd741195a646f39765
                                  • Instruction ID: 1509b8c3790678b8a85123048b5e5a3c6e26d135774a60f4e9844c6e51c098dc
                                  • Opcode Fuzzy Hash: 0e4c2288277e9cd52773e102e872fce34bfa9a72933994fd741195a646f39765
                                  • Instruction Fuzzy Hash: 2F018B73650690BBDA321A728C4CF6B3E7CDFD7F62F000158F616D61D0CA6A8909CA70
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cef4f29cdef6b615d372caea02cae1ba500c4a151f827d1280d544231910b3bd
                                  • Instruction ID: bf27eaa5e70d510289e69811eedc8fe350bee29fbd7800062cb7a3f258996cfa
                                  • Opcode Fuzzy Hash: cef4f29cdef6b615d372caea02cae1ba500c4a151f827d1280d544231910b3bd
                                  • Instruction Fuzzy Hash: 2402A939A40619EFCB01CF69C880A9EB7B2FF4A720B2145A9E915EF311D735ED45CB90
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BE28ED3
                                    • Part of subcall function 6BDA3A38: __EH_prolog3.LIBCMT ref: 6BDA3A3F
                                    • Part of subcall function 6BDA3A38: GetWindowDC.USER32(00000000,00000004,6BDBDFDA,00000000), ref: 6BDA3A6B
                                  • GetClientRect.USER32(?,?), ref: 6BE28EFD
                                  • GetWindowRect.USER32(?,?), ref: 6BE28F14
                                    • Part of subcall function 6BDA3B50: ScreenToClient.USER32(?,6BDB8FA1), ref: 6BDA3B5F
                                    • Part of subcall function 6BDA3B50: ScreenToClient.USER32(?,6BDB8FA9), ref: 6BDA3B6C
                                  • OffsetRect.USER32(?,?,?), ref: 6BE28F36
                                    • Part of subcall function 6BDA351D: ExcludeClipRect.GDI32(?,?,?,?,?), ref: 6BDA3554
                                    • Part of subcall function 6BDA351D: ExcludeClipRect.GDI32(00000000,?,?,?,?), ref: 6BDA3571
                                    • Part of subcall function 6BDBB6AC: GetWindowLongW.USER32(?,000000EC), ref: 6BDBB6B9
                                  • GetWindowRect.USER32(?,?), ref: 6BE28F8A
                                  • GetRgnBox.GDI32(?,?), ref: 6BE28FA5
                                  • OffsetRect.USER32(?,?,?), ref: 6BE28FBF
                                  • CreateRectRgnIndirect.GDI32(?), ref: 6BE28FD9
                                    • Part of subcall function 6BDA35DF: ExtSelectClipRgn.GDI32(?,00000000,?), ref: 6BDA3602
                                    • Part of subcall function 6BDA35DF: ExtSelectClipRgn.GDI32(?,00000000,?), ref: 6BDA361B
                                  • OffsetRgn.GDI32(?,?,?), ref: 6BE29014
                                  • OffsetRect.USER32(?,?,?), ref: 6BE29035
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$ClipOffsetWindow$Client$ExcludeScreenSelect$CreateH_prolog3H_prolog3_IndirectLong
                                  • String ID:
                                  • API String ID: 3148124242-0
                                  • Opcode ID: 41c3b13ad285857b291fa3c84b4279bb5f3336714c2d624250c50bcbc2151584
                                  • Instruction ID: 22e28fd7bbf4b1a471d810db83312369408b5af444199bb2a0c0dbcfd00abe43
                                  • Opcode Fuzzy Hash: 41c3b13ad285857b291fa3c84b4279bb5f3336714c2d624250c50bcbc2151584
                                  • Instruction Fuzzy Hash: 32913D76D1022C9FCF01DFA4CC95AEEBBBAFF09318F154119E406AB250DB34AA44CB50
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 6BDE2637
                                  • ScreenToClient.USER32(?,?), ref: 6BDE2644
                                  • PtInRect.USER32(?,?,?), ref: 6BDE2683
                                  • PtInRect.USER32(?,?,?), ref: 6BDE26A8
                                  • KillTimer.USER32(0000EC16,0000EC16), ref: 6BDE26DB
                                  • InvalidateRect.USER32(00000001,?,00000001), ref: 6BDE26F3
                                  • InvalidateRect.USER32(00000001,?,00000001), ref: 6BDE2705
                                  • KillTimer.USER32(00000000,0000EC15), ref: 6BDE286C
                                  • ValidateRect.USER32(00000000,00000000), ref: 6BDE2899
                                  • RedrawWindow.USER32(00000000,00000000,00000000,00000185,00000000,00000000,00000000), ref: 6BDE28D6
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$InvalidateKillTimer$ClientCursorRedrawScreenValidateWindow
                                  • String ID:
                                  • API String ID: 1459077570-0
                                  • Opcode ID: 5192f07fdfd9d9d1de23f716be367e376fd297bc4aae51fcb6598e31b37faaf1
                                  • Instruction ID: a46194cd69d5ae6591b8fecc5e52fcf11f3a37968f8817dea665ab00db1a3b8f
                                  • Opcode Fuzzy Hash: 5192f07fdfd9d9d1de23f716be367e376fd297bc4aae51fcb6598e31b37faaf1
                                  • Instruction Fuzzy Hash: D8917271A0061AEFCB09DF74C994AADF7B8FF09328F00026AE456E7251DB34A951DF60
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Cursor$Window$CaptureKillLoadParentRectReleaseTimerUpdate
                                  • String ID:
                                  • API String ID: 2135910768-0
                                  • Opcode ID: 2085cb89c01108c71fdc327c18d68efa53ce41eb66218fac1f2aceb213e9e782
                                  • Instruction ID: 1544d71b73e50a08a43e5138d5fa3fbcf3210ba333f7afb2acc6fd53d21c638a
                                  • Opcode Fuzzy Hash: 2085cb89c01108c71fdc327c18d68efa53ce41eb66218fac1f2aceb213e9e782
                                  • Instruction Fuzzy Hash: F171C531E54119DBDF04DB78C894BAFBB79FB45324F1015A5E846AB250CB38AD418FA2
                                  APIs
                                    • Part of subcall function 6BDAB3C8: __EH_prolog3_catch.LIBCMT ref: 6BDAB3CF
                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 6BE52384
                                  • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 6BE523B9
                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 6BE523E4
                                  • LoadIconW.USER32(?,00000000), ref: 6BE52419
                                  • LoadIconW.USER32(00000000,00007F00), ref: 6BE5242C
                                  • GetClassLongW.USER32(?,000000F2), ref: 6BE5245B
                                  • SendMessageW.USER32(?,00000146,00000000,00000000), ref: 6BE524E4
                                  • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 6BE524A6
                                    • Part of subcall function 6BDF10CE: __EH_prolog3_catch.LIBCMT ref: 6BDF10D8
                                    • Part of subcall function 6BDF10CE: CloseHandle.KERNEL32(00000000,?,00000000,00000080,6BE52BD1,?,00000000,?,?,00000000), ref: 6BDF1113
                                    • Part of subcall function 6BDF10CE: GetTempPathW.KERNEL32(00000104,00000000,00000104,?,00000000,00000080,6BE52BD1,?,00000000,?,?,00000000), ref: 6BDF1134
                                    • Part of subcall function 6BDF10CE: CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000002,04000100,00000000,000000FF,?,00000104,000000FF,?,?,00000000), ref: 6BDF1189
                                  • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6BE5259B
                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6BE525B5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessageSend$H_prolog3_catchIconLoad$ClassCloseCreateFileHandleLongPathTemp
                                  • String ID:
                                  • API String ID: 2083023585-0
                                  • Opcode ID: 25b68ad83d9bb10c34cd252e3738cc2bc194e7875e62716b28a8096cc1430e60
                                  • Instruction ID: ff9b48cf12cce80c0ff34309af034cbeac0c9f4359eac249e67f201b4aac5e6c
                                  • Opcode Fuzzy Hash: 25b68ad83d9bb10c34cd252e3738cc2bc194e7875e62716b28a8096cc1430e60
                                  • Instruction Fuzzy Hash: 4E71AF31210614ABCF159F24CC88BAE3B65FF45765F1401BAED1AAF3A1CB75A911CFA0
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BE2475E
                                  • GetObjectW.GDI32(?,00000018,?), ref: 6BE24783
                                  • GetObjectW.GDI32(?,00000054,?), ref: 6BE247C8
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BE248B4
                                  • SelectObject.GDI32(?,?), ref: 6BE248D6
                                  • GetPixel.GDI32(?,00000000,00000000), ref: 6BE24935
                                  • GetPixel.GDI32(?,?,00000000), ref: 6BE24947
                                  • SetPixel.GDI32(?,00000000,00000000,00000000), ref: 6BE24956
                                  • SetPixel.GDI32(?,?,00000000,00000000), ref: 6BE24968
                                  • SelectObject.GDI32(?,00000000), ref: 6BE249B6
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ObjectPixel$Select$CompatibleCreateH_prolog3_
                                  • String ID:
                                  • API String ID: 1266819874-0
                                  • Opcode ID: f28bb01f19fe9b0d56c243188a51b20677ded41d5a8976023f401d4123984241
                                  • Instruction ID: b58aa8477b0cf07593b1174c6dab2655daa220b3d8b675f4d6a8569bd39be1ce
                                  • Opcode Fuzzy Hash: f28bb01f19fe9b0d56c243188a51b20677ded41d5a8976023f401d4123984241
                                  • Instruction Fuzzy Hash: 99812971E102298BDB24CFA9CC84A9DBBB5FF49304F2081AAE959EB311DB349D55CF50
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 6BDDC558
                                  • ScreenToClient.USER32(?,?), ref: 6BDDC565
                                  • KillTimer.USER32(?,0000EC17), ref: 6BDDC57D
                                  • PtInRect.USER32(?,?,?), ref: 6BDDC5AC
                                  • KillTimer.USER32(?,0000EC18), ref: 6BDDC63B
                                  • GetParent.USER32(?), ref: 6BDDC650
                                  • PtInRect.USER32(?,?,?), ref: 6BDDC67C
                                  • KillTimer.USER32(?,0000EC07), ref: 6BDDC6DB
                                  • GetClientRect.USER32(?,?), ref: 6BDDC6EF
                                  • PtInRect.USER32(?,?,?), ref: 6BDDC6FF
                                    • Part of subcall function 6BDBBA35: ShowWindow.USER32(?,00000000,?,?,6BDB921A,00000000), ref: 6BDBBA46
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$KillTimer$Client$CursorParentScreenShowWindow
                                  • String ID:
                                  • API String ID: 966434589-0
                                  • Opcode ID: 4f07f2df0be4cb8859b9273eeabaabba2fda0d80b3a467ed4cdf2dd5f249c648
                                  • Instruction ID: edeb3971d83a6b45cc84e9851e25478df67c3ae53282e590ea4a406edcbf8914
                                  • Opcode Fuzzy Hash: 4f07f2df0be4cb8859b9273eeabaabba2fda0d80b3a467ed4cdf2dd5f249c648
                                  • Instruction Fuzzy Hash: 9D51B535A10216EFDF058F68C844FBEBB79FF09714F04019AE856AB250DB38A951DFA1
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDB7645
                                  • GetMenuItemCount.USER32(?), ref: 6BDB7671
                                  • GetSubMenu.USER32(?,00000000), ref: 6BDB76A7
                                  • GetMenuState.USER32(?,?,00000400), ref: 6BDB76C4
                                  • GetSubMenu.USER32(?,00000000), ref: 6BDB7721
                                  • GetMenuStringW.USER32(?,?,?,00000100,00000400), ref: 6BDB774A
                                  • AppendMenuW.USER32(?,00000010,?,?), ref: 6BDB77D2
                                  • GetMenuItemCount.USER32(00000000), ref: 6BDB7842
                                  • InsertMenuW.USER32(?,00000000,?,00000000), ref: 6BDB786F
                                  • GetMenuItemID.USER32(?,?), ref: 6BDB78A0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Menu$Item$Count$AppendH_prolog3_InsertStateString
                                  • String ID:
                                  • API String ID: 2171526683-0
                                  • Opcode ID: ea32811d817752b809b34f9b4cb62a9b42dfa4a9d03ff3df4702d6e4ae8f49ba
                                  • Instruction ID: b6d9c8b5e7b7879755b49aaba3676caa55c3f42671403b42a716b3cdcb612d33
                                  • Opcode Fuzzy Hash: ea32811d817752b809b34f9b4cb62a9b42dfa4a9d03ff3df4702d6e4ae8f49ba
                                  • Instruction Fuzzy Hash: D06106B1D41228EBDF25DF64CC89BD9B7B5BB18314F1040E9E40AAA260DB399EC5DF50
                                  APIs
                                  • DefWindowProcW.USER32(?,00000046,00000000,?,?), ref: 6BDC48FF
                                  • GetWindowRect.USER32(?,?), ref: 6BDC491E
                                  • SetRect.USER32(?,?,00000000,?,?), ref: 6BDC495D
                                  • InvalidateRect.USER32(?,?,00000001), ref: 6BDC496C
                                  • SetRect.USER32(?,?,00000000,?,?), ref: 6BDC4984
                                  • InvalidateRect.USER32(?,?,00000001), ref: 6BDC4993
                                  • SetRect.USER32(?,00000000,?,?,?), ref: 6BDC49BB
                                  • InvalidateRect.USER32(?,?,00000001), ref: 6BDC49CA
                                  • SetRect.USER32(?,00000000,?,00000001,?), ref: 6BDC49E1
                                  • InvalidateRect.USER32(?,?,00000001), ref: 6BDC49F0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Invalidate$Window$Proc
                                  • String ID:
                                  • API String ID: 570070710-0
                                  • Opcode ID: 8f70c314938eff574e8010b94765ba5bbadd078df76403b4a6ecd55581cff0ff
                                  • Instruction ID: c1926d8d52555c381ca9db371ee6bb62835ae10ec36ab76c13a93f26899d182e
                                  • Opcode Fuzzy Hash: 8f70c314938eff574e8010b94765ba5bbadd078df76403b4a6ecd55581cff0ff
                                  • Instruction Fuzzy Hash: A4411872910259AFDF10CFA4CD89FAFBBB9FF19304F100129F646A61A0DB70A944CB61
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDC2243
                                  • ClientToScreen.USER32(?,?), ref: 6BDC2262
                                  • GetSystemMetrics.USER32(00000025), ref: 6BDC226A
                                  • GetSystemMetrics.USER32(00000025), ref: 6BDC2280
                                  • GetSystemMetrics.USER32(00000024), ref: 6BDC2294
                                  • GetSystemMetrics.USER32(00000024), ref: 6BDC22A8
                                  • CreateEllipticRgn.GDI32(00000000,00000000,00000020,00000020,?,00007921,?,?,?,?,00000010), ref: 6BDC2321
                                  • SetWindowRgn.USER32(?,?,00000001), ref: 6BDC2338
                                  • SetCapture.USER32(?,?,00007921,?,?,?,?,00000010), ref: 6BDC2341
                                  • SetTimer.USER32(?,0000EC08,00000032,00000000), ref: 6BDC235A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MetricsSystem$CaptureClientCreateEllipticH_prolog3ScreenTimerWindow
                                  • String ID:
                                  • API String ID: 3001615190-0
                                  • Opcode ID: 6d69af87d834ccb6c9814a7387a2a7a8b3909d290bcb933793c936f8c984c9ab
                                  • Instruction ID: 0936aaee5e377488a49112f63d2be15e79920743b74c3d06dd57c8413d80b331
                                  • Opcode Fuzzy Hash: 6d69af87d834ccb6c9814a7387a2a7a8b3909d290bcb933793c936f8c984c9ab
                                  • Instruction Fuzzy Hash: E9316F72A50601AFEB188F74CC4AF6EBB74FF08714F00051CF65AAB291DB75A904CBA0
                                  APIs
                                  • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 6BDA9261
                                  • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 6BDA92AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID: %08lX-%04X-%04x-%02X%02X-%02X%02X%02X%02X%02X%02X$RestartByRestartManager
                                  • API String ID: 410705778-5890034
                                  • Opcode ID: 9ff060f6eb1be80ae7e041676f80e0f6fd6aa859d79ea0268f4c52e1fd65be17
                                  • Instruction ID: 9f3eeea7d302653631d72969514633a3616ef8e82be386330c45a05becddce12
                                  • Opcode Fuzzy Hash: 9ff060f6eb1be80ae7e041676f80e0f6fd6aa859d79ea0268f4c52e1fd65be17
                                  • Instruction Fuzzy Hash: 28B1C532A00119EFCF05DFB4D854ABEBBB9FF49224F044469F911AB251EB399E05DB60
                                  APIs
                                  • LoadLibraryW.KERNEL32(Comctl32.dll,00000000,00000000,00000002,Comctl32.dll,00000040), ref: 6BDA0E80
                                    • Part of subcall function 6BDA0CAC: GetProcAddress.KERNEL32(00000000,6BDAA2CF), ref: 6BDA0CDA
                                  • GetModuleFileNameW.KERNEL32(?,?,00000105,?,6BDAA257,?,6BF62380,00000010,6BDAF2FD,?), ref: 6BDA0D9A
                                  • SetLastError.KERNEL32(0000006F,?,6BDAA257,?,6BF62380,00000010,6BDAF2FD,?), ref: 6BDA0DAE
                                  • GetLastError.KERNEL32(00000020), ref: 6BDA0E05
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ErrorLast$AddressFileLibraryLoadModuleNameProc
                                  • String ID: $@$Comctl32.dll$GetModuleHandleExW
                                  • API String ID: 3640817601-4183358198
                                  • Opcode ID: 3ed451b3c6854452ffa5c9672e464cf199c909c76499b0ac2f2e2b3435f60ca5
                                  • Instruction ID: 1b38f128995fd6403cb48a24b4e49f4de1c5e1438606093dce0c8772a343f6ac
                                  • Opcode Fuzzy Hash: 3ed451b3c6854452ffa5c9672e464cf199c909c76499b0ac2f2e2b3435f60ca5
                                  • Instruction Fuzzy Hash: C941CA72910214DAEB208B74DC48B9EB7B9EB447B0F1005E6E414EA190DB7DCB84DF61
                                  APIs
                                  • EnterCriticalSection.KERNEL32(6BF79BF4,?,00000000,?,6BDD1275,00000001,00000000,?,?,6BDD0F0B,?,00000000,?,?), ref: 6BE38E56
                                  • SetThreadPriority.KERNEL32(00000000,000000FF,?,00000000), ref: 6BE38E87
                                  • LeaveCriticalSection.KERNEL32(6BF79BF4,?,00000000), ref: 6BE38E9D
                                  • PlaySoundW.WINMM(MenuCommand,00000000,00012002), ref: 6BE38EEE
                                  • Sleep.KERNEL32(00000005,00000000,6BF79BF4,00000000,?,00000000,?,6BDD1275,00000001,00000000,?,?,6BDD0F0B,?,00000000,?), ref: 6BE38F19
                                  • PlaySoundW.WINMM(00000000,00000000,00000040), ref: 6BE38F2E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CriticalPlaySectionSound$EnterLeavePrioritySleepThread
                                  • String ID: MenuCommand$MenuPopup
                                  • API String ID: 2370138168-2036262055
                                  • Opcode ID: 4b1c6b09774d47cbcfca1045a2b82cdf8975a667d262bf470e53fa4c80cf5da8
                                  • Instruction ID: be71defd905149a3999bf64c43570a5496004a0067469066e8c49f965b377650
                                  • Opcode Fuzzy Hash: 4b1c6b09774d47cbcfca1045a2b82cdf8975a667d262bf470e53fa4c80cf5da8
                                  • Instruction Fuzzy Hash: 8E31B432868235AFDB101A2AEC49F163B68A783735F3043A6E534D56E0D7BCC459CBA0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Resource$FindHandleLoadLockModuleSizeof
                                  • String ID: $$AFX_DIALOG_LAYOUT$CONFIG
                                  • API String ID: 1601749889-1968922069
                                  • Opcode ID: 8fdf0a9ad21e4b8225a9901eed5dc48b905e75124faf3e11ef1eef68e0eb789a
                                  • Instruction ID: 1023fc82d2935733db5408799b350c16fca7ebaae078558bd0654c06e8988b41
                                  • Opcode Fuzzy Hash: 8fdf0a9ad21e4b8225a9901eed5dc48b905e75124faf3e11ef1eef68e0eb789a
                                  • Instruction Fuzzy Hash: 114171B4D04309DFCB40EFA8D18969DBBF0BF09710F10496AE889EB314E7389959CB56
                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 6BDAA52A
                                  • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6BDAA53A
                                  • EncodePointer.KERNEL32(00000000), ref: 6BDAA543
                                  • DecodePointer.KERNEL32(00000000), ref: 6BDAA551
                                  • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 6BDAA579
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeDirectoryEncodeHandleModuleProcSystem
                                  • String ID: SetDefaultDllDirectories$\$kernel32.dll
                                  • API String ID: 2101061299-3881611067
                                  • Opcode ID: 31ee74e5d1d0afb9c5b98f98d9e522f3dbd4b1f29e6ef4b7c35afaa5bfdcb19b
                                  • Instruction ID: fe3727564751ccd11caff816108d9c0c282986513078ceea2d6e1154822de372
                                  • Opcode Fuzzy Hash: 31ee74e5d1d0afb9c5b98f98d9e522f3dbd4b1f29e6ef4b7c35afaa5bfdcb19b
                                  • Instruction Fuzzy Hash: A221AE72A50218ABCB10DF79DC49B9A3BACAB15760F0005A5FC06EA150EB78D644DEA8
                                  APIs
                                  • GetStockObject.GDI32(00000011), ref: 6BDCC876
                                  • GetStockObject.GDI32(0000000D), ref: 6BDCC882
                                  • GetObjectW.GDI32(00000000,0000005C,?), ref: 6BDCC893
                                  • GetDC.USER32(00000000), ref: 6BDCC8A2
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6BDCC8B9
                                  • MulDiv.KERNEL32(?,00000048,00000000), ref: 6BDCC8C5
                                  • ReleaseDC.USER32(00000000,00000000), ref: 6BDCC8D1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Object$Stock$CapsDeviceRelease
                                  • String ID: System
                                  • API String ID: 46613423-3470857405
                                  • Opcode ID: 8d1f30f7019619e3ba71693612604f6f54aee7d0fd6b97a3ead353ec28bd6e9c
                                  • Instruction ID: 706b294e3fbbb772b9bc5f227d142911c7edf017cfd0dba2938a2adf6f7578a4
                                  • Opcode Fuzzy Hash: 8d1f30f7019619e3ba71693612604f6f54aee7d0fd6b97a3ead353ec28bd6e9c
                                  • Instruction Fuzzy Hash: A411AC72B00308ABEB189B65CC49BBF7BBDEB55B11F000029F606EB180DB78D804D7A5
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$ActiveFocus$MessageSend
                                  • String ID: u
                                  • API String ID: 1556911595-4067256894
                                  • Opcode ID: 1fd21a03b98d26ea955296a629502310d63e3494c7e783831a91716b42f4a91a
                                  • Instruction ID: 37effa5c01f24f97ad53ae1ed88976ea24511e195e7ee292b32950403322cb8a
                                  • Opcode Fuzzy Hash: 1fd21a03b98d26ea955296a629502310d63e3494c7e783831a91716b42f4a91a
                                  • Instruction Fuzzy Hash: 3E11BF33630604ABEF151B74CC4C76EBA69EF86731B208564F912CE4A5DB3CC506EB50
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BEBC290
                                    • Part of subcall function 6BDC2F60: EnterCriticalSection.KERNEL32(6BF78410,?,?,0000007C,?,6BDAF318,00000001), ref: 6BDC2F91
                                    • Part of subcall function 6BDC2F60: InitializeCriticalSection.KERNEL32(00000000,?,6BDAF318,00000001), ref: 6BDC2FA7
                                    • Part of subcall function 6BDC2F60: LeaveCriticalSection.KERNEL32(6BF78410,?,6BDAF318,00000001), ref: 6BDC2FB5
                                    • Part of subcall function 6BDC2F60: EnterCriticalSection.KERNEL32(00000000,?,0000007C,?,6BDAF318,00000001), ref: 6BDC2FC2
                                  • GetProfileIntW.KERNEL32(windows,DragScrollInset,0000000B), ref: 6BEBC2DB
                                  • GetProfileIntW.KERNEL32(windows,DragScrollDelay,00000032), ref: 6BEBC2EE
                                  • GetProfileIntW.KERNEL32(windows,DragScrollInterval,00000032), ref: 6BEBC301
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CriticalSection$Profile$Enter$H_prolog3InitializeLeave
                                  • String ID: DragScrollDelay$DragScrollInset$DragScrollInterval$windows
                                  • API String ID: 4229786687-1024936294
                                  • Opcode ID: f14e3ec5c70f44f2ac876e69b5db0a2725f83c4f8e2d576f38416d48c9d7e2d5
                                  • Instruction ID: 303efc15f86cb5763342b4f689cac4a9a8dcc02dd8cd0a81bc86551edf7277a7
                                  • Opcode Fuzzy Hash: f14e3ec5c70f44f2ac876e69b5db0a2725f83c4f8e2d576f38416d48c9d7e2d5
                                  • Instruction Fuzzy Hash: 28017CF2950324AFDB209FB88D067497AF8BB49754F40456DE246AB3A1CFB98204CB95
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDB30AE
                                  • GetDesktopWindow.USER32 ref: 6BDB30F4
                                  • GetWindow.USER32(00000000), ref: 6BDB30FB
                                  • IsWindowEnabled.USER32(00000000), ref: 6BDB310B
                                  • SendMessageW.USER32(00000000,0000036C,00000000,00000000), ref: 6BDB3136
                                  • EnableWindow.USER32(00000000,00000000), ref: 6BDB3142
                                  • GetWindow.USER32(00000000,00000002), ref: 6BDB3157
                                  • IsWindow.USER32(00000000), ref: 6BDB31F4
                                  • EnableWindow.USER32(?,00000001), ref: 6BDB3209
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Enable$DesktopEnabledH_prolog3MessageSend
                                  • String ID:
                                  • API String ID: 1053735628-0
                                  • Opcode ID: 538cb46bed0a5073c175ddd691bb22e5db5d05874f696226853e00bf0abda71a
                                  • Instruction ID: 4d5319f33af0f3ac21ad6ca0eecadacc14ae86e2bd2af6d524298912c447af87
                                  • Opcode Fuzzy Hash: 538cb46bed0a5073c175ddd691bb22e5db5d05874f696226853e00bf0abda71a
                                  • Instruction Fuzzy Hash: 2841C2B2900611ABEB318F74CC45B9F77B8AF017B4F004469E91BBE250EF39D905AB60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDB9DAF
                                    • Part of subcall function 6BDE59C9: LoadCursorW.USER32(?,00007F00), ref: 6BDE5A2B
                                  • GetSystemMenu.USER32(?,00000000,00000000,00000000,6BF57FB4,?,6BF709DC), ref: 6BDB9E20
                                  • DeleteMenu.USER32(?,0000F000,00000000,00000000), ref: 6BDB9E43
                                  • DeleteMenu.USER32(?,0000F020,00000000), ref: 6BDB9E53
                                  • DeleteMenu.USER32(?,0000F030,00000000), ref: 6BDB9E63
                                  • DeleteMenu.USER32(?,0000F120,00000000), ref: 6BDB9E73
                                  • DeleteMenu.USER32(00000000,0000F060,00000000,0000F011), ref: 6BDB9EA6
                                  • AppendMenuW.USER32(00000000,00000000,0000F060,?), ref: 6BDB9EBA
                                  • SetParent.USER32(?,?), ref: 6BDB9F07
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Menu$Delete$AppendCursorH_prolog3LoadParentSystem
                                  • String ID:
                                  • API String ID: 2353656248-0
                                  • Opcode ID: 84364c0d9eb494910354d0f881b6db9118820052cb874273c01bae42b2ecf157
                                  • Instruction ID: 062d6dd7f2228d89f81963b34e9cbbb23075d0c4669f0d8a6f1028e94f8866ce
                                  • Opcode Fuzzy Hash: 84364c0d9eb494910354d0f881b6db9118820052cb874273c01bae42b2ecf157
                                  • Instruction Fuzzy Hash: B341D972650606AFEF109FB0CD56FAABB74FF14B54F000424F656AB1E1C778A904DB90
                                  APIs
                                  • GetPropW.USER32(?,?), ref: 6BDCBCA2
                                  • GlobalLock.KERNEL32(00000000), ref: 6BDCBCAF
                                  • SendMessageW.USER32(?,00000476,00000000,00000000), ref: 6BDCBCCA
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6BDCBCD5
                                  • RemovePropW.USER32(?), ref: 6BDCBCE4
                                  • GlobalFree.KERNEL32(00000000), ref: 6BDCBCEF
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6BDCBD11
                                  • GetAsyncKeyState.USER32(00000011), ref: 6BDCBD22
                                  • SendMessageW.USER32(?,00000475,00000000,?), ref: 6BDCBD4A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Global$MessagePropSendUnlock$AsyncFreeLockRemoveState
                                  • String ID:
                                  • API String ID: 723318029-0
                                  • Opcode ID: 505964d8101958f83f2ad561060f0504e4eeffcbf8e6a75c6b7e61f54d080960
                                  • Instruction ID: 23c84c91961b70cfb309f0946a6331112b8ed36b7021af28f5267f0e5a22dbe1
                                  • Opcode Fuzzy Hash: 505964d8101958f83f2ad561060f0504e4eeffcbf8e6a75c6b7e61f54d080960
                                  • Instruction Fuzzy Hash: C221AC72620209EBEB101B31CC48B5B3BBDFF16722F004069F64B9B5A0DBB9D444EA52
                                  APIs
                                  • GetDlgItem.USER32(?,?), ref: 6BDCC1C5
                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 6BDCC1D4
                                  • IsWindowEnabled.USER32(00000000), ref: 6BDCC1E2
                                  • GetDlgItem.USER32(?,00003024), ref: 6BDCC1F9
                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 6BDCC205
                                  • IsWindowEnabled.USER32(?), ref: 6BDCC215
                                  • GetFocus.USER32 ref: 6BDCC236
                                  • IsWindowEnabled.USER32(00000000), ref: 6BDCC23D
                                  • SetFocus.USER32(?), ref: 6BDCC24A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Enabled$FocusItemLong
                                  • String ID:
                                  • API String ID: 1558694495-0
                                  • Opcode ID: cbf1f9c4049ee82911d487dd4e2725ccca790e8d317a90726b43ba8fc0d4276d
                                  • Instruction ID: 97b2d8dadbb3d7131bb2cc3c3d0ca194426b4031e60053afb8eb442316fae15a
                                  • Opcode Fuzzy Hash: cbf1f9c4049ee82911d487dd4e2725ccca790e8d317a90726b43ba8fc0d4276d
                                  • Instruction Fuzzy Hash: C811DF33A10121FBDB025FA9CC48B5FBB68FF16764B080164FA52E72B0DB35C955AB81
                                  APIs
                                  • GetModuleHandleW.KERNEL32(user32.dll), ref: 6BDAD36D
                                  • GetProcAddress.KERNEL32(00000000,GetGestureInfo), ref: 6BDAD3A2
                                  • GetProcAddress.KERNEL32(00000000,CloseGestureInfoHandle), ref: 6BDAD3CA
                                  • ScreenToClient.USER32(?,?), ref: 6BDAD456
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AddressProc$ClientHandleModuleScreen
                                  • String ID: CloseGestureInfoHandle$GetGestureInfo$user32.dll
                                  • API String ID: 471820996-2905070798
                                  • Opcode ID: 2f777c7080be37a5c2810228de2580c2fec6eb887d341d1b6d910392bdb8daa6
                                  • Instruction ID: 7f92b239b0dca44625274fb33f0c809ab9ebdbb07c18c1281b80fadfdabb66c1
                                  • Opcode Fuzzy Hash: 2f777c7080be37a5c2810228de2580c2fec6eb887d341d1b6d910392bdb8daa6
                                  • Instruction Fuzzy Hash: 9581E375A60616EFCB05CF68D884E69BFB5FF0A324B0001A9EC059BB60DB35E954DF80
                                  APIs
                                  • __EH_prolog3_catch.LIBCMT ref: 6BDD0541
                                    • Part of subcall function 6BE1DE20: __EH_prolog3.LIBCMT ref: 6BE1DE27
                                  • IsWindow.USER32(?), ref: 6BDD0674
                                    • Part of subcall function 6BDBB793: GetDlgCtrlID.USER32(?), ref: 6BDBB79E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CtrlH_prolog3H_prolog3_catchWindow
                                  • String ID: %TsMFCToolBar-%d$%TsMFCToolBar-%d%x$Buttons$MFCToolBars$Name
                                  • API String ID: 1537839037-190999575
                                  • Opcode ID: cf758ccd20b382bd6678066ac8431c6a3a3848a15eaac858b009b8e5f4604013
                                  • Instruction ID: 5d4975cbb3eaea7d0763955a1be4eaee6af833fdccce48830e45a74acec7394f
                                  • Opcode Fuzzy Hash: cf758ccd20b382bd6678066ac8431c6a3a3848a15eaac858b009b8e5f4604013
                                  • Instruction Fuzzy Hash: D8717F75E00219EFCF01DBB4C891AEDBBB5AF49324F144099E815BB2A0DB399E05DF61
                                  APIs
                                  • GetModuleHandleW.KERNEL32(user32.dll), ref: 6BDAD200
                                  • GetProcAddress.KERNEL32(00000000,GetTouchInputInfo), ref: 6BDAD235
                                  • GetProcAddress.KERNEL32(00000000,CloseTouchInputHandle), ref: 6BDAD25D
                                  • ScreenToClient.USER32(?,?), ref: 6BDAD325
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AddressProc$ClientHandleModuleScreen
                                  • String ID: CloseTouchInputHandle$GetTouchInputInfo$user32.dll
                                  • API String ID: 471820996-1853737257
                                  • Opcode ID: 0771c43416e3aee617a38de2b8be51faa383dd90a19a6d8a8c992352a3949bc5
                                  • Instruction ID: 1f9cfa5559abac3ff7ba2888c887346a929e9b183558a84757953c01e5661d82
                                  • Opcode Fuzzy Hash: 0771c43416e3aee617a38de2b8be51faa383dd90a19a6d8a8c992352a3949bc5
                                  • Instruction Fuzzy Hash: 62417635621224EFCF049B69D854F69BBB9EB9A760B1004BAEC15D7260DB34D904DB60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BED762B
                                  • IsAppThemed.UXTHEME(00000000,00000000,0000003C,6BED6DC0,?,6BED7777,00000000,?,00000000), ref: 6BED766D
                                  • OpenThemeData.UXTHEME(?,Button,?,6BED7777,00000000,?,00000000), ref: 6BED7698
                                  • GetThemePartSize.UXTHEME(?,?,00000003,00000005,00000000,00000001,00000000,00000000,?,?,6BED7777,00000000,?,00000000), ref: 6BED76DF
                                  • CloseThemeData.UXTHEME(?,?,?,6BED7777,00000000,?,00000000), ref: 6BED7700
                                  • GetObjectW.GDI32(?,00000018,?), ref: 6BED7729
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Theme$Data$CloseH_prolog3ObjectOpenPartSizeThemed
                                  • String ID: Button
                                  • API String ID: 1633685699-1034594571
                                  • Opcode ID: 10c106f24c690651b1f2e077d1855bd63e4b739fb92ed5639d5fa1ee61b35228
                                  • Instruction ID: 94eafd69fe691ce4aee71d46c63954918477aa2c7b990ecf553c8fb1bb36b7ea
                                  • Opcode Fuzzy Hash: 10c106f24c690651b1f2e077d1855bd63e4b739fb92ed5639d5fa1ee61b35228
                                  • Instruction Fuzzy Hash: C131A475A1020A9FEB15CF68CC55FAEB7B5FF44754F200419E511EB280EBB8DA02CB60
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,5FCB9D08,?,6BEFB60C,?,?,00000000), ref: 6BEFB5BE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID: 2]k$api-ms-$ext-ms-
                                  • API String ID: 3664257935-3095016371
                                  • Opcode ID: dc63b22fe7cd17596cca72a2aa3e734c32df06d520f07a5ad6a09122ff1a20d2
                                  • Instruction ID: 7bd9d4dbbf6f2a8fdd518a328ebd75647be8aa107a90cb21b9ea68a8678c86db
                                  • Opcode Fuzzy Hash: dc63b22fe7cd17596cca72a2aa3e734c32df06d520f07a5ad6a09122ff1a20d2
                                  • Instruction Fuzzy Hash: 2021E777E15211ABDB119B34DC80B4A37AEDB42764F310260EA12A73D1D73DEA16C6D0
                                  APIs
                                  • GetModuleHandleW.KERNEL32(uxtheme.dll,?,?,6BDBEDC3,?,00000000,?,?,?,000000FF,?,?,00000040), ref: 6BDC60D8
                                  • GetProcAddress.KERNEL32(00000000,DrawThemeTextEx), ref: 6BDC60E8
                                  • EncodePointer.KERNEL32(00000000,?,?,6BDBEDC3,?,00000000,?,?,?,000000FF,?,?,00000040), ref: 6BDC60F1
                                  • DecodePointer.KERNEL32(00000000,?,?,6BDBEDC3,?,00000000,?,?,?,000000FF,?,?,00000040), ref: 6BDC60FF
                                  • DrawThemeText.UXTHEME(?,?,?,?,?,?,?,00000000,?,?,?,6BDBEDC3,?,00000000,?,?), ref: 6BDC614C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeDrawEncodeHandleModuleProcTextTheme
                                  • String ID: DrawThemeTextEx$uxtheme.dll
                                  • API String ID: 1727381832-3035683158
                                  • Opcode ID: 0be62d26699e88fdb888bb9030b413be507047292cdae5b3e0bedf942110dddd
                                  • Instruction ID: f5f19153c91109a53b776d7b057fe8c63add6b9edc68d42824c6ef919945a017
                                  • Opcode Fuzzy Hash: 0be62d26699e88fdb888bb9030b413be507047292cdae5b3e0bedf942110dddd
                                  • Instruction Fuzzy Hash: 0A11A23645021AFBCF025FA4DC04EEE3F6AFB19761B055064FE19A6120D73AD861AB91
                                  APIs
                                  • GetParent.USER32(000000FF), ref: 6BDDBFE1
                                  • SendMessageW.USER32(000000FF,00000362,0000E001,00000000), ref: 6BDDC01D
                                    • Part of subcall function 6BDDC2D2: GetParent.USER32(000000FF), ref: 6BDDC2E2
                                  • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 6BDDC03C
                                  • GetParent.USER32(000000FF), ref: 6BDDC0F5
                                  • PostMessageW.USER32(?,?,?,00000000), ref: 6BDDC1A9
                                  • GetParent.USER32(000000FF), ref: 6BDDC213
                                  • InvalidateRect.USER32(000000FF,000000FF,00000001,000000FF,?,?), ref: 6BDDC28C
                                  • UpdateWindow.USER32(000000FF), ref: 6BDDC298
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Parent$Message$Send$InvalidatePostRectUpdateWindow
                                  • String ID:
                                  • API String ID: 4048132615-0
                                  • Opcode ID: 7ca1797a6ba7e00bb50192ab6b6ac64313a8c837ad1c0a5bfb468888cc38c55d
                                  • Instruction ID: 883e1a5b5400873ce09b482ded53db4008ce2576d9bfa27b1b245d7e34da5b2b
                                  • Opcode Fuzzy Hash: 7ca1797a6ba7e00bb50192ab6b6ac64313a8c837ad1c0a5bfb468888cc38c55d
                                  • Instruction Fuzzy Hash: C9919075A10215DFDB049BB8C845ABE7BB9FF49320F0404B9E845EB260DF39D901DBA0
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDB79A7
                                  • OleDuplicateData.OLE32(?,?,00000000), ref: 6BDB7A38
                                  • GlobalLock.KERNEL32(00000000), ref: 6BDB7A5A
                                  • CopyMetaFileW.GDI32(?,00000000), ref: 6BDB7A68
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6BDB7A76
                                  • GlobalFree.KERNEL32(00000000), ref: 6BDB7A7D
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6BDB7A8A
                                    • Part of subcall function 6BDA0447: __EH_prolog3.LIBCMT ref: 6BDA044E
                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,00000054), ref: 6BDB7C36
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Global$CopyFileUnlock$DataDuplicateFreeH_prolog3H_prolog3_LockMeta
                                  • String ID:
                                  • API String ID: 4039237054-0
                                  • Opcode ID: 1dd64138cd18a93477052527beac8786743a79155af4f6770a7cc0fe7f9e797f
                                  • Instruction ID: b056a6129b944ad9d797e26b5f559e15e75605ec717d7291c7f608bd88ffc417
                                  • Opcode Fuzzy Hash: 1dd64138cd18a93477052527beac8786743a79155af4f6770a7cc0fe7f9e797f
                                  • Instruction Fuzzy Hash: 398160B5510516FFDB149F74CD98A2ABBB5FF8A720700819DE81B9F264DB34E900CB60
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$CaptureDestroyEmptyMessageParentPointsRectReleaseSendVisible
                                  • String ID:
                                  • API String ID: 3509494761-0
                                  • Opcode ID: c954dd99162fc4939eab39878f8f932b8b58509632b9774d1d6912726349c413
                                  • Instruction ID: 1b48c7f94b7d835af3ff706341f1bbb7149122d4f531b2d187ea7ce3fc368525
                                  • Opcode Fuzzy Hash: c954dd99162fc4939eab39878f8f932b8b58509632b9774d1d6912726349c413
                                  • Instruction Fuzzy Hash: 64517232610A259BDF059F34C899BAE3BB5BF0A704F1404B8EC079F296DB78D915CB91
                                  APIs
                                  • IsWindowEnabled.USER32(00000000), ref: 6BDCB719
                                  • EnableWindow.USER32(00000000,00000000), ref: 6BDCB725
                                  • GetCapture.USER32 ref: 6BDCB732
                                  • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6BDCB741
                                  • EnableWindow.USER32(00000000,00000001), ref: 6BDCB81E
                                  • GetActiveWindow.USER32 ref: 6BDCB828
                                  • SetActiveWindow.USER32(00000000), ref: 6BDCB833
                                  • EnableWindow.USER32(00000000,00000001), ref: 6BDCB872
                                    • Part of subcall function 6BDAF606: UnhookWindowsHookEx.USER32(?), ref: 6BDAF630
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Enable$Active$CaptureEnabledHookMessageSendUnhookWindows
                                  • String ID:
                                  • API String ID: 1281840512-0
                                  • Opcode ID: 21120f3966d07a10863d183c31516ada377abd6f80da2dbedba5076cb7915cac
                                  • Instruction ID: 4d077c14f14ff5da47dd4b359daeb71e0804719a68cc4904b9e1a04b815851bf
                                  • Opcode Fuzzy Hash: 21120f3966d07a10863d183c31516ada377abd6f80da2dbedba5076cb7915cac
                                  • Instruction Fuzzy Hash: 75518371B1030AEBDB049B75C889BAEBBA8FF05324F104599E556DB2C0DB78D901DB91
                                  APIs
                                  • GetClientRect.USER32(?,?), ref: 6BDAB5F1
                                  • BeginDeferWindowPos.USER32(00000008), ref: 6BDAB607
                                  • GetTopWindow.USER32(?), ref: 6BDAB618
                                  • GetDlgCtrlID.USER32(00000000), ref: 6BDAB621
                                  • SendMessageW.USER32(00000000,00000361,00000000,00000000), ref: 6BDAB659
                                  • GetWindow.USER32(00000000,00000002), ref: 6BDAB662
                                  • CopyRect.USER32(?,?), ref: 6BDAB67D
                                  • EndDeferWindowPos.USER32(00000000), ref: 6BDAB70D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$DeferRect$BeginClientCopyCtrlMessageSend
                                  • String ID:
                                  • API String ID: 1228040700-0
                                  • Opcode ID: 52d1be79f1c33fa869400f73661ca36840b3ab5106f1e5c777721703d268e30f
                                  • Instruction ID: bd9b8d54ede1ef0765c2e870c44e0d8f92dc2e7103156f9d96b1dc10fbe47f98
                                  • Opcode Fuzzy Hash: 52d1be79f1c33fa869400f73661ca36840b3ab5106f1e5c777721703d268e30f
                                  • Instruction Fuzzy Hash: 6451D476900218DFDF04CFA8C884BDEBBB5BF09721F144459E805AB291D779A946CB64
                                  APIs
                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6BE23C74
                                    • Part of subcall function 6BDA3A38: __EH_prolog3.LIBCMT ref: 6BDA3A3F
                                    • Part of subcall function 6BDA3A38: GetWindowDC.USER32(00000000,00000004,6BDBDFDA,00000000), ref: 6BDA3A6B
                                  • CreateCompatibleDC.GDI32(00000000), ref: 6BE23C9A
                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6BE23CC0
                                    • Part of subcall function 6BDA3826: SelectObject.GDI32(6BDAF2CB,?), ref: 6BDA382F
                                  • FillRect.USER32(?,?,00000000), ref: 6BE23D12
                                  • OpenClipboard.USER32(?), ref: 6BE23D6C
                                  • EmptyClipboard.USER32 ref: 6BE23DAC
                                  • SetClipboardData.USER32(00000002,00000000), ref: 6BE23DD0
                                  • CloseClipboard.USER32 ref: 6BE23DEA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Clipboard$CompatibleCreate$BitmapCloseDataEmptyFillH_prolog3H_prolog3_catch_ObjectOpenRectSelectWindow
                                  • String ID:
                                  • API String ID: 2940850299-0
                                  • Opcode ID: 5d5ca6c1a8f7122176eb3689448b3df1882027fee65ab15faf82b1771d446086
                                  • Instruction ID: 1e25dd233a614badba1ae52cfb74cce3d1057b9ae826286c2d218f8a8f48d5b4
                                  • Opcode Fuzzy Hash: 5d5ca6c1a8f7122176eb3689448b3df1882027fee65ab15faf82b1771d446086
                                  • Instruction Fuzzy Hash: D4416071904215AFCF14DFF5DD45ADEBF79AF15328F108119F816AA2A0DB789A08CB70
                                  APIs
                                    • Part of subcall function 6BE2E4DD: ReleaseCapture.USER32 ref: 6BE2E514
                                    • Part of subcall function 6BE2E4DD: IsWindow.USER32(?), ref: 6BE2E543
                                    • Part of subcall function 6BE2E4DD: DestroyWindow.USER32(?), ref: 6BE2E553
                                  • SetRectEmpty.USER32(?), ref: 6BDD711B
                                  • ReleaseCapture.USER32 ref: 6BDD7121
                                  • SetCapture.USER32(?,?,?,?,6BDCF092,?), ref: 6BDD7134
                                  • GetCapture.USER32 ref: 6BDD7173
                                  • ReleaseCapture.USER32 ref: 6BDD7183
                                  • SetCapture.USER32(?,?,?,?,6BDCF092,?), ref: 6BDD7196
                                  • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 6BDD7234
                                  • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 6BDD7281
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Capture$Window$Release$Redraw$DestroyEmptyRect
                                  • String ID:
                                  • API String ID: 2209428161-0
                                  • Opcode ID: 4ae4da7e244722992d06303ff567015ec8a1f04b32eadaaeddbcb66d7c329eb9
                                  • Instruction ID: 5e9b507cbba33b8bcff96f73baa46a1368a441799bbea58b6bc9ff22dbd0a5b9
                                  • Opcode Fuzzy Hash: 4ae4da7e244722992d06303ff567015ec8a1f04b32eadaaeddbcb66d7c329eb9
                                  • Instruction Fuzzy Hash: 2641A571710616EFDB099F74C888B5DBB69FF45325F0003A9E526DB290DB34E915CBA0
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000002,00000000,00000000,00000000,?,?,6BE26076,00000000,00000000,?,6BF27E5C,?,6BE24353,?,?,?), ref: 6BE26092
                                  • GlobalLock.KERNEL32(00000000), ref: 6BE2609F
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6BE260AA
                                  • GlobalFree.KERNEL32(00000000), ref: 6BE260B1
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6BE260CF
                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,00000000), ref: 6BE260DC
                                  • EnterCriticalSection.KERNEL32(6BF79B70,00000000), ref: 6BE260F5
                                  • LeaveCriticalSection.KERNEL32(6BF79B70,00000000), ref: 6BE2615C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Global$CriticalSectionUnlock$AllocCreateEnterFreeLeaveLockStream
                                  • String ID:
                                  • API String ID: 295443201-0
                                  • Opcode ID: 3ed903b3bd21330e49fac079c8bd21cba3bf22ab6d99e6ec0c7d7d10905e2a6a
                                  • Instruction ID: d77930ef3ef6de2194cb56c6b90eefd32acc0880ef15bd9d044b121e5260c023
                                  • Opcode Fuzzy Hash: 3ed903b3bd21330e49fac079c8bd21cba3bf22ab6d99e6ec0c7d7d10905e2a6a
                                  • Instruction Fuzzy Hash: F731D232610624BFDF105B34D818B9E37AEEF4631AF1041A5E816D7262DF38EA04CB61
                                  APIs
                                  • ScreenToClient.USER32(?,?), ref: 6BDDA42E
                                  • GetParent.USER32(?), ref: 6BDDA43E
                                  • GetClientRect.USER32(?,?), ref: 6BDDA482
                                  • MapWindowPoints.USER32(?,?,?,00000002), ref: 6BDDA494
                                  • PtInRect.USER32(?,?,?), ref: 6BDDA4A4
                                  • GetClientRect.USER32(?,?), ref: 6BDDA4D1
                                  • MapWindowPoints.USER32(?,?,?,00000002), ref: 6BDDA4E3
                                  • PtInRect.USER32(?,?,?), ref: 6BDDA4F3
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Client$PointsWindow$ParentScreen
                                  • String ID:
                                  • API String ID: 1944725958-0
                                  • Opcode ID: c11fc7f9531b04dbbb92b253024ef9508478b4b88128a2761627782b305e2bf4
                                  • Instruction ID: 2d528285ff8ea5b91d24fb20e9a3dd4f30b923290e809f37cc46054586d74f4c
                                  • Opcode Fuzzy Hash: c11fc7f9531b04dbbb92b253024ef9508478b4b88128a2761627782b305e2bf4
                                  • Instruction Fuzzy Hash: 4D31A133950119AFCF01DFB4C848DAE7B79FF09714B114169E946DA160EB35DE04DBA1
                                  APIs
                                  • GetMenuItemCount.USER32(?), ref: 6BDB78BD
                                  • GetMenuItemCount.USER32(?), ref: 6BDB78C9
                                  • GetSubMenu.USER32(?,-00000001), ref: 6BDB78E0
                                  • GetMenuItemCount.USER32(00000000), ref: 6BDB78F3
                                  • GetSubMenu.USER32(00000000,00000000), ref: 6BDB7904
                                  • RemoveMenu.USER32(00000000,00000000,00000400), ref: 6BDB791E
                                  • GetSubMenu.USER32(?,00000000), ref: 6BDB7935
                                  • RemoveMenu.USER32(?,-00000001,00000400), ref: 6BDB7950
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Menu$CountItem$Remove
                                  • String ID:
                                  • API String ID: 3494307843-0
                                  • Opcode ID: c11517813a265571bc157d17724890318f555eecd72f0d4afe2115bca4e94315
                                  • Instruction ID: 15176bf8880c4d0cf91e6360d9905cf2b8225a92cf6e40014a34fd6de2366e96
                                  • Opcode Fuzzy Hash: c11517813a265571bc157d17724890318f555eecd72f0d4afe2115bca4e94315
                                  • Instruction Fuzzy Hash: 82118EB291421AFBDF124F25CC48F4F3F79EB827A1F104065F947A9020D739DA85DA60
                                  APIs
                                  • GetSystemMetrics.USER32(00000031), ref: 6BDBE8BF
                                  • GetSystemMetrics.USER32(00000032), ref: 6BDBE8CD
                                  • SetRectEmpty.USER32(?), ref: 6BDBE8E0
                                  • EnumDisplayMonitors.USER32(00000000,00000000,6BDBF089,?,?,?), ref: 6BDBE8F0
                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 6BDBE8FF
                                  • SystemParametersInfoW.USER32(00001002,00000000,?,00000000), ref: 6BDBE92C
                                  • SystemParametersInfoW.USER32(00001012,00000000,?,00000000), ref: 6BDBE940
                                  • SystemParametersInfoW.USER32(0000100A,00000000,?,00000000), ref: 6BDBE966
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: System$InfoParameters$Metrics$DisplayEmptyEnumMonitorsRect
                                  • String ID:
                                  • API String ID: 2614369430-0
                                  • Opcode ID: 0457baa3dd823943a8d8ac291bf62a731ef30539b80be4c98c03310543f1bfb7
                                  • Instruction ID: 59a14198032536b608d73907017514bb75eea27b4eaed62be1ec818b5d16ead3
                                  • Opcode Fuzzy Hash: 0457baa3dd823943a8d8ac291bf62a731ef30539b80be4c98c03310543f1bfb7
                                  • Instruction Fuzzy Hash: 1F214AB1651616BFEB144F71884CBE3BBACFF1A755F000529F94AC6140DBB09858CBE0
                                  APIs
                                  • GlobalLock.KERNEL32(00000000), ref: 6BDA968C
                                  • lstrcmpW.KERNEL32(00000000,?), ref: 6BDA96A5
                                  • OpenPrinterW.WINSPOOL.DRV(?,?,00000000), ref: 6BDA96BA
                                  • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6BDA96DA
                                  • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6BDA96E2
                                  • GlobalLock.KERNEL32(00000000), ref: 6BDA96F0
                                  • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 6BDA9701
                                  • ClosePrinter.WINSPOOL.DRV(?), ref: 6BDA9719
                                    • Part of subcall function 6BDBFF86: GlobalFlags.KERNEL32(?), ref: 6BDBFF93
                                    • Part of subcall function 6BDBFF86: GlobalUnlock.KERNEL32(?), ref: 6BDBFFA1
                                    • Part of subcall function 6BDBFF86: GlobalFree.KERNEL32(?), ref: 6BDBFFAD
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                                  • String ID:
                                  • API String ID: 168474834-0
                                  • Opcode ID: 9c5f9425463a49779afb0d55529f178851a281c34759cc123122b7391e997c64
                                  • Instruction ID: 564b34508c1049acd0ca2d4f0b87a7471cae8f670ade54c295a3e411e2a4a178
                                  • Opcode Fuzzy Hash: 9c5f9425463a49779afb0d55529f178851a281c34759cc123122b7391e997c64
                                  • Instruction Fuzzy Hash: 051163B2400609FFEF125FB1CC85E6A7BEDEF04754B504459F61295072DB39E950EB60
                                  APIs
                                  • _set_app_type.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000002), ref: 0043101E
                                  • _set_fmode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000002), ref: 00431029
                                  • __p__commode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000002), ref: 00431035
                                  • __RTC_Initialize.LIBCMT ref: 0043104D
                                  • _configure_narrow_argv.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,004317FA), ref: 00431062
                                    • Part of subcall function 0043155C: InitializeSListHead.KERNEL32(004330C0,00431072), ref: 00431561
                                  • __setusermatherr.API-MS-WIN-CRT-MATH-L1-1-0(Function_0000154F), ref: 00431080
                                  • _configthreadlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(00000000), ref: 0043109B
                                  • _initialize_narrow_environment.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 004310AA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1782592592.0000000000431000.00000020.00000001.01000000.00000005.sdmp, Offset: 00430000, based on PE: true
                                  • Associated: 00000003.00000002.1782575451.0000000000430000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782606665.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782621103.0000000000433000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000434000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_430000_Update.jbxd
                                  Similarity
                                  • API ID: Initialize$HeadList__p__commode__setusermatherr_configthreadlocale_configure_narrow_argv_initialize_narrow_environment_set_app_type_set_fmode
                                  • String ID:
                                  • API String ID: 1933938900-0
                                  • Opcode ID: 0ce4277c194f5821347f851e18db90d0718241eee8df4f15a97271c774a2a6d8
                                  • Instruction ID: 946ad9be32a2816312edf9d4759d8380a61ebdd8117d59008e942f4826ade3ed
                                  • Opcode Fuzzy Hash: 0ce4277c194f5821347f851e18db90d0718241eee8df4f15a97271c774a2a6d8
                                  • Instruction Fuzzy Hash: F2014F95A4029134E91837FB0907A6E52A90F8C7ACF24391FB9139A5F3ED5DD48144BF
                                  APIs
                                  • GlobalSize.KERNEL32(?), ref: 6BDB7CF0
                                  • GlobalAlloc.KERNEL32(00002002,00000000,?,?,6BDB7C63,?,?,00000054), ref: 6BDB7D08
                                  • GlobalLock.KERNEL32(?), ref: 6BDB7D18
                                  • GlobalLock.KERNEL32(?), ref: 6BDB7D21
                                  • GlobalSize.KERNEL32(?), ref: 6BDB7D2E
                                  • GlobalUnlock.KERNEL32(?), ref: 6BDB7D3F
                                  • GlobalUnlock.KERNEL32(?), ref: 6BDB7D48
                                  • GlobalSize.KERNEL32(?), ref: 6BDB7D58
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Global$Size$LockUnlock$Alloc
                                  • String ID:
                                  • API String ID: 2344174106-0
                                  • Opcode ID: 4da87fb667fde76d3e87885d8cfa17361573d622c605d897d25d5f7627297c41
                                  • Instruction ID: 5daae6bc269690b239b42aa2d4de1c47ea170958745f39d10def88bf5e692501
                                  • Opcode Fuzzy Hash: 4da87fb667fde76d3e87885d8cfa17361573d622c605d897d25d5f7627297c41
                                  • Instruction Fuzzy Hash: 08018F73511204FBDF102BB6CC8CDAA3FECEB6A3A27004520F90B96220E776CD049A60
                                  APIs
                                  • GetSystemMetrics.USER32(0000000B), ref: 6BDC31C5
                                  • GetSystemMetrics.USER32(0000000C), ref: 6BDC31D0
                                  • GetSystemMetrics.USER32(00000002), ref: 6BDC31DB
                                  • GetSystemMetrics.USER32(00000003), ref: 6BDC31E9
                                  • GetDC.USER32(00000000), ref: 6BDC31F7
                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 6BDC3202
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6BDC320E
                                  • ReleaseDC.USER32(00000000,00000000), ref: 6BDC321A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MetricsSystem$CapsDevice$Release
                                  • String ID:
                                  • API String ID: 1151147025-0
                                  • Opcode ID: b5199f9f963041a5d2d177935ddef7f8fb69d4f295772793d5520d883f5a4bcf
                                  • Instruction ID: 3e4048f65cd45277e5191f3d0577cbb20f8edcb9ffa67322b6b4efa64f8ebd57
                                  • Opcode Fuzzy Hash: b5199f9f963041a5d2d177935ddef7f8fb69d4f295772793d5520d883f5a4bcf
                                  • Instruction Fuzzy Hash: 88F0E2B2AA0750ABEB105FB1980DB667F64FB66712F004525F242CA190EBB6C4898FC0
                                  APIs
                                  • OffsetRect.USER32(?,00000000,?), ref: 6BDA6110
                                  • OffsetRect.USER32(?,?,00000000), ref: 6BDA6130
                                  • SetCapture.USER32(?), ref: 6BDA61A3
                                  • RedrawWindow.USER32(?,00000000,00000000,00000180,00000000), ref: 6BDA61C2
                                  • ReleaseCapture.USER32 ref: 6BDA6250
                                  • OffsetRect.USER32(?,000000FF,000000FF), ref: 6BDA62C6
                                  • OffsetRect.USER32(?,000000FF,000000FF), ref: 6BDA62D7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: OffsetRect$Capture$RedrawReleaseWindow
                                  • String ID:
                                  • API String ID: 1110970518-0
                                  • Opcode ID: 430302383db1acec10994957f2b79fce2a0053265c41dcedd14f1aef65e33bcc
                                  • Instruction ID: 2ad5f7aa70adc8f94b085dfefe63705f792c213a3ececd7a482453b50821685e
                                  • Opcode Fuzzy Hash: 430302383db1acec10994957f2b79fce2a0053265c41dcedd14f1aef65e33bcc
                                  • Instruction Fuzzy Hash: 35D15035600624DFCF049F68C8A8BAD3BA5FB4A720F0505F9ED0A9F396DB74A905CB50
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 5190b319bde8bdb40870973bd59ec0e1e05736a5c04f87247dd0c88a7e395357
                                  • Instruction ID: e54bf28364ca76e4cabe4762be5609212b5f185ddd5ad89fa1dccade1910909b
                                  • Opcode Fuzzy Hash: 5190b319bde8bdb40870973bd59ec0e1e05736a5c04f87247dd0c88a7e395357
                                  • Instruction Fuzzy Hash: 1BB15732E146599FEB018F68CC81BEE7FB9EF55714F248195E904AB381D378A913C7A0
                                  APIs
                                  • __EH_prolog3_catch.LIBCMT ref: 6BEBBF8E
                                    • Part of subcall function 6BEBC251: OleGetClipboard.OLE32(00000000), ref: 6BEBC267
                                  • ReleaseStgMedium.OLE32(?), ref: 6BEBC012
                                  • ReleaseStgMedium.OLE32(?), ref: 6BEBC059
                                  • ReleaseStgMedium.OLE32(?), ref: 6BEBC068
                                  • CoTaskMemFree.OLE32(?,?,00000000,?,00000040,6BE26D3C,?,00000000,00000000,0000005C), ref: 6BEBC118
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MediumRelease$ClipboardFreeH_prolog3_catchTask
                                  • String ID: '
                                  • API String ID: 3213536121-1997036262
                                  • Opcode ID: c5810bf2f8a6dcc1ce6ba9504d020b13e45c2de525e660506ec11efd034d4fa2
                                  • Instruction ID: 5e1ae7c283493446cd0eb4ee332ac33c211c6f43b9e4d5202f3faa764c5a72dc
                                  • Opcode Fuzzy Hash: c5810bf2f8a6dcc1ce6ba9504d020b13e45c2de525e660506ec11efd034d4fa2
                                  • Instruction Fuzzy Hash: 9B51A731E08209DBDF01DFB8C945AADBBB5AF45718F204069E511FB390DB79DA45CB60
                                  APIs
                                    • Part of subcall function 6BDDD249: IsWindow.USER32(?), ref: 6BDDD255
                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6BDB208B
                                    • Part of subcall function 6BDDD8C7: GetClientRect.USER32(?,?), ref: 6BDDD8EF
                                    • Part of subcall function 6BDDD8C7: PtInRect.USER32(?,00000000,?), ref: 6BDDD909
                                  • ScreenToClient.USER32(?,?), ref: 6BDB1F58
                                  • PtInRect.USER32(?,?,?), ref: 6BDB1F6B
                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6BDB1F9D
                                  • GetParent.USER32(?), ref: 6BDB1FCD
                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6BDB204B
                                  • GetFocus.USER32 ref: 6BDB2051
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessageRectSend$Client$FocusParentScreenWindow
                                  • String ID:
                                  • API String ID: 1639644240-0
                                  • Opcode ID: 3b56d6ba292ea7b4548ac4d6501774ddda37fe32925059fa9324e87f676f3bc5
                                  • Instruction ID: b2ce7542f54b73d9c73a010d399f5013ce2e9b2c7e7927ca8df2d4889da28f79
                                  • Opcode Fuzzy Hash: 3b56d6ba292ea7b4548ac4d6501774ddda37fe32925059fa9324e87f676f3bc5
                                  • Instruction Fuzzy Hash: 805150B2E10119DBDF10DFB9C845A9E7FB4FF49724B0041A9E956EB260DB39DA00DB90
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BE12D50
                                    • Part of subcall function 6BE3306A: __EH_prolog3.LIBCMT ref: 6BE33071
                                  • GetMenuItemCount.USER32(?), ref: 6BE12DA6
                                  • GetMenuItemID.USER32(?,00000000), ref: 6BE12DC3
                                  • GetMenuItemCount.USER32(?), ref: 6BE12DF8
                                  • GetMenuItemID.USER32(?,00000000), ref: 6BE12E2A
                                  • SendMessageW.USER32(?,00000234,00000000,00000000), ref: 6BE12E8F
                                  • GetMenuState.USER32(00000001,00000000,00000400), ref: 6BE12EEC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Menu$Item$Count$H_prolog3H_prolog3_MessageSendState
                                  • String ID:
                                  • API String ID: 999183886-0
                                  • Opcode ID: 37a2df27ffd6a4eb0110541bc2af85978d6895de52b151e44cf955a32e575610
                                  • Instruction ID: 53bcf839430b7320d0b94d154140ee82659ed8ef1382b69bba704956ed9432ac
                                  • Opcode Fuzzy Hash: 37a2df27ffd6a4eb0110541bc2af85978d6895de52b151e44cf955a32e575610
                                  • Instruction Fuzzy Hash: 8D6150709041169BDF25CB34CC45BEDB7B4BF1A318F3002E9E829A62D0DB789A95DF50
                                  APIs
                                    • Part of subcall function 6BE26CF4: __EH_prolog3_catch.LIBCMT ref: 6BE26CFB
                                  • UpdateWindow.USER32(?), ref: 6BDD4082
                                  • EqualRect.USER32(?,?), ref: 6BDD40C2
                                  • InflateRect.USER32(?,00000002,00000002), ref: 6BDD40DA
                                  • InvalidateRect.USER32(?,?,00000001), ref: 6BDD40E9
                                  • InflateRect.USER32(?,00000002,00000002), ref: 6BDD4100
                                  • InvalidateRect.USER32(?,?,00000001), ref: 6BDD4112
                                  • UpdateWindow.USER32(?), ref: 6BDD411B
                                    • Part of subcall function 6BDD27FA: InvalidateRect.USER32(?,?,00000001,?), ref: 6BDD2871
                                    • Part of subcall function 6BDD27FA: InflateRect.USER32(?,00000000,?), ref: 6BDD28B7
                                    • Part of subcall function 6BDD27FA: RedrawWindow.USER32(?,?,00000000,00000401), ref: 6BDD28CB
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$InflateInvalidateWindow$Update$EqualH_prolog3_catchRedraw
                                  • String ID:
                                  • API String ID: 1041772997-0
                                  • Opcode ID: 631fd3a596f4c730e59edca1a58cf198d50f9e9d055878e2815e9a45d7b43d98
                                  • Instruction ID: 0a29db301d4a1fe176d3fb525a0375716832d19ee5d238eb82767aebfb5ecd3c
                                  • Opcode Fuzzy Hash: 631fd3a596f4c730e59edca1a58cf198d50f9e9d055878e2815e9a45d7b43d98
                                  • Instruction Fuzzy Hash: 44518B76600209DFCF00CF64C895BAA3BB5FB49310F1401B9EC5AAF295DB749905CFA0
                                  APIs
                                  • GetParent.USER32(?), ref: 6BDABA4B
                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 6BDABA6D
                                  • UpdateWindow.USER32(?), ref: 6BDABA87
                                  • SendMessageW.USER32(?,00000121,00000001,?), ref: 6BDABAAD
                                  • SendMessageW.USER32(?,0000036A,00000000,00000000), ref: 6BDABAC5
                                  • UpdateWindow.USER32(?), ref: 6BDABB12
                                    • Part of subcall function 6BDBB682: GetWindowLongW.USER32(458BF84D,000000F0), ref: 6BDBB68F
                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 6BDABB5C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Message$Window$PeekSendUpdate$LongParent
                                  • String ID:
                                  • API String ID: 2853195852-0
                                  • Opcode ID: a12bea2e3149ae3d9ef368bf27992944c328bd1226fd40570bc252a48fa474dc
                                  • Instruction ID: 981bb95bd559282f40aa947a092b75fa338f44fe40fbdab6c8c0b4b85d256ae8
                                  • Opcode Fuzzy Hash: a12bea2e3149ae3d9ef368bf27992944c328bd1226fd40570bc252a48fa474dc
                                  • Instruction Fuzzy Hash: D8419071A00609EFEB048F74C949B6E7BB8FF05724F004198E816EB1D0DBB8DE429B94
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 6BEE2547
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 6BEE254F
                                  • _ValidateLocalCookies.LIBCMT ref: 6BEE25D8
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 6BEE2603
                                  • _ValidateLocalCookies.LIBCMT ref: 6BEE2658
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 5537653df38528fe29d7ec18be1425d66a1fb08bc52ea6064fe16d6a79e0a0af
                                  • Instruction ID: 77c7e5982d499240826f2a5a40d5789c7c8f8a7ef74249b35348ac71e419a798
                                  • Opcode Fuzzy Hash: 5537653df38528fe29d7ec18be1425d66a1fb08bc52ea6064fe16d6a79e0a0af
                                  • Instruction Fuzzy Hash: 4E41B331A0021A9FCF01DF79C890A9E7BB5BF55318F208199E8249B351DB79DA17CBA1
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BE2CDFD
                                  • CopyRect.USER32(?,?), ref: 6BE2CEAB
                                  • IsRectEmpty.USER32(?), ref: 6BE2CEC3
                                  • IsRectEmpty.USER32(?), ref: 6BE2CEDB
                                  • IsRectEmpty.USER32(?), ref: 6BE2CEF0
                                    • Part of subcall function 6BDBEBFA: __EH_prolog3.LIBCMT ref: 6BDBEC01
                                    • Part of subcall function 6BDBEBFA: LoadCursorW.USER32(00000000,00007F00), ref: 6BDBEC25
                                    • Part of subcall function 6BDBEBFA: GetClassInfoW.USER32(?,?,?), ref: 6BDBEC60
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Empty$ClassCopyCursorH_prolog3H_prolog3_InfoLoad
                                  • String ID: Afx:ControlBar
                                  • API String ID: 685170547-4244778371
                                  • Opcode ID: 5d7f1d1c2e0f2d17aa09cd1fb3007b2bbbf12a738de386187650337be86e1664
                                  • Instruction ID: 8f5e4f20e697d89041676a491b8ec838d231848c4e61bd2d184a0d8061aa32b9
                                  • Opcode Fuzzy Hash: 5d7f1d1c2e0f2d17aa09cd1fb3007b2bbbf12a738de386187650337be86e1664
                                  • Instruction Fuzzy Hash: EC412B75A002099BDF05DFB4C894AEE77F5BF49318F1004A9EC06BB250DB79EA05CB60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BEB33C4
                                    • Part of subcall function 6BE18A6E: __EH_prolog3.LIBCMT ref: 6BE18A75
                                    • Part of subcall function 6BED9BD0: SetRectEmpty.USER32(?), ref: 6BED9C05
                                  • SetRectEmpty.USER32(?), ref: 6BEB34F4
                                  • SetRectEmpty.USER32 ref: 6BEB3505
                                  • SetRectEmpty.USER32(?), ref: 6BEB350C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: EmptyRect$H_prolog3
                                  • String ID: False$True
                                  • API String ID: 3752103406-1895882422
                                  • Opcode ID: b8e4029ae04f60ed46d738fbf2da789e77be87b40dff3e5079ca5b5bddd707f3
                                  • Instruction ID: d65849b2fcbe8c669cacc2cfb08565858a4270508e8f3808c0f5e2385a9448ee
                                  • Opcode Fuzzy Hash: b8e4029ae04f60ed46d738fbf2da789e77be87b40dff3e5079ca5b5bddd707f3
                                  • Instruction Fuzzy Hash: 2051E2B19053019FCB4ACF28D5857A8BBE8BF18314F1881BEE81D9F3A6CB741644CB65
                                  APIs
                                  • GetClientRect.USER32(?,?), ref: 6BDB9BE5
                                  • IsThemeBackgroundPartiallyTransparent.UXTHEME(?,00000006,00000000), ref: 6BDB9C00
                                  • DrawThemeParentBackground.UXTHEME(?,?,?), ref: 6BDB9C14
                                  • SetRectEmpty.USER32(?), ref: 6BDB9C25
                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 6BDB9C33
                                  • DrawThemeBackground.UXTHEME(?,?,00000006,00000000,?,00000000), ref: 6BDB9C69
                                  • CopyRect.USER32(?,?), ref: 6BDB9CCE
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: BackgroundRectTheme$Draw$ClientCopyEmptyInfoParametersParentPartiallySystemTransparent
                                  • String ID:
                                  • API String ID: 2388076383-0
                                  • Opcode ID: 17e28e7c0237fe08b50550bfb6f8da445d54b66d3982e3c7f56956ce8c3ff327
                                  • Instruction ID: 32f2fda02b0c8742f1b6407fd8d150ec0d7de8aa45cdddf25807bcc696beae81
                                  • Opcode Fuzzy Hash: 17e28e7c0237fe08b50550bfb6f8da445d54b66d3982e3c7f56956ce8c3ff327
                                  • Instruction Fuzzy Hash: 96419076A00609EFCB01DFA4C984AEFBBB9FF19354F10416AE906E7100D735AE45CBA0
                                  APIs
                                    • Part of subcall function 6BDB6FE0: GetParent.USER32(?), ref: 6BDB703D
                                    • Part of subcall function 6BDB6FE0: GetLastActivePopup.USER32(?), ref: 6BDB7050
                                    • Part of subcall function 6BDB6FE0: IsWindowEnabled.USER32(?), ref: 6BDB7064
                                    • Part of subcall function 6BDB6FE0: EnableWindow.USER32(?,00000000), ref: 6BDB7077
                                  • EnableWindow.USER32(?,00000001), ref: 6BDB70FF
                                  • GetWindowThreadProcessId.USER32(?,?), ref: 6BDB7115
                                  • GetCurrentProcessId.KERNEL32 ref: 6BDB711F
                                  • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 6BDB7135
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 6BDB71C0
                                  • MessageBoxW.USER32(?,?,?,0000004D), ref: 6BDB71E2
                                  • EnableWindow.USER32(00000000,00000001), ref: 6BDB7207
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Enable$MessageProcess$ActiveCurrentEnabledFileLastModuleNameParentPopupSendThread
                                  • String ID:
                                  • API String ID: 1924968399-0
                                  • Opcode ID: 0c270890a718fddea31931f2bce7c0c466819f2e735ea2a183fa94f716d1cbb4
                                  • Instruction ID: 48e769b46fcb45f689e5a2ac49f500f3d1df46b161842ca96c3b97311172788b
                                  • Opcode Fuzzy Hash: 0c270890a718fddea31931f2bce7c0c466819f2e735ea2a183fa94f716d1cbb4
                                  • Instruction Fuzzy Hash: AF4171B6A40219EBDB108F74CC88B9A77B8EB15760F1015E9E416DB250D774CE809F70
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDC1D05
                                  • CreateCompatibleDC.GDI32(?), ref: 6BDC1D34
                                  • GetClientRect.USER32(?,?), ref: 6BDC1D51
                                  • SelectObject.GDI32(?,?), ref: 6BDC1D8A
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,00000001,00000000,00000000,00CC0020), ref: 6BDC1DB1
                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6BDC1E37
                                  • SelectObject.GDI32(?,00000000), ref: 6BDC1E45
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ObjectSelect$ClientCompatibleCreateH_prolog3_Rect
                                  • String ID:
                                  • API String ID: 1651110115-0
                                  • Opcode ID: df8218b8de4c68bc34349b1f0aa766791be233cc592f683e907a56f23504af08
                                  • Instruction ID: 5afaaed243f24bb285981cb6e2ce57a5af24d0763e1b510f6e67fdae205ee43a
                                  • Opcode Fuzzy Hash: df8218b8de4c68bc34349b1f0aa766791be233cc592f683e907a56f23504af08
                                  • Instruction Fuzzy Hash: 124112B2A10219AFDF04DBA4CD95FEEBBBABF58714F104119F502A71A0CB746E04CB60
                                  APIs
                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6BDBB305
                                  • RegOpenKeyExW.ADVAPI32(?,00000010,00000000,0002001F,?,00000228), ref: 6BDBB3AB
                                    • Part of subcall function 6BDBB239: __EH_prolog3.LIBCMT ref: 6BDBB240
                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6BDBB3CF
                                  • RegCloseKey.ADVAPI32(?), ref: 6BDBB484
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CloseEnumH_prolog3H_prolog3_catch_Open
                                  • String ID: Software\Classes\
                                  • API String ID: 854624316-1121929649
                                  • Opcode ID: d23d36af9a9e094f4d5af0b6a700ec5f6c928369ea329f37481bc69c1b71bb43
                                  • Instruction ID: b6fc9829fa5000bdd6d000a23c39deb854f7d724f1db0897cd67568a8b98076f
                                  • Opcode Fuzzy Hash: d23d36af9a9e094f4d5af0b6a700ec5f6c928369ea329f37481bc69c1b71bb43
                                  • Instruction Fuzzy Hash: 9941CDB2900119EBDB11DBA4DCC9B9DB7B8EB08328F1004D5D406AB291DB389B88CF21
                                  APIs
                                  • SetFocus.USER32(00000000,00000000), ref: 6BDB520F
                                  • GetParent.USER32(?), ref: 6BDB521D
                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 6BDB5238
                                  • GetCurrentProcessId.KERNEL32 ref: 6BDB523E
                                  • GetActiveWindow.USER32 ref: 6BDB529D
                                  • SendMessageW.USER32(?,00000006,00000001,00000000), ref: 6BDB52AE
                                  • SendMessageW.USER32(?,00000086,00000001,00000000), ref: 6BDB52C8
                                    • Part of subcall function 6BDBBA97: EnableWindow.USER32(?,?), ref: 6BDBBAA8
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$MessageProcessSend$ActiveCurrentEnableFocusParentThread
                                  • String ID:
                                  • API String ID: 2169720751-0
                                  • Opcode ID: 0a569d047b07a8d01d215fa94a7d9212f676232b048ebf8b2fe7852898fd3da9
                                  • Instruction ID: fe97273555bf1d142f94c2211595cd5556122e10a1db05fdbcba16f272525f9c
                                  • Opcode Fuzzy Hash: 0a569d047b07a8d01d215fa94a7d9212f676232b048ebf8b2fe7852898fd3da9
                                  • Instruction Fuzzy Hash: 0F31CE72611218EBEF159B20CC99B5D7BA1FF16729F100095FA43AF1E0CBB8E854DB90
                                  APIs
                                  • LockWindowUpdate.USER32(00000000,00000004,00000004), ref: 6BE0F113
                                  • ValidateRect.USER32(?,00000000,0000E800), ref: 6BE0F14F
                                  • UpdateWindow.USER32(?), ref: 6BE0F158
                                  • LockWindowUpdate.USER32(00000000), ref: 6BE0F169
                                  • ValidateRect.USER32(?,00000000,0000E800), ref: 6BE0F197
                                  • UpdateWindow.USER32(?), ref: 6BE0F1A0
                                  • LockWindowUpdate.USER32(00000000), ref: 6BE0F1B1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: UpdateWindow$Lock$RectValidate
                                  • String ID:
                                  • API String ID: 797752328-0
                                  • Opcode ID: b865255a871619c5736c4cbeed140ced9b0b3c0b9aa153bb54c0dc776fed856a
                                  • Instruction ID: c84bb15aec0acc430bbef239eb472fdd7946e765a95777deadd8d99075d2efa0
                                  • Opcode Fuzzy Hash: b865255a871619c5736c4cbeed140ced9b0b3c0b9aa153bb54c0dc776fed856a
                                  • Instruction Fuzzy Hash: E531C376900605EFDF108F64C844B9A7BB5FF48714F2041A9E85AA7361DF38E930CB94
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDA089C
                                  • GetClassNameW.USER32(?,?,000000FF), ref: 6BDA08F6
                                  • IsAppThemed.UXTHEME(?,?,00000001,?), ref: 6BDA0987
                                  • GetStockObject.GDI32(00000005), ref: 6BDA0998
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ClassH_prolog3_NameObjectStockThemed
                                  • String ID: Button$Static
                                  • API String ID: 2434646892-2498952662
                                  • Opcode ID: 6ebaa76ec7eccbd5f3c992373cf578b6de2fc7aca08c55d03590cd35a829a0dd
                                  • Instruction ID: 0e9f8e223ba062557ebab8da6684d78ea6d93c020b15972b5319cee70a1e258f
                                  • Opcode Fuzzy Hash: 6ebaa76ec7eccbd5f3c992373cf578b6de2fc7aca08c55d03590cd35a829a0dd
                                  • Instruction Fuzzy Hash: F431E532940209DBDB28DB74C899BDE7374AF547B4F0405D8D55AAF190DB38AA84CB71
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BE209F8
                                    • Part of subcall function 6BE20AE2: __EH_prolog3.LIBCMT ref: 6BE20AE9
                                    • Part of subcall function 6BE20AE2: GetProfileIntW.KERNEL32(windows,DragMinDist,00000002), ref: 6BE20B3C
                                    • Part of subcall function 6BE20AE2: GetProfileIntW.KERNEL32(windows,DragDelay,000000C8), ref: 6BE20B52
                                  • CopyRect.USER32(?,?), ref: 6BE20A2D
                                  • GetCursorPos.USER32(?), ref: 6BE20A3F
                                  • SetRect.USER32(?,?,?,?,?), ref: 6BE20A52
                                  • IsRectEmpty.USER32(?), ref: 6BE20A6D
                                  • InflateRect.USER32(?,00000002,00000002), ref: 6BE20A7F
                                  • DoDragDrop.OLE32(00000000,00000000,?,?), ref: 6BE20AC7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Profile$CopyCursorDragDropEmptyH_prolog3H_prolog3_Inflate
                                  • String ID:
                                  • API String ID: 1837043813-0
                                  • Opcode ID: f3d43b1cc52bf7c97a19789930629afc6805250c560bea49c57a3acbe2389965
                                  • Instruction ID: f803f5d37c88d1c17852b42dd04a46408ad2b19efd961e01c35e0e9975d964cc
                                  • Opcode Fuzzy Hash: f3d43b1cc52bf7c97a19789930629afc6805250c560bea49c57a3acbe2389965
                                  • Instruction Fuzzy Hash: 14316DB6A002599FDF01CFE4CC58AAE7BB9FF49344B504019E816AF255DB38DA09CB61
                                  APIs
                                  • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?,?,00000000,00000000,?,00000000), ref: 6BDBA928
                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,00000000,?,00000000,00000000,?,00000000), ref: 6BDBA954
                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,00000000,?,00000000,00000000,?,00000000), ref: 6BDBA980
                                  • RegCloseKey.ADVAPI32(00000000,?,00000000), ref: 6BDBA992
                                  • RegCloseKey.ADVAPI32(00000000,?,00000000), ref: 6BDBA9A1
                                    • Part of subcall function 6BDBA1BA: GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 6BDBA1CB
                                    • Part of subcall function 6BDBA1BA: GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 6BDBA1DB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CloseCreate$AddressHandleModuleOpenProc
                                  • String ID: software
                                  • API String ID: 550756860-2010147023
                                  • Opcode ID: 08ef1e5cc8a1b6af2e9b24ae3ee7aefc19121183678cedf8e1ad4c5ed9f5365d
                                  • Instruction ID: 2283b0c0cba4d61d2d04143eab38fffd375c53073996d4a40f718ed456ff9e77
                                  • Opcode Fuzzy Hash: 08ef1e5cc8a1b6af2e9b24ae3ee7aefc19121183678cedf8e1ad4c5ed9f5365d
                                  • Instruction Fuzzy Hash: 96216FB2A00119FFDF019B94CC44EBF7B7DEB45B50F4140A9F912EA110DB748A54EBA5
                                  APIs
                                  • SendMessageW.USER32(00000000,00000407,00000000,?), ref: 6BDE19E7
                                  • IsRectEmpty.USER32(?), ref: 6BDE1A03
                                  • IsRectEmpty.USER32(?), ref: 6BDE1A0E
                                  • GetCursorPos.USER32(00000000), ref: 6BDE1A24
                                  • ScreenToClient.USER32(?,00000000), ref: 6BDE1A31
                                  • PtInRect.USER32(?,00000000,00000000), ref: 6BDE1A44
                                  • PtInRect.USER32(?,00000000,00000000), ref: 6BDE1A55
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Empty$ClientCursorMessageScreenSend
                                  • String ID:
                                  • API String ID: 703117857-0
                                  • Opcode ID: fe4e743435c8964ab30450e33311a66f3f9c6a569b1d8767f9a80863871287d6
                                  • Instruction ID: 7c3dc7ca5e08484f2b14792c79ed691b0ffedfba52fe09b5c65b6bdb97ac612d
                                  • Opcode Fuzzy Hash: fe4e743435c8964ab30450e33311a66f3f9c6a569b1d8767f9a80863871287d6
                                  • Instruction Fuzzy Hash: 2F217C72610209FBDF108BA0CC48FEABBBDFF05719F000169E152A6060DB74EA46EB60
                                  APIs
                                  • RealChildWindowFromPoint.USER32(?,?,?,?,?,?,6BDA79D8,?,?,?), ref: 6BDBFEAA
                                  • ClientToScreen.USER32(?,?), ref: 6BDBFEC4
                                  • GetWindow.USER32(?,00000005), ref: 6BDBFF16
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$ChildClientFromPointRealScreen
                                  • String ID:
                                  • API String ID: 2518355518-0
                                  • Opcode ID: dbb0892958da619134d1861392b5434617d609dd57a297882950facfc0bda85e
                                  • Instruction ID: 20d5311ee27032188c6883605201503887999d2d0d6b5e3cd3d17309c9047021
                                  • Opcode Fuzzy Hash: dbb0892958da619134d1861392b5434617d609dd57a297882950facfc0bda85e
                                  • Instruction Fuzzy Hash: 2D118176A11619ABCB01DF68C848FAF7BB9EF4A710F104125F803E7250DB34DA498BA4
                                  APIs
                                  • GetParent.USER32(?), ref: 6BDAF522
                                  • GetWindowRect.USER32(?,?), ref: 6BDAF540
                                  • ScreenToClient.USER32(?,?), ref: 6BDAF54D
                                  • ScreenToClient.USER32(?,?), ref: 6BDAF55A
                                  • EqualRect.USER32(?,?), ref: 6BDAF565
                                  • DeferWindowPos.USER32(?,?,00000000,?,?,?,?,00000014), ref: 6BDAF58C
                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?,?,00000000), ref: 6BDAF596
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$ClientRectScreen$DeferEqualParent
                                  • String ID:
                                  • API String ID: 443303494-0
                                  • Opcode ID: 8ef869d1867851157618cf53014d182349ad06eb250d20574662a15f31f60134
                                  • Instruction ID: 2842f43b4a4d267583559f24ab340ada92cb32b3969f83baacf275774dd4075e
                                  • Opcode Fuzzy Hash: 8ef869d1867851157618cf53014d182349ad06eb250d20574662a15f31f60134
                                  • Instruction Fuzzy Hash: 52211F7691020AEFDF01DFA8C988AAEBBB8EF1A710F104199E946EA154D730D944DB61
                                  APIs
                                  • SelectObject.GDI32(00000000,?), ref: 6BE230BB
                                    • Part of subcall function 6BDBFD21: DeleteObject.GDI32(00000000), ref: 6BDBFD33
                                  • SelectObject.GDI32(?,?), ref: 6BE230D0
                                  • DeleteObject.GDI32(00000000), ref: 6BE23131
                                  • DeleteDC.GDI32(00000000), ref: 6BE23140
                                  • LeaveCriticalSection.KERNEL32(6BF79B70), ref: 6BE23157
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Object$Delete$Select$CriticalLeaveSection
                                  • String ID:
                                  • API String ID: 3849354926-3916222277
                                  • Opcode ID: dc6f60453fed4ec8700fa8af56dbc02d1c2bd440a903823564ecc5d3f7267d6a
                                  • Instruction ID: 69bdd10e542e9c22c9a2b512bdb5cdfab4b5fd22aec8530b7554d3a380b19623
                                  • Opcode Fuzzy Hash: dc6f60453fed4ec8700fa8af56dbc02d1c2bd440a903823564ecc5d3f7267d6a
                                  • Instruction Fuzzy Hash: 06212432410200EFCF109F64C884B963B75FF56328F2042A5ED269E166DBB5D994CFA0
                                  APIs
                                  • IsWindow.USER32(00000000), ref: 6BDAE574
                                  • FindResourceW.KERNEL32(?,00000000,AFX_DIALOG_LAYOUT), ref: 6BDAE59C
                                  • SizeofResource.KERNEL32(?,00000000), ref: 6BDAE5AE
                                  • LoadResource.KERNEL32(?,00000000), ref: 6BDAE5BA
                                  • LockResource.KERNEL32(00000000), ref: 6BDAE5C5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Resource$FindLoadLockSizeofWindow
                                  • String ID: AFX_DIALOG_LAYOUT
                                  • API String ID: 2582447065-2436846380
                                  • Opcode ID: 661dcf16e3146e76297004e5752c7c7407acb7c3a7beb9a6b288c2a13d2df70b
                                  • Instruction ID: 09da57303a721082f05d0e0b75eccde67c09f85f2366d3433f6e90724084216f
                                  • Opcode Fuzzy Hash: 661dcf16e3146e76297004e5752c7c7407acb7c3a7beb9a6b288c2a13d2df70b
                                  • Instruction Fuzzy Hash: CF11A172620304FBEB019BB4DC48BAE7AADEF45665B2041A5F902DA214FB78D940D760
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BE02C40
                                    • Part of subcall function 6BDA0447: __EH_prolog3.LIBCMT ref: 6BDA044E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: H_prolog3
                                  • String ID: AQUA_$BLACK_$BLUE_$IDX_OFFICE2007_STYLE$SILVER_
                                  • API String ID: 431132790-2717817858
                                  • Opcode ID: e4919f55a2baea19e0311673dea66a42af698f1c65777be1915eb0bccb20839f
                                  • Instruction ID: 6256ce15dba73c6d31a9d545cb532bf404c647658b992a2da6fed90b9312cdc1
                                  • Opcode Fuzzy Hash: e4919f55a2baea19e0311673dea66a42af698f1c65777be1915eb0bccb20839f
                                  • Instruction Fuzzy Hash: 4E1182B3900006EBCB04DBB8C895BBE7BB5AFA0378F204509A6155F290CF3D9B65C761
                                  APIs
                                  • GetModuleHandleW.KERNEL32(user32.dll,?,?,00000000,?,6BDACC9A,00000000,00000000), ref: 6BDAD621
                                  • GetProcAddress.KERNEL32(00000000,RegisterTouchWindow), ref: 6BDAD633
                                  • GetProcAddress.KERNEL32(00000000,UnregisterTouchWindow), ref: 6BDAD641
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AddressProc$HandleModule
                                  • String ID: RegisterTouchWindow$UnregisterTouchWindow$user32.dll
                                  • API String ID: 667068680-2470269259
                                  • Opcode ID: 47cbee4c858922ddc2960aa7eb5ce1e7ff9fff9b426362790c20e2eccb5b1353
                                  • Instruction ID: 2bbd1b32f2c540e3115717e1878dc9d1a24e857bf74a068b917f7d926810e6a5
                                  • Opcode Fuzzy Hash: 47cbee4c858922ddc2960aa7eb5ce1e7ff9fff9b426362790c20e2eccb5b1353
                                  • Instruction Fuzzy Hash: E001F93356461DFBDB111B79D888B197B58FF16B75B000076FC1A96A20DB78CC148AE0
                                  APIs
                                  • GetModuleHandleW.KERNEL32(uxtheme.dll,?,?,6BDBD966,00000001,?,00000002,00000000,?), ref: 6BDC6211
                                  • GetProcAddress.KERNEL32(00000000,BeginBufferedPaint), ref: 6BDC6221
                                  • EncodePointer.KERNEL32(00000000,?,6BDBD966,00000001,?,00000002,00000000,?), ref: 6BDC622A
                                  • DecodePointer.KERNEL32(00000000,?,?,6BDBD966,00000001,?,00000002,00000000,?), ref: 6BDC6238
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: BeginBufferedPaint$uxtheme.dll
                                  • API String ID: 2061474489-1632326970
                                  • Opcode ID: 637fd3b768e91920e8c4a3af5d6e3a35643eddf49863357f2a09afda86fcc310
                                  • Instruction ID: 5a87751086c2da7f0bed3d185f4b2f13a313fd2d06c27559d93c7c58b0b5e478
                                  • Opcode Fuzzy Hash: 637fd3b768e91920e8c4a3af5d6e3a35643eddf49863357f2a09afda86fcc310
                                  • Instruction Fuzzy Hash: 09F03032521225EB8F115FA9AC08A6F7F6CEF16BA17000064FD06D7630E735D8149BA1
                                  APIs
                                  • GetModuleHandleW.KERNEL32(shell32.dll), ref: 6BDC6021
                                  • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 6BDC6031
                                  • EncodePointer.KERNEL32(00000000), ref: 6BDC603A
                                  • DecodePointer.KERNEL32(00000000), ref: 6BDC6048
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: SHGetKnownFolderPath$shell32.dll
                                  • API String ID: 2061474489-2936008475
                                  • Opcode ID: 137c3b974c8213d8505c58a7a3bd75d4896dcb34208d298c5e60e16d344d2a37
                                  • Instruction ID: 2f011237cabbf8f2a90f8346652a654172557b3474c6ed1d9e0e1fa7dff4fa24
                                  • Opcode Fuzzy Hash: 137c3b974c8213d8505c58a7a3bd75d4896dcb34208d298c5e60e16d344d2a37
                                  • Instruction Fuzzy Hash: 86F03077511225EB8F211FA89C08A6F3F6CEB0A7617000074FD06EB621EB39C814ABA1
                                  APIs
                                  • GetModuleHandleW.KERNEL32(comctl32.dll), ref: 6BDC656C
                                  • GetProcAddress.KERNEL32(00000000,TaskDialogIndirect), ref: 6BDC657C
                                  • EncodePointer.KERNEL32(00000000), ref: 6BDC6585
                                  • DecodePointer.KERNEL32(00000000), ref: 6BDC6593
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: TaskDialogIndirect$comctl32.dll
                                  • API String ID: 2061474489-2809879075
                                  • Opcode ID: 165a6bdf93073837e67d6a499f9c6a3e08b7d99d8bf277e6add42ec882edc44b
                                  • Instruction ID: 5ca1e197eef60197dd981f07d3b36f12a5ca02c5fb969ad3b8d55bdf035fb6e6
                                  • Opcode Fuzzy Hash: 165a6bdf93073837e67d6a499f9c6a3e08b7d99d8bf277e6add42ec882edc44b
                                  • Instruction Fuzzy Hash: 93F05477530225EB8F111F689C08A6F3F6DEB1A7607104464FC0AD7634D739CD159BA1
                                  APIs
                                  • GetModuleHandleW.KERNEL32(shell32.dll), ref: 6BDC5FBC
                                  • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 6BDC5FCC
                                  • EncodePointer.KERNEL32(00000000), ref: 6BDC5FD5
                                  • DecodePointer.KERNEL32(00000000), ref: 6BDC5FE3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: SHCreateItemFromParsingName$shell32.dll
                                  • API String ID: 2061474489-2320870614
                                  • Opcode ID: c13c0a9925b59f0641ac5f96859963ab10ba937d5aae854aab510fcb3f472404
                                  • Instruction ID: c1d63732d39dd6be98f7f9cb52ab6ccc5c7e846768217d733ece4958890ca955
                                  • Opcode Fuzzy Hash: c13c0a9925b59f0641ac5f96859963ab10ba937d5aae854aab510fcb3f472404
                                  • Instruction Fuzzy Hash: C7F05473511225EB8F111F69EC08E6F3F6CEB067657004060FD06EB224D739C9159FA1
                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6BDA95BF,?,?,?,?), ref: 6BDC5E4A
                                  • GetProcAddress.KERNEL32(00000000,RegisterApplicationRecoveryCallback), ref: 6BDC5E5A
                                  • EncodePointer.KERNEL32(00000000,?,?,6BDA95BF,?,?,?,?), ref: 6BDC5E63
                                  • DecodePointer.KERNEL32(00000000,?,?,6BDA95BF,?,?,?,?), ref: 6BDC5E71
                                  Strings
                                  • kernel32.dll, xrefs: 6BDC5E45
                                  • RegisterApplicationRecoveryCallback, xrefs: 6BDC5E54
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: RegisterApplicationRecoveryCallback$kernel32.dll
                                  • API String ID: 2061474489-202725706
                                  • Opcode ID: 97aac9937a53360f0a06bd620c986cfb57805c95ecf6ea41cd9394e0f2e09923
                                  • Instruction ID: 7add7057dc7831307047e1f75ef80b10cf0a07be4700c6870b16785f7078a840
                                  • Opcode Fuzzy Hash: 97aac9937a53360f0a06bd620c986cfb57805c95ecf6ea41cd9394e0f2e09923
                                  • Instruction Fuzzy Hash: 1AF01D77510226ABCF111F75A808A9B3B6CFF167A47004461FD06DA220E739C8159FA1
                                  APIs
                                  • GetModuleHandleW.KERNEL32(uxtheme.dll,?,?,6BDBDA4D,?,00000001,5FCB9D08), ref: 6BDC6276
                                  • GetProcAddress.KERNEL32(00000000,EndBufferedPaint), ref: 6BDC6286
                                  • EncodePointer.KERNEL32(00000000,?,?,6BDBDA4D,?,00000001,5FCB9D08), ref: 6BDC628F
                                  • DecodePointer.KERNEL32(00000000,?,?,6BDBDA4D,?,00000001,5FCB9D08), ref: 6BDC629D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: EndBufferedPaint$uxtheme.dll
                                  • API String ID: 2061474489-2993015961
                                  • Opcode ID: bcbef63f1a230d556d18cb5360a01595882d458114ef3782082804570d196159
                                  • Instruction ID: e4a2abec950a1de2d1751ea54c3811fd30299667ac9379ac4c05f0bb13ba18db
                                  • Opcode Fuzzy Hash: bcbef63f1a230d556d18cb5360a01595882d458114ef3782082804570d196159
                                  • Instruction Fuzzy Hash: 48F01932561225BB9F111F69A85CE6FBF6CEB467A13000465FC06D7620DB39D8059AA1
                                  APIs
                                  • GetModuleHandleW.KERNEL32(user32.dll), ref: 6BDC5F60
                                  • GetProcAddress.KERNEL32(00000000,ChangeWindowMessageFilter), ref: 6BDC5F70
                                  • EncodePointer.KERNEL32(00000000), ref: 6BDC5F79
                                  • DecodePointer.KERNEL32(00000000), ref: 6BDC5F87
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: ChangeWindowMessageFilter$user32.dll
                                  • API String ID: 2061474489-2498399450
                                  • Opcode ID: 6a16c4dd6982043f9dd9b8c096db58cbd39f9f23fba29e1f9fceb252c0ffbde4
                                  • Instruction ID: 8e173fa710333d57b4c3c4c6e90217ba2bbd34da17d1bab908df376610d4829a
                                  • Opcode Fuzzy Hash: 6a16c4dd6982043f9dd9b8c096db58cbd39f9f23fba29e1f9fceb252c0ffbde4
                                  • Instruction Fuzzy Hash: 53F0A732966225EF9F151F78EC0CA5B3F5CEB56BA530001A1FD06D7624EB39C9148AE2
                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6BDA95A3,?,?), ref: 6BDC5DEB
                                  • GetProcAddress.KERNEL32(00000000,RegisterApplicationRestart), ref: 6BDC5DFB
                                  • EncodePointer.KERNEL32(00000000,?,?,6BDA95A3,?,?), ref: 6BDC5E04
                                  • DecodePointer.KERNEL32(00000000,?,?,6BDA95A3,?,?), ref: 6BDC5E12
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: RegisterApplicationRestart$kernel32.dll
                                  • API String ID: 2061474489-1259503209
                                  • Opcode ID: a1083b252ec11634a1ebe3c7d2be8d89dec36369c94ffd77b3878d24d6330394
                                  • Instruction ID: ddbba81e43fa5f8e5a950d93f20c2882441851347bdbba9c9dffc066716f1b7b
                                  • Opcode Fuzzy Hash: a1083b252ec11634a1ebe3c7d2be8d89dec36369c94ffd77b3878d24d6330394
                                  • Instruction Fuzzy Hash: 22F08233520225ABCF101BB8AC48A5B3FACFB16B653000061FD06EB221DB38C8058AA1
                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6BDA95DE,00000000), ref: 6BDC5EAF
                                  • GetProcAddress.KERNEL32(00000000,ApplicationRecoveryInProgress), ref: 6BDC5EBF
                                  • EncodePointer.KERNEL32(00000000,?,?,6BDA95DE,00000000), ref: 6BDC5EC8
                                  • DecodePointer.KERNEL32(00000000,?,?,6BDA95DE,00000000), ref: 6BDC5ED6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: ApplicationRecoveryInProgress$kernel32.dll
                                  • API String ID: 2061474489-2899047487
                                  • Opcode ID: aec3f7bee1f5553e548f8b94e8593b260b3ca8c779a4780b883ff0e4db87a3e9
                                  • Instruction ID: 383efd0e1c78dfb9cb88301b87031ee46c42bafb1492ab312928006a0c9d765a
                                  • Opcode Fuzzy Hash: aec3f7bee1f5553e548f8b94e8593b260b3ca8c779a4780b883ff0e4db87a3e9
                                  • Instruction Fuzzy Hash: 32F03777961329D78F111B68A84DA5B3F6CBB16BA53000561FD06D7A24EF38C9058AE1
                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6BDA9621,00000001), ref: 6BDC5F0B
                                  • GetProcAddress.KERNEL32(00000000,ApplicationRecoveryFinished), ref: 6BDC5F1B
                                  • EncodePointer.KERNEL32(00000000,?,6BDA9621,00000001), ref: 6BDC5F24
                                  • DecodePointer.KERNEL32(00000000,?,?,6BDA9621,00000001), ref: 6BDC5F32
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: ApplicationRecoveryFinished$kernel32.dll
                                  • API String ID: 2061474489-1962646049
                                  • Opcode ID: e0c6e48bcc2fa328495cb54c75ba18a73b162193f793b6700cfb2c8d5a74e172
                                  • Instruction ID: f6c813577620b94fd54eb667527ee74691affa5b699dc9e79dad009e06e3b739
                                  • Opcode Fuzzy Hash: e0c6e48bcc2fa328495cb54c75ba18a73b162193f793b6700cfb2c8d5a74e172
                                  • Instruction Fuzzy Hash: C7F06C739262259B9F001B75A848A1A7F5CFA1676530054A1FD02D7624E738C50546F1
                                  APIs
                                  • GetModuleHandleW.KERNEL32(uxtheme.dll,?,6BDBEAEA,?,?,6BDBDD83,5FCB9D08,?,?,?,Function_0019BAD0,000000FF), ref: 6BDC61B9
                                  • GetProcAddress.KERNEL32(00000000,BufferedPaintUnInit), ref: 6BDC61C9
                                  • EncodePointer.KERNEL32(00000000,?,6BDBEAEA,?,?,6BDBDD83,5FCB9D08,?,?,?,Function_0019BAD0,000000FF), ref: 6BDC61D2
                                  • DecodePointer.KERNEL32(00000000,?,6BDBEAEA,?,?,6BDBDD83,5FCB9D08,?,?,?,Function_0019BAD0,000000FF), ref: 6BDC61E0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: BufferedPaintUnInit$uxtheme.dll
                                  • API String ID: 2061474489-1501038116
                                  • Opcode ID: 161cafb8b10e2185318e010eebeadc2d1970049ceaee70cd28a4608116e7e8a8
                                  • Instruction ID: e96961dd1f8511fd296729ee222ca09c5c7ed2ca1c9b61f9ef6e1660e97ccfd1
                                  • Opcode Fuzzy Hash: 161cafb8b10e2185318e010eebeadc2d1970049ceaee70cd28a4608116e7e8a8
                                  • Instruction Fuzzy Hash: 1AE09B339712329B8F511778B84CB6E3A6CFB537A230110A5FC06E7A25EB38CC054BA1
                                  APIs
                                  • GetModuleHandleW.KERNEL32(uxtheme.dll,?,6BDBD938,?,?,?,?,?,?,?,?,00000008), ref: 6BDC6164
                                  • GetProcAddress.KERNEL32(00000000,BufferedPaintInit), ref: 6BDC6174
                                  • EncodePointer.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000008), ref: 6BDC617D
                                  • DecodePointer.KERNEL32(00000000,?,6BDBD938,?,?,?,?,?,?,?,?,00000008), ref: 6BDC618B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: BufferedPaintInit$uxtheme.dll
                                  • API String ID: 2061474489-1331937065
                                  • Opcode ID: 0134ef7bf9bfbf5741ba9dfc406e21f34f3d05615baf4ed02ed69c270f0a1156
                                  • Instruction ID: 4482ed77d130fc9d7fc1353fe7f3c902313871086c521d4e4be8ad052b646473
                                  • Opcode Fuzzy Hash: 0134ef7bf9bfbf5741ba9dfc406e21f34f3d05615baf4ed02ed69c270f0a1156
                                  • Instruction Fuzzy Hash: EFE06573921221AB9E101B78BC08B5E3AACEB5667230110A1FD06D7626DB28CC064FA1
                                  APIs
                                  • GetModuleHandleW.KERNEL32(shell32.dll,?,6BDAFA8C,?,?,6BDB1142,000FC000,00000010,00000048,6BDB1321,?,?,?,?,00000000), ref: 6BDC6083
                                  • GetProcAddress.KERNEL32(00000000,InitNetworkAddressControl), ref: 6BDC6093
                                  • EncodePointer.KERNEL32(00000000,?,?,6BDB1142,000FC000,00000010,00000048,6BDB1321,?,?,?,?,00000000,?,6BDB15D1,?), ref: 6BDC609C
                                  • DecodePointer.KERNEL32(00000000,?,6BDAFA8C,?,?,6BDB1142,000FC000,00000010,00000048,6BDB1321,?,?,?,?,00000000), ref: 6BDC60AA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: InitNetworkAddressControl$shell32.dll
                                  • API String ID: 2061474489-1950653938
                                  • Opcode ID: 91776d8214ad454bb72b04479fa5ab2b00862183b67dd8b9991bb239729ad972
                                  • Instruction ID: 44f515bf8d5629f4155cc8e75f684d771f96c555b3a9d551ff8a2401ffbe41b3
                                  • Opcode Fuzzy Hash: 91776d8214ad454bb72b04479fa5ab2b00862183b67dd8b9991bb239729ad972
                                  • Instruction Fuzzy Hash: 8AE06573625521AF9E502B74B808A6E3A9CEB0676130004B1FC02E7524EB28CC4596E2
                                  APIs
                                  • GetModuleHandleW.KERNEL32(comctl32.dll), ref: 6BDC651E
                                  • GetProcAddress.KERNEL32(00000000,TaskDialogIndirect), ref: 6BDC652E
                                  • EncodePointer.KERNEL32(00000000), ref: 6BDC6537
                                  • DecodePointer.KERNEL32(00000000), ref: 6BDC6549
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                                  • String ID: TaskDialogIndirect$comctl32.dll
                                  • API String ID: 2061474489-2809879075
                                  • Opcode ID: 546e24040eb5717dd19f0ffb2d553a2d059ea121073e21b8f5ae7d68202c4bfb
                                  • Instruction ID: f8336456d8c246d387695b87c2bebf1946a8881e8495b4ea19a7d9a1a7c1f77d
                                  • Opcode Fuzzy Hash: 546e24040eb5717dd19f0ffb2d553a2d059ea121073e21b8f5ae7d68202c4bfb
                                  • Instruction Fuzzy Hash: 65E048775312229B9F505B78690CA6B3F9DDF166A131144A1FC02D7524F73CCD0556B1
                                  APIs
                                  • GetSysColor.USER32(0000000F), ref: 6BDC3172
                                  • GetSysColor.USER32(00000010), ref: 6BDC317D
                                  • GetSysColor.USER32(00000014), ref: 6BDC3188
                                  • GetSysColor.USER32(00000012), ref: 6BDC3193
                                  • GetSysColor.USER32(00000006), ref: 6BDC319E
                                  • GetSysColorBrush.USER32(0000000F), ref: 6BDC31A9
                                  • GetSysColorBrush.USER32(00000006), ref: 6BDC31B4
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Color$Brush
                                  • String ID:
                                  • API String ID: 2798902688-0
                                  • Opcode ID: b0f5e686013ffa19e5f712586062416354888bfb2002a9e6f9b58919fd741a3f
                                  • Instruction ID: dcb12c113dd26d3a37a71c0499760fd8800c3846dade225ba9ed98b507cabe27
                                  • Opcode Fuzzy Hash: b0f5e686013ffa19e5f712586062416354888bfb2002a9e6f9b58919fd741a3f
                                  • Instruction Fuzzy Hash: 00F0FE72954B00ABDB205FB4954D74ABBA1BB19B01F004919E6C38B9D0E775D084DF40
                                  APIs
                                  • __allrem.LIBCMT ref: 6BEF1EF1
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6BEF1F0D
                                  • __allrem.LIBCMT ref: 6BEF1F24
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6BEF1F42
                                  • __allrem.LIBCMT ref: 6BEF1F59
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6BEF1F77
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                  • String ID:
                                  • API String ID: 1992179935-0
                                  • Opcode ID: 5da91216a5c0cb38c2563a43e03763884b0f0faa865b8a584ebdde390732a92e
                                  • Instruction ID: 37973c7fccef9dc97ac61327cb2f3cac9389baa39088c60805d05a1fe434b4b0
                                  • Opcode Fuzzy Hash: 5da91216a5c0cb38c2563a43e03763884b0f0faa865b8a584ebdde390732a92e
                                  • Instruction Fuzzy Hash: E99116B2A0472AABE7209EB9CC41B5A73FDAF41768F30416EE411D77D0E778D9028752
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 6BDE1F70
                                  • GetWindowRect.USER32(?,?), ref: 6BDE1F84
                                  • PtInRect.USER32(?,?,?), ref: 6BDE1FAD
                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6BDE1FC1
                                    • Part of subcall function 6BDAA828: GetParent.USER32(?), ref: 6BDAA832
                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6BDE2023
                                  • GetFocus.USER32 ref: 6BDE214A
                                    • Part of subcall function 6BE07BAA: __EH_prolog3_GS.LIBCMT ref: 6BE07BB4
                                    • Part of subcall function 6BE07BAA: GetWindowRect.USER32(?,?), ref: 6BE07C48
                                    • Part of subcall function 6BE07BAA: SetRect.USER32(?,00000000,00000000,?,?), ref: 6BE07C69
                                    • Part of subcall function 6BE07BAA: CreateCompatibleDC.GDI32(?), ref: 6BE07C75
                                    • Part of subcall function 6BE07BAA: CreateCompatibleBitmap.GDI32(?,?,00000128), ref: 6BE07C9F
                                    • Part of subcall function 6BE07BAA: GetWindowRect.USER32(?,?), ref: 6BE07CF4
                                    • Part of subcall function 6BE07BAA: GetClientRect.USER32(?,?), ref: 6BE07D01
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Window$CompatibleCreateMessageSend$BitmapClientCursorFocusH_prolog3_Parent
                                  • String ID:
                                  • API String ID: 2914356772-0
                                  • Opcode ID: 38a30bf47f7586bc8d4ff3842755e0b56ecf730128f8b9ed268e78ffa336eae5
                                  • Instruction ID: 5919fe0813e10a2b5e702746cd393894a129d053cf22fcafc5cf9e9e05bc4bbf
                                  • Opcode Fuzzy Hash: 38a30bf47f7586bc8d4ff3842755e0b56ecf730128f8b9ed268e78ffa336eae5
                                  • Instruction Fuzzy Hash: BEA1C335A10626DFDF049F75C895AAE77B5BF45324B0000BEE915AF290DF39A902DFA0
                                  APIs
                                  • LoadCursorW.USER32(00000000,00007F00), ref: 6BDE04F3
                                    • Part of subcall function 6BDA0447: __EH_prolog3.LIBCMT ref: 6BDA044E
                                  • GetClientRect.USER32(?,?), ref: 6BDE0535
                                    • Part of subcall function 6BDA3B11: ClientToScreen.USER32(?,6BDDD900), ref: 6BDA3B20
                                    • Part of subcall function 6BDA3B11: ClientToScreen.USER32(?,6BDDD908), ref: 6BDA3B2D
                                  • IsWindowVisible.USER32(?), ref: 6BDE076E
                                  • SetTimer.USER32(00000000,0000EC15,00000000), ref: 6BDE0791
                                  • InvalidateRect.USER32(?,00000000,00000001,6BF77B18,00000000,00000000,00000000,00000000,00000053), ref: 6BDE0800
                                  • UpdateWindow.USER32(?), ref: 6BDE0809
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Client$RectScreenWindow$CursorH_prolog3InvalidateLoadTimerUpdateVisible
                                  • String ID:
                                  • API String ID: 3378768144-0
                                  • Opcode ID: 7a49ddc5a961f7e1587a5f8d62f518970a7c56e0010123aac8ec52f2a09d3018
                                  • Instruction ID: 075704478ea27cdfef6a081b46c832fd3d9e125443030b8da1506c1035a707f8
                                  • Opcode Fuzzy Hash: 7a49ddc5a961f7e1587a5f8d62f518970a7c56e0010123aac8ec52f2a09d3018
                                  • Instruction Fuzzy Hash: FFA15870A10205DFDF049F24C895BAD3BB1BF49364F1401B9EC19AF295DB78A946DFA0
                                  APIs
                                  • GetParent.USER32(?), ref: 6BDD3E39
                                  • GetParent.USER32(?), ref: 6BDD3E58
                                  • GetParent.USER32(?), ref: 6BDD3E67
                                  • RedrawWindow.USER32(?,00000000,00000000,00000505,6BF2A534,00000000), ref: 6BDD3ECD
                                  • GetParent.USER32(?), ref: 6BDD3ED6
                                  • RedrawWindow.USER32(?,00000000,00000000,00000505,00000000), ref: 6BDD3EFD
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Parent$RedrawWindow
                                  • String ID:
                                  • API String ID: 2946272266-0
                                  • Opcode ID: ea1a5ae1e18e6db6567b2e3c01f4e21ab4c2ccaa19ccd346e9a3974fbb3e3bab
                                  • Instruction ID: 07fcf6bb223e8d2c5845c482a20d79c2c2ad56a625d1e1d571f5b8235954a1bc
                                  • Opcode Fuzzy Hash: ea1a5ae1e18e6db6567b2e3c01f4e21ab4c2ccaa19ccd346e9a3974fbb3e3bab
                                  • Instruction Fuzzy Hash: 51718135B10629DFCF059F74C898B6D7BB9BF49320B0001A9E8569B2A1DB38ED05CF90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$ClientInflate
                                  • String ID:
                                  • API String ID: 256450704-0
                                  • Opcode ID: be1f795c926b238c5b2a615918b2e157b7ab12861b9b87709618c1d96a88df5a
                                  • Instruction ID: 99aa52435bba5905d79efc311bdbde1a71b2134df3f50cf4a1f30ca220ec3474
                                  • Opcode Fuzzy Hash: be1f795c926b238c5b2a615918b2e157b7ab12861b9b87709618c1d96a88df5a
                                  • Instruction Fuzzy Hash: 26711C72E00609DFDB04CFA9C844ADEB7B6FF49314F14816AE919EB210D775AA52CB90
                                  APIs
                                  • GetWindowRect.USER32(?,?), ref: 6BDB8E87
                                  • EqualRect.USER32(?,00000000), ref: 6BDB8EA5
                                    • Part of subcall function 6BDBB9D8: SetWindowPos.USER32(?,00000115,00000000,00000000,00000002,00000002,00000000,?,?,6BDB906B,00000000,00000002,00000002,00000000,00000000,00000115), ref: 6BDBBA00
                                  • GetDlgCtrlID.USER32(?), ref: 6BDB8F51
                                  • CopyRect.USER32(?,00000000), ref: 6BDB8F8D
                                  • GetParent.USER32(?), ref: 6BDB906E
                                  • SetParent.USER32(?,?), ref: 6BDB9084
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$ParentWindow$CopyCtrlEqual
                                  • String ID:
                                  • API String ID: 1662903855-0
                                  • Opcode ID: 679eae42cd8e5d194f27d6c16361701d597afde31bb0e2d3e081ddc6118312ea
                                  • Instruction ID: 1dac687b2f7a5251a9903f87a5f8bd52379d972ae23e709c17cb4eb81f0870b6
                                  • Opcode Fuzzy Hash: 679eae42cd8e5d194f27d6c16361701d597afde31bb0e2d3e081ddc6118312ea
                                  • Instruction Fuzzy Hash: EA61A671A01619ABDF149F74CC89BEAB7B5FF55314F0002A9E81ADB191CB389A45CF60
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?), ref: 6BDE8071
                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?,00000000,00000000), ref: 6BDE80DC
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6BDE80F9
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,?,?,00000000,00000000,00000000), ref: 6BDE8138
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 6BDE8197
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6BDE81BA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiStringWide
                                  • String ID:
                                  • API String ID: 2829165498-0
                                  • Opcode ID: b3aa1efdb47aa1f225bdcbf878998c1f8f0e26712d328c0d9345d4e25fffb501
                                  • Instruction ID: 61b6b1074e6a464589483bce46cbcda009d7712c3e543fdd7b1295ce5629520f
                                  • Opcode Fuzzy Hash: b3aa1efdb47aa1f225bdcbf878998c1f8f0e26712d328c0d9345d4e25fffb501
                                  • Instruction Fuzzy Hash: 2F51D072900206EFEF104F64CC44FAB3BA9EF41765F114469FD25EA190D77AD9029B70
                                  APIs
                                  • GetParent.USER32(00000000), ref: 6BDD0C44
                                  • SendMessageW.USER32(?,0000040C,00000000,00000000), ref: 6BDD0C80
                                  • SendMessageW.USER32(00000000,0000041C,00000000,?), ref: 6BDD0CB3
                                  • SetRectEmpty.USER32(?), ref: 6BDD0D19
                                  • SendMessageW.USER32(00000000,0000040B,00000000,?), ref: 6BDD0D75
                                  • RedrawWindow.USER32(00000000,00000000,00000000,00000505), ref: 6BDD0DA4
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessageSend$EmptyParentRectRedrawWindow
                                  • String ID:
                                  • API String ID: 3879113052-0
                                  • Opcode ID: 4c602bc5fdf7534cd4422a3f80d26aaf7875dee548c60b6a43c47b4d26791084
                                  • Instruction ID: 9374fd0914d4970d21e237b6445fca9e29611e58b91d80477da03a35bc79a0af
                                  • Opcode Fuzzy Hash: 4c602bc5fdf7534cd4422a3f80d26aaf7875dee548c60b6a43c47b4d26791084
                                  • Instruction Fuzzy Hash: 07518075A10619DFDB14CF78C8A4BADBBB5FF89714F10416ED856AB291DB34A900CF80
                                  APIs
                                  • CallNextHookEx.USER32(00000000,?,?), ref: 6BDD5FAF
                                  • WindowFromPoint.USER32(?,?), ref: 6BDD5FD9
                                  • ScreenToClient.USER32(00000020,00000200), ref: 6BDD600F
                                  • GetParent.USER32(00000020), ref: 6BDD6076
                                  • UpdateWindow.USER32(?), ref: 6BDD60DC
                                  • SendMessageW.USER32(?,00000100,00000024,00000000), ref: 6BDD615A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$CallClientFromHookMessageNextParentPointScreenSendUpdate
                                  • String ID:
                                  • API String ID: 4074787488-0
                                  • Opcode ID: d352dac38df7917e46239e40a8a5259ea4d7f1df0a0a97db5dfd592d6e29f476
                                  • Instruction ID: 8f2d8642e11cc374cd6219ca128965fa6cc8d0b4a676b8363c4b873dc5999407
                                  • Opcode Fuzzy Hash: d352dac38df7917e46239e40a8a5259ea4d7f1df0a0a97db5dfd592d6e29f476
                                  • Instruction Fuzzy Hash: 8D51EE3A610215EFDF049FA4C844F6D7BB6FF49320F1044B9E9659B2A1DB39D900DB90
                                  APIs
                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6BDB21D2
                                  • IsWindow.USER32(?), ref: 6BDB224D
                                  • ClientToScreen.USER32(?,?), ref: 6BDB225E
                                  • IsWindow.USER32(?), ref: 6BDB227C
                                  • ClientToScreen.USER32(?,?), ref: 6BDB22AC
                                  • SendMessageW.USER32(?,0000020A,?,?), ref: 6BDB230A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ClientMessageScreenSendWindow
                                  • String ID:
                                  • API String ID: 2093367132-0
                                  • Opcode ID: 9b6ceb8304ad091939c9c582237f015737e19d71cd3073cbd34692e5d7196070
                                  • Instruction ID: 0f5ebdb2cf9aad0295f8d0627cef5afe8810dabadcca1904d852c2682d8bf814
                                  • Opcode Fuzzy Hash: 9b6ceb8304ad091939c9c582237f015737e19d71cd3073cbd34692e5d7196070
                                  • Instruction Fuzzy Hash: 1F41C5F3510602FADB114F74CD49B3ABEA4EB067A9F0009A8E9A7DE5A4D739D640E710
                                  APIs
                                    • Part of subcall function 6BDBB682: GetWindowLongW.USER32(458BF84D,000000F0), ref: 6BDBB68F
                                  • SendMessageW.USER32(?,0000043D,00000000,00000000), ref: 6BDA7E6E
                                  • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 6BDA7E7F
                                  • SendMessageW.USER32(?,0000043C,00000001,00000000), ref: 6BDA7E93
                                  • SendMessageW.USER32(?,0000043C,00000000,00000000), ref: 6BDA7EA4
                                  • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 6BDA7EB3
                                  • InvalidateRect.USER32(?,00000000,00000001,00000000,?,00000000,?,?,?,?,?,?,?,?,?,6BDA7850), ref: 6BDA7F46
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessageSend$InvalidateLongRectWindow
                                  • String ID:
                                  • API String ID: 74886174-0
                                  • Opcode ID: e4efda19d3a5d3958217f7be17abe7e7b2310591835a51b99f36a1907872596b
                                  • Instruction ID: 066d23bd40e1eb7e73c52bcf46a1556efa6c43ad053daf6d322df2343d5621de
                                  • Opcode Fuzzy Hash: e4efda19d3a5d3958217f7be17abe7e7b2310591835a51b99f36a1907872596b
                                  • Instruction Fuzzy Hash: E8418F31710218BBDF119F60CC99FEE7B65FF4A720F040099FA45AB291DB74A941CBA0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDCB31A
                                  • GlobalAlloc.KERNEL32(00000040,00000004), ref: 6BDCB481
                                  • GlobalLock.KERNEL32(00000000), ref: 6BDCB48E
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6BDCB49F
                                  • SetPropW.USER32(?,00000000), ref: 6BDCB4AF
                                  • GlobalFree.KERNEL32(00000000), ref: 6BDCB4BA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Global$AllocFreeH_prolog3LockPropUnlock
                                  • String ID:
                                  • API String ID: 2329575679-0
                                  • Opcode ID: d1e27913571cf2e400b5fd364d8c6908923cc49ab7693302bda5b30a7893bc51
                                  • Instruction ID: 519a1c3685d0f6b4a8f5950f0d93760a98bb484a9a6e6bdc0bc0e7d41a1fa39a
                                  • Opcode Fuzzy Hash: d1e27913571cf2e400b5fd364d8c6908923cc49ab7693302bda5b30a7893bc51
                                  • Instruction Fuzzy Hash: F341037120471AEBDB049F74C845B9E7BA8BF05368F104559E929CF390DF38DA01DBA1
                                  APIs
                                  • GetWindowRect.USER32(00000000,?), ref: 6BDE32B6
                                  • OffsetRect.USER32(?,?,?), ref: 6BDE32D7
                                  • SendMessageW.USER32(00000000,0000000B,00000000,00000000), ref: 6BDE32E4
                                  • IsWindowVisible.USER32(00000000), ref: 6BDE32ED
                                  • SendMessageW.USER32(00000000,0000000B,00000001,00000000), ref: 6BDE3360
                                  • RedrawWindow.USER32(00000000,00000000,00000000,00000105), ref: 6BDE3370
                                    • Part of subcall function 6BDBBA35: ShowWindow.USER32(?,00000000,?,?,6BDB921A,00000000), ref: 6BDBBA46
                                    • Part of subcall function 6BDBB9D8: SetWindowPos.USER32(?,00000115,00000000,00000000,00000002,00000002,00000000,?,?,6BDB906B,00000000,00000002,00000002,00000000,00000000,00000115), ref: 6BDBBA00
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$MessageRectSend$OffsetRedrawShowVisible
                                  • String ID:
                                  • API String ID: 2359670889-0
                                  • Opcode ID: 1fedeeea384c272b3ca98c243cb6fafffca84b69e1d3b16d2c3f0c4a4297ba13
                                  • Instruction ID: 1d90d9c1e1c296391e22c6e523f9f446395698ea9335aea6b05741ee2b50a358
                                  • Opcode Fuzzy Hash: 1fedeeea384c272b3ca98c243cb6fafffca84b69e1d3b16d2c3f0c4a4297ba13
                                  • Instruction Fuzzy Hash: 44310BB2A10609BFDB11DBB8CD85EBFB7B9FB49714F000519F556E61A0DB71AE009B20
                                  APIs
                                  • PtInRect.USER32(?,?,?), ref: 6BDE2911
                                  • ReleaseCapture.USER32 ref: 6BDE291F
                                  • PtInRect.USER32(?,?,?), ref: 6BDE2974
                                  • InvalidateRect.USER32(?,?,00000001,?,?,?,6BDE1A6F,00000000,00000000,00000000), ref: 6BDE29DE
                                  • SetTimer.USER32(?,0000EC16,00000050,00000000), ref: 6BDE2A02
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$CaptureInvalidateReleaseTimer
                                  • String ID:
                                  • API String ID: 2903485716-0
                                  • Opcode ID: 9add27434ab1478608590818b3379c37a75b4f3a18cc46654bab1953c99cb05e
                                  • Instruction ID: 0e6f568aa72a35e6c9c1e9d8dd0a8a76d7bf85f7c027c2821b89c722a1a6e54a
                                  • Opcode Fuzzy Hash: 9add27434ab1478608590818b3379c37a75b4f3a18cc46654bab1953c99cb05e
                                  • Instruction Fuzzy Hash: 3631B13174064BEFDF148F30CD48FA9BB65FF49725F000166E96A8A1A0DB74A421EBA1
                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 6BDAB10A
                                  • GetWindow.USER32(?,00000005), ref: 6BDAB121
                                  • GetWindowRect.USER32(00000000,?), ref: 6BDAB13C
                                    • Part of subcall function 6BDA3B50: ScreenToClient.USER32(?,6BDB8FA1), ref: 6BDA3B5F
                                    • Part of subcall function 6BDA3B50: ScreenToClient.USER32(?,6BDB8FA9), ref: 6BDA3B6C
                                  • SetWindowPos.USER32(00000000,00000000,?,?,00000000,00000000,00000015,?), ref: 6BDAB162
                                  • GetWindow.USER32(00000000,00000002), ref: 6BDAB16B
                                  • ScrollWindow.USER32(?,?,?,?,?), ref: 6BDAB187
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$ClientScreen$RectScrollVisible
                                  • String ID:
                                  • API String ID: 1714389229-0
                                  • Opcode ID: c830c6daef739bd08d67dada05b5d1d392a8e9478d58bbcb52336e455afcbbb8
                                  • Instruction ID: 881bf9d3661ef012e85cf202c5dc2b29a06718f9ec4d7a22ae427c83f220e9de
                                  • Opcode Fuzzy Hash: c830c6daef739bd08d67dada05b5d1d392a8e9478d58bbcb52336e455afcbbb8
                                  • Instruction Fuzzy Hash: 3321733661060DEBDB01DF64CC84B6F7BB9FF99724B104019F9469B250DB34DD459B60
                                  APIs
                                  • __EH_prolog3_catch.LIBCMT ref: 6BDB5C3E
                                  • UnpackDDElParam.USER32(000003E8,?,?,?), ref: 6BDB5C76
                                  • GlobalLock.KERNEL32(?), ref: 6BDB5C7E
                                  • GlobalUnlock.KERNEL32(?), ref: 6BDB5CB2
                                  • ReuseDDElParam.USER32(?,000003E8,000003E4,00008000,?), ref: 6BDB5CF5
                                  • PostMessageW.USER32(?,000003E4,?,00000000), ref: 6BDB5D01
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: GlobalParam$H_prolog3_catchLockMessagePostReuseUnlockUnpack
                                  • String ID:
                                  • API String ID: 4045269880-0
                                  • Opcode ID: 7318a91094dabc404e5d61033774b3c5b973f96dd033aba2d32ef99577101904
                                  • Instruction ID: 6bc229195044021f8f50073d4d60a05cc89c0defa4c77c408f29ca06fbafac78
                                  • Opcode Fuzzy Hash: 7318a91094dabc404e5d61033774b3c5b973f96dd033aba2d32ef99577101904
                                  • Instruction Fuzzy Hash: EE318F7190010AEFEF01DB60C895ABEB7B5AF14329F104558E5027B2A0DB785E05CB60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDBE984
                                  • CreateRectRgnIndirect.GDI32(00000000), ref: 6BDBE9A4
                                    • Part of subcall function 6BDA34DA: SelectClipRgn.GDI32(?,00000000), ref: 6BDA34FA
                                    • Part of subcall function 6BDA34DA: SelectClipRgn.GDI32(?,00000000), ref: 6BDA3510
                                  • GetParent.USER32(00000000), ref: 6BDBE9C4
                                  • DrawThemeParentBackground.UXTHEME(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00000018), ref: 6BDBE9E5
                                  • MapWindowPoints.USER32(00000000,?,00000000,00000001), ref: 6BDBEA19
                                  • SendMessageW.USER32(?,00000014,00000000,00000000), ref: 6BDBEA45
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ClipParentSelect$BackgroundCreateDrawH_prolog3IndirectMessagePointsRectSendThemeWindow
                                  • String ID:
                                  • API String ID: 935984306-0
                                  • Opcode ID: c280ab7c95a408ff298a36124e1f377e81ff1a2d1e78d3b11b7d4e2bdd89c659
                                  • Instruction ID: 66e41d305b2d7f4ec5ee5447f231f6987554328e338c63962603ac4e69a678f0
                                  • Opcode Fuzzy Hash: c280ab7c95a408ff298a36124e1f377e81ff1a2d1e78d3b11b7d4e2bdd89c659
                                  • Instruction Fuzzy Hash: 563120B2A1020ADFCF01DFA0C955BAE7BB5FF08365F004458E516AB161DB79DA04DB60
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDC447D
                                    • Part of subcall function 6BDA3A38: __EH_prolog3.LIBCMT ref: 6BDA3A3F
                                    • Part of subcall function 6BDA3A38: GetWindowDC.USER32(00000000,00000004,6BDBDFDA,00000000), ref: 6BDA3A6B
                                  • GetClientRect.USER32(?,?), ref: 6BDC449F
                                  • GetWindowRect.USER32(?,?), ref: 6BDC44B3
                                    • Part of subcall function 6BDA3B50: ScreenToClient.USER32(?,6BDB8FA1), ref: 6BDA3B5F
                                    • Part of subcall function 6BDA3B50: ScreenToClient.USER32(?,6BDB8FA9), ref: 6BDA3B6C
                                  • OffsetRect.USER32(?,?,?), ref: 6BDC44D4
                                    • Part of subcall function 6BDA351D: ExcludeClipRect.GDI32(?,?,?,?,?), ref: 6BDA3554
                                    • Part of subcall function 6BDA351D: ExcludeClipRect.GDI32(00000000,?,?,?,?), ref: 6BDA3571
                                  • OffsetRect.USER32(?,?,?), ref: 6BDC44F6
                                    • Part of subcall function 6BDA357E: IntersectClipRect.GDI32(?,?,?,?,?), ref: 6BDA35B5
                                    • Part of subcall function 6BDA357E: IntersectClipRect.GDI32(00000000,?,?,?,?), ref: 6BDA35D2
                                  • SendMessageW.USER32(?,00000014,?,00000000), ref: 6BDC452E
                                    • Part of subcall function 6BDA3A8D: ReleaseDC.USER32(?,00000000), ref: 6BDA3AC1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Clip$Client$ExcludeIntersectOffsetScreenWindow$H_prolog3H_prolog3_MessageReleaseSend
                                  • String ID:
                                  • API String ID: 3860140383-0
                                  • Opcode ID: a0d39f4978a96fb07f0e5ca364b1d8c775fde820123f58e20da87cb8ebf16889
                                  • Instruction ID: 5f1385f7ab46d02540289bc1d264bd5a9bf11815242378efe5e04d494739c812
                                  • Opcode Fuzzy Hash: a0d39f4978a96fb07f0e5ca364b1d8c775fde820123f58e20da87cb8ebf16889
                                  • Instruction Fuzzy Hash: FC31E772A1011DAFCF05DBA4CC99EFDB7B9FF59314B140219E402A7150EB38AA09CB60
                                  APIs
                                  • GetWindowLongW.USER32(?,000000F0), ref: 6BDB7018
                                  • GetParent.USER32(?), ref: 6BDB7026
                                  • GetParent.USER32(?), ref: 6BDB703D
                                  • GetLastActivePopup.USER32(?), ref: 6BDB7050
                                  • IsWindowEnabled.USER32(?), ref: 6BDB7064
                                  • EnableWindow.USER32(?,00000000), ref: 6BDB7077
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
                                  • String ID:
                                  • API String ID: 670545878-0
                                  • Opcode ID: e04fcbe350f4b6e60b6e00831e9854ade6daf7ccdd456747192962091c007b16
                                  • Instruction ID: 6c848c15eda2c106669dc40cc2dbdb2d67eb8c455857e714f1c2c8bd571c806c
                                  • Opcode Fuzzy Hash: e04fcbe350f4b6e60b6e00831e9854ade6daf7ccdd456747192962091c007b16
                                  • Instruction Fuzzy Hash: 811104B3A45621FBDF210B298884B5A77B8AF26F71F0101B6EC53AF244CB78DC0066D0
                                  APIs
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6BE2EA9A
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6BE2EAB0
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6BE2EABB
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6BE2EAC6
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6BE2EAD1
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6BE2EADC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ContextExternal$BaseBase::~Concurrency::details::
                                  • String ID:
                                  • API String ID: 1690591649-0
                                  • Opcode ID: eeef566242975813b18ffdc46413a558ba0f97266c79ebf25a5d3e6992b76ef5
                                  • Instruction ID: e1f75bf26dcc9a39e5c0542f422da5a1056d772da6a9d7d3ec123820da7ef54a
                                  • Opcode Fuzzy Hash: eeef566242975813b18ffdc46413a558ba0f97266c79ebf25a5d3e6992b76ef5
                                  • Instruction Fuzzy Hash: 35217C72300915EBD708DFB4D8A1BADB765FF41728F60062DC42A47290DF397A1ACB91
                                  APIs
                                  • GetLastError.KERNEL32(00000001,?,6BEE24B6,6BDA03DB,6BEE1AF5,?,00000007,6BF6F598,00000010,6BEE1B18,?,?,6BEE1BA1,?,00000001,?), ref: 6BEF7D0A
                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6BEF7D18
                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6BEF7D31
                                  • SetLastError.KERNEL32(00000000,00000007,6BF6F598,00000010,6BEE1B18,?,?,6BEE1BA1,?,00000001,?,?,00000001,?,6BF6F5C0,0000000C), ref: 6BEF7D83
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ErrorLastValue___vcrt_
                                  • String ID:
                                  • API String ID: 3852720340-0
                                  • Opcode ID: 9c24ad03a540e301bc1490af875319e4c3da588acbae5ff49b1d4c1116a719d4
                                  • Instruction ID: 68d6f5e73efaacf16918397fdbb0f16a36205a6fe49e7a928c1c03b8e4a830f4
                                  • Opcode Fuzzy Hash: 9c24ad03a540e301bc1490af875319e4c3da588acbae5ff49b1d4c1116a719d4
                                  • Instruction Fuzzy Hash: 6F01F53311E6225EAB100579AC95F663BADDF037BC7700379E011421F0EF6AC91B9180
                                  APIs
                                  • GetDesktopWindow.USER32 ref: 6BDB323C
                                  • GetWindow.USER32(00000000), ref: 6BDB3243
                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 6BDB3271
                                  • ShowWindow.USER32(00000000,00000000), ref: 6BDB328C
                                  • ShowWindow.USER32(00000000,00000004), ref: 6BDB32AD
                                  • GetWindow.USER32(00000000,00000002), ref: 6BDB32BA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Show$DesktopLong
                                  • String ID:
                                  • API String ID: 3178490500-0
                                  • Opcode ID: a1f54ca654fb62440d4603d4bb64a291875912ebaf56cd17d309f2038f4f6abe
                                  • Instruction ID: baa929f38c4fd5f7ac12ddc6895cc72aee72e85dadb5b2522179d7d65d71e8dd
                                  • Opcode Fuzzy Hash: a1f54ca654fb62440d4603d4bb64a291875912ebaf56cd17d309f2038f4f6abe
                                  • Instruction Fuzzy Hash: 4311A1B6D05B15EBDB324B288C09B5A3A68AF53775F100261FD93AD190EB38C488A695
                                  APIs
                                  • type_info::operator==.LIBVCRUNTIME ref: 6BEF870E
                                  • CallUnexpected.LIBVCRUNTIME ref: 6BEF8987
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CallUnexpectedtype_info::operator==
                                  • String ID: csm$csm$csm
                                  • API String ID: 2673424686-393685449
                                  • Opcode ID: 16763ad35a39b2539e0885cd8c0f1167f19731606283226ab802d1963bdc9c3b
                                  • Instruction ID: 263bb15a831490023fc7165f06d4a4159ec664a2f407c02910481f1a69fefa19
                                  • Opcode Fuzzy Hash: 16763ad35a39b2539e0885cd8c0f1167f19731606283226ab802d1963bdc9c3b
                                  • Instruction Fuzzy Hash: 69B16D71D00209EFCF15CFA5C84199EBBB9FF04318F60419AE814AB255D779DA62CF92
                                  APIs
                                  • ClientToScreen.USER32(?,?), ref: 6BDBFE16
                                  • GetDlgCtrlID.USER32(00000000), ref: 6BDBFE21
                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 6BDBFE31
                                  • GetWindowRect.USER32(00000000,?), ref: 6BDBFE4A
                                  • PtInRect.USER32(?,?,?), ref: 6BDBFE5A
                                  • GetWindow.USER32(?,00000005), ref: 6BDBFE67
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Rect$ClientCtrlLongScreen
                                  • String ID:
                                  • API String ID: 1315500227-0
                                  • Opcode ID: f92eac767f487039211219c9c6b4aef2c4f56709b8d3c7fbcd6f056dc9065182
                                  • Instruction ID: adf7b3b4f4e9b8832ab5db2576ae5064313865719ba685d9b3542d401ade0289
                                  • Opcode Fuzzy Hash: f92eac767f487039211219c9c6b4aef2c4f56709b8d3c7fbcd6f056dc9065182
                                  • Instruction Fuzzy Hash: 4F01C076910219FBCF01DF64C808FAF77A8EF16714F504225F843EA090DB34DA488BA5
                                  APIs
                                  • GetFocus.USER32 ref: 6BDBFCAB
                                    • Part of subcall function 6BDBFD47: GetWindowLongW.USER32(?,000000F0), ref: 6BDBFD62
                                    • Part of subcall function 6BDBFD47: GetClassNameW.USER32(?,?,0000000A), ref: 6BDBFD77
                                    • Part of subcall function 6BDBFD47: CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,combobox,000000FF,?,?,?,?,?,?,?,?,?,6BDA75A6), ref: 6BDBFD8E
                                  • GetParent.USER32(00000000), ref: 6BDBFCCC
                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 6BDBFCEB
                                  • GetParent.USER32(00000000), ref: 6BDBFCF9
                                  • GetDesktopWindow.USER32 ref: 6BDBFD01
                                  • SendMessageW.USER32(00000000,0000014F,00000000,00000000), ref: 6BDBFD15
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$LongParent$ClassCompareDesktopFocusMessageNameSendString
                                  • String ID:
                                  • API String ID: 1233893325-0
                                  • Opcode ID: 176880c46da99373470a29e7b24a4ca9aa63c4798034da18c10282ddd9748a87
                                  • Instruction ID: f223c3f0df138a5ae6902cd09e3563409aeafeb752c642c5aef5a041733f4931
                                  • Opcode Fuzzy Hash: 176880c46da99373470a29e7b24a4ca9aa63c4798034da18c10282ddd9748a87
                                  • Instruction Fuzzy Hash: 3EF0F47B101561A3E70213349C18B6E3668DB82F70F100258F92BEE1808F38C54165A1
                                  APIs
                                  • __EH_prolog3_catch.LIBCMT ref: 6BDD01FC
                                    • Part of subcall function 6BE1DE20: __EH_prolog3.LIBCMT ref: 6BE1DE27
                                    • Part of subcall function 6BDBB793: GetDlgCtrlID.USER32(?), ref: 6BDBB79E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CtrlH_prolog3H_prolog3_catch
                                  • String ID: %TsMFCToolBar-%d$%TsMFCToolBar-%d%x$Buttons$MFCToolBars
                                  • API String ID: 905329913-3577816979
                                  • Opcode ID: 3198daa8dba666b2467ed841fc86ca4889a43bec4688a8da7dbf4b73c8f5d47d
                                  • Instruction ID: 8dfa3b337c9308ae1219a42545ecf12e6fe5a2cce9c8cb5dd0e9803733eda81e
                                  • Opcode Fuzzy Hash: 3198daa8dba666b2467ed841fc86ca4889a43bec4688a8da7dbf4b73c8f5d47d
                                  • Instruction Fuzzy Hash: C7915135A00209DFDF00DFA4C995AEDB7B6BF89324F144068E515AB3A1DB39AE05CF61
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BE26C7C
                                  • RegisterClipboardFormatW.USER32(00000010), ref: 6BE26CC6
                                  • __EH_prolog3_catch.LIBCMT ref: 6BE26CFB
                                    • Part of subcall function 6BDE39EC: __EH_prolog3.LIBCMT ref: 6BDE39F3
                                  • __EH_prolog3_catch.LIBCMT ref: 6BE26E4A
                                    • Part of subcall function 6BDBF248: __EH_prolog3_catch.LIBCMT ref: 6BDBF24F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: H_prolog3_catch$H_prolog3$ClipboardFormatRegister
                                  • String ID: ToolbarButton%p
                                  • API String ID: 3051953459-899657487
                                  • Opcode ID: c6a423170d7491d2d293df722f5b228e67286d0ebc8021f0d104fd9b769cdb32
                                  • Instruction ID: 9e376b45cb3952a92dcfa9b0eba350cbf10bb035eb15c713721a5b55d3f659b8
                                  • Opcode Fuzzy Hash: c6a423170d7491d2d293df722f5b228e67286d0ebc8021f0d104fd9b769cdb32
                                  • Instruction Fuzzy Hash: BF41EE75A102159BCF10AB78C845BAE77B4AF85768F100968E816AF390DF3CDB05CB70
                                  APIs
                                  • SendMessageW.USER32(?,00000433,00000000,?), ref: 6BDACEFA
                                  • GetWindowLongW.USER32(?,000000FC), ref: 6BDACF05
                                  • GetWindowLongW.USER32(?,000000FC), ref: 6BDACF19
                                  • SetWindowLongW.USER32(?,000000FC,00000000), ref: 6BDACF42
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: LongWindow$MessageSend
                                  • String ID: ,
                                  • API String ID: 2178440468-3772416878
                                  • Opcode ID: cd0b0625e24e65c47b30d78a85bcae9399760c655c4c85bbf4a192420b71c03c
                                  • Instruction ID: 10889f1ef36fae09d584ed91cae62ffc6ab321a8205d3e4e878e935051bd9a4d
                                  • Opcode Fuzzy Hash: cd0b0625e24e65c47b30d78a85bcae9399760c655c4c85bbf4a192420b71c03c
                                  • Instruction Fuzzy Hash: B641D271A11619DFCF059F74C884A6EBBB5BF09734B0402A9D852AB391DB38EE14DB90
                                  APIs
                                  • __EH_prolog3_catch.LIBCMT ref: 6BDF10D8
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000080,6BE52BD1,?,00000000,?,?,00000000), ref: 6BDF1113
                                    • Part of subcall function 6BDE39EC: __EH_prolog3.LIBCMT ref: 6BDE39F3
                                  • GetTempPathW.KERNEL32(00000104,00000000,00000104,?,00000000,00000080,6BE52BD1,?,00000000,?,?,00000000), ref: 6BDF1134
                                  • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000002,04000100,00000000,000000FF,?,00000104,000000FF,?,?,00000000), ref: 6BDF1189
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CloseCreateFileH_prolog3H_prolog3_catchHandlePathTemp
                                  • String ID: AFX
                                  • API String ID: 775233504-1300893600
                                  • Opcode ID: 27317f9a0115dbbfaa38957c420c9337632d97fbd91fe14437db2e27d245158f
                                  • Instruction ID: 43bb90e34b477e843c385604d2e00ad47febdd99bf14d4bc40aeaadba15dd9dc
                                  • Opcode Fuzzy Hash: 27317f9a0115dbbfaa38957c420c9337632d97fbd91fe14437db2e27d245158f
                                  • Instruction Fuzzy Hash: 07415A71910109EBDB14DFB4D892BEEB7B8BF15328F104658E456AB1D0DB386B09CB70
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDB4039
                                    • Part of subcall function 6BDBB682: GetWindowLongW.USER32(458BF84D,000000F0), ref: 6BDBB68F
                                  • swprintf.LIBCMT ref: 6BDB408E
                                  • swprintf.LIBCMT ref: 6BDB4132
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: swprintf$H_prolog3_LongWindow
                                  • String ID: - $:%d
                                  • API String ID: 524023746-2359489159
                                  • Opcode ID: 38a4a987a0df404f704ba48e71c6aab05dced0d52e1523a529cb0bcc10642400
                                  • Instruction ID: afb76b83aef6c9c5982f39c9345215ba00437b71a9ee9b9e65f5c9cd8e734dda
                                  • Opcode Fuzzy Hash: 38a4a987a0df404f704ba48e71c6aab05dced0d52e1523a529cb0bcc10642400
                                  • Instruction Fuzzy Hash: 163125B2900515EADB14D7B0CD56FAFB36CEF14314F000499A91AAF151EB39AF55CF60
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: String$FreeH_prolog3
                                  • String ID: @
                                  • API String ID: 315669285-2766056989
                                  • Opcode ID: 322a71b03af022134026903691425227032e9c06fd7694b14ee0b6cff6049fd0
                                  • Instruction ID: b234cef17bdb48ed3d54dd365c68b4092d3eee7a836f20ce740a7e984a01744a
                                  • Opcode Fuzzy Hash: 322a71b03af022134026903691425227032e9c06fd7694b14ee0b6cff6049fd0
                                  • Instruction Fuzzy Hash: CD317EB191014AEBDF01CFB4CC85EAF7B79EF04324F104529F929AB290DB39DA159B61
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BE29BDF
                                    • Part of subcall function 6BE1DE20: __EH_prolog3.LIBCMT ref: 6BE1DE27
                                    • Part of subcall function 6BDBB793: GetDlgCtrlID.USER32(?), ref: 6BDBB79E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: H_prolog3$Ctrl
                                  • String ID: %TsBasePane-%d$%TsBasePane-%d%x$BasePanes$IsVisible
                                  • API String ID: 3879667756-2169875744
                                  • Opcode ID: bcbe163e0a1af37a2c71ad47d3705b785e04384eee536d4bcf20e7a9170b0f6f
                                  • Instruction ID: dd7ff3b6921cdc699f649f4dbe55d930ebebcffe43613ea36c85b6dc8869b393
                                  • Opcode Fuzzy Hash: bcbe163e0a1af37a2c71ad47d3705b785e04384eee536d4bcf20e7a9170b0f6f
                                  • Instruction Fuzzy Hash: 1B31E936A00219DBCF00EFB4CC95ABEB7B5FF85324F140568D5126B391DB39AA15CB61
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BE29ACB
                                    • Part of subcall function 6BE1DE20: __EH_prolog3.LIBCMT ref: 6BE1DE27
                                    • Part of subcall function 6BDBB793: GetDlgCtrlID.USER32(?), ref: 6BDBB79E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: H_prolog3$Ctrl
                                  • String ID: %TsBasePane-%d$%TsBasePane-%d%x$BasePanes$IsVisible
                                  • API String ID: 3879667756-2169875744
                                  • Opcode ID: 5a4924ddd30fa4ca24befef5347f70665f7728492c310d5fb298812a44467cf3
                                  • Instruction ID: 2185b292c480a8cf229859601cce70ae8422babd14522e58abb296ab52a9cf3f
                                  • Opcode Fuzzy Hash: 5a4924ddd30fa4ca24befef5347f70665f7728492c310d5fb298812a44467cf3
                                  • Instruction Fuzzy Hash: 9A3183759002199BCF00DFA4C891AFEB7B5BF49328F140568E911AB391DB39AE15CB60
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: __snprintf_s$ClassInfo
                                  • String ID: Afx:%p:%x$Afx:%p:%x:%p:%p:%p
                                  • API String ID: 1341824228-2801496823
                                  • Opcode ID: e4d2a2729e57b9c423a44ba49d43f45dbeec82283e8f459ae13919b8bd1dc376
                                  • Instruction ID: 4c68d607bcacaeeba62cf632fef45367d68099454f313e803f319efbff369324
                                  • Opcode Fuzzy Hash: e4d2a2729e57b9c423a44ba49d43f45dbeec82283e8f459ae13919b8bd1dc376
                                  • Instruction Fuzzy Hash: 4A212BB6D00209EFDB11DFA9C841ACEBBF4BF5A324F104056F905EB210E7799A519BB1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Edit
                                  • API String ID: 0-554135844
                                  • Opcode ID: f630adef8f01ccbc65403854851628e58e0a58a813025b424fe4f9accf98edee
                                  • Instruction ID: 08a876d17a0c8761dbc713f4ca9d2e8eafd379625de5a5fec190a65fccf0c378
                                  • Opcode Fuzzy Hash: f630adef8f01ccbc65403854851628e58e0a58a813025b424fe4f9accf98edee
                                  • Instruction Fuzzy Hash: 1B11E1B6230231FBEB141B31CC05B6677A9BF06B75F000475EA97AA4A1DF79D640E6A0
                                  APIs
                                  • GetModuleHandleW.KERNEL32(Advapi32.dll,5FCB9D08,?,?,?,Function_0019BAD0,000000FF), ref: 6BDC68E1
                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 6BDC68F1
                                    • Part of subcall function 6BDBB29C: GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 6BDBB2AF
                                    • Part of subcall function 6BDBB29C: GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 6BDBB2BF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: Advapi32.dll$RegDeleteKeyExW
                                  • API String ID: 1646373207-2191092095
                                  • Opcode ID: 8cbd86369756c5fe8dadc96b4b554717cd37ef5f30e28759bcaaba54b5b8af22
                                  • Instruction ID: 11c716aa570e90d3591eacda9ed900a594b5bdae9260105e79aee05053945cf2
                                  • Opcode Fuzzy Hash: 8cbd86369756c5fe8dadc96b4b554717cd37ef5f30e28759bcaaba54b5b8af22
                                  • Instruction Fuzzy Hash: 9A11C43A514118FFDF018F19D804B5EBFA9FB1AB30F004175E802A7660DB7AE814DB91
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDC9CD6
                                  • GetClassNameW.USER32(?,00000000,00000400), ref: 6BDC9D07
                                  • GetWindowLongW.USER32(?,000000F0), ref: 6BDC9D40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ClassH_prolog3LongNameWindow
                                  • String ID: ComboBox$ComboBoxEx32
                                  • API String ID: 297531199-1907415764
                                  • Opcode ID: 4947553208e929e73c205bb601bdea8d38400debc98f47a70b602f0de6dadbc0
                                  • Instruction ID: f4ca8ed00d14355e206fadcc7b6cf1d692d8baa4fc8d9406c1fece291ca59c48
                                  • Opcode Fuzzy Hash: 4947553208e929e73c205bb601bdea8d38400debc98f47a70b602f0de6dadbc0
                                  • Instruction Fuzzy Hash: F101AD76810112ABDB00EB70DC51BAEB738BF2137DF200918E5256A0E1DF3CA609DB65
                                  APIs
                                  • _callnewh.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00431D85
                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00431D92
                                  • _CxxThrowException.VCRUNTIME140(?,004327B4), ref: 00431E99
                                  • _CxxThrowException.VCRUNTIME140(?,00432808), ref: 00431EB6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1782592592.0000000000431000.00000020.00000001.01000000.00000005.sdmp, Offset: 00430000, based on PE: true
                                  • Associated: 00000003.00000002.1782575451.0000000000430000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782606665.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782621103.0000000000433000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000434000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_430000_Update.jbxd
                                  Similarity
                                  • API ID: ExceptionThrow$_callnewhmalloc
                                  • String ID: Unknown exception
                                  • API String ID: 4113974480-410509341
                                  • Opcode ID: 844ea4d9722d8bed6509da455de23dfd33cc470203a8822c69b4dc59724df96a
                                  • Instruction ID: d9419fd9beb0526fd381600d8d1d692a403795cefdbeaa0261f3363dd5d439f2
                                  • Opcode Fuzzy Hash: 844ea4d9722d8bed6509da455de23dfd33cc470203a8822c69b4dc59724df96a
                                  • Instruction Fuzzy Hash: 8CF0F43450020C72CB04BAAAED0696E736C5A0D314F60A53BF914921B1EB7DFA15C1CD
                                  APIs
                                  • FindResourceW.KERNEL32(00000000,?,PNG,?,?,?,6BF27E5C,?,6BE24353,?,?,?,00000038,6BE21A3E), ref: 6BE2603F
                                  • LoadResource.KERNEL32(00000000,00000000,?,6BF27E5C,?,6BE24353,?,?,?,00000038,6BE21A3E), ref: 6BE2604D
                                  • LockResource.KERNEL32(00000000,?,6BF27E5C,?,6BE24353,?,?,?,00000038,6BE21A3E), ref: 6BE26058
                                  • SizeofResource.KERNEL32(00000000,00000000,?,6BF27E5C,?,6BE24353,?,?,?,00000038,6BE21A3E), ref: 6BE26066
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Resource$FindLoadLockSizeof
                                  • String ID: PNG
                                  • API String ID: 3473537107-364855578
                                  • Opcode ID: 5106922925a8ea5ef38f95a1b7f95a4b232bc23acd3b7629d2ee178a8a0dcbca
                                  • Instruction ID: d0debe4b8b904b49308428a6371a151ef388cfa446762172a8038e51f0fb4b9b
                                  • Opcode Fuzzy Hash: 5106922925a8ea5ef38f95a1b7f95a4b232bc23acd3b7629d2ee178a8a0dcbca
                                  • Instruction Fuzzy Hash: E9F04633500614BF4B225BB48C08DAF3B7CDE927653104265F903A7310CB38CD0493B4
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,5FCB9D08,6BEF5D32,?,00000000,6BF0BAD0,000000FF,?,6BEEF4BC,00000002,?,6BEEF558,6BEF4194), ref: 6BEEF430
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6BEEF442
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,6BF0BAD0,000000FF,?,6BEEF4BC,00000002,?,6BEEF558,6BEF4194), ref: 6BEEF464
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: b67c9e81d311879bc627944c5acdad5619358d5559d596e5f6435eeabfc346be
                                  • Instruction ID: da91856464f416aa31365aa7c90e11658f05262e92d241128fcdc735646c9239
                                  • Opcode Fuzzy Hash: b67c9e81d311879bc627944c5acdad5619358d5559d596e5f6435eeabfc346be
                                  • Instruction Fuzzy Hash: CF016233920629AFDB119F54DC44BAEBBB8FB05715F004565F822A26A0DB79D904CAA0
                                  APIs
                                  • DecodePointer.KERNEL32(00000000), ref: 6BDC62FC
                                    • Part of subcall function 6BDAA504: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 6BDAA52A
                                    • Part of subcall function 6BDAA504: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6BDAA53A
                                    • Part of subcall function 6BDAA504: EncodePointer.KERNEL32(00000000), ref: 6BDAA543
                                  • GetProcAddress.KERNEL32(00000000,DwmDefWindowProc), ref: 6BDC62E5
                                  • EncodePointer.KERNEL32(00000000), ref: 6BDC62EE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressEncodeProc$DecodeHandleModule
                                  • String ID: DwmDefWindowProc$dwmapi.dll
                                  • API String ID: 1102202064-234806475
                                  • Opcode ID: 36b198a5a8307d71799f88a618584090e0e2361f0d05a0c9c0d07966ce300aeb
                                  • Instruction ID: ca45261015f7a704e9a92c1b269305c0535a7336bf5bef827e31bb26bc287de5
                                  • Opcode Fuzzy Hash: 36b198a5a8307d71799f88a618584090e0e2361f0d05a0c9c0d07966ce300aeb
                                  • Instruction Fuzzy Hash: 72F06D33920626EB8F025FA4EC0496F3F6CEB0A7B03040460FD059B620DB39C910DBA1
                                  APIs
                                  • DecodePointer.KERNEL32(00000000), ref: 6BDC63C0
                                    • Part of subcall function 6BDAA504: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 6BDAA52A
                                    • Part of subcall function 6BDAA504: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6BDAA53A
                                    • Part of subcall function 6BDAA504: EncodePointer.KERNEL32(00000000), ref: 6BDAA543
                                  • GetProcAddress.KERNEL32(00000000,DwmSetWindowAttribute), ref: 6BDC63A9
                                  • EncodePointer.KERNEL32(00000000), ref: 6BDC63B2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressEncodeProc$DecodeHandleModule
                                  • String ID: DwmSetWindowAttribute$dwmapi.dll
                                  • API String ID: 1102202064-3105884578
                                  • Opcode ID: 2dcf7f855fd827bb223aaa0b0b87821c28545fdd9621dad55167b1c4af585989
                                  • Instruction ID: 2878969f968d8715fd5a32cb434b64f8979b63b57a80ea416b8c21ce3e69a72b
                                  • Opcode Fuzzy Hash: 2dcf7f855fd827bb223aaa0b0b87821c28545fdd9621dad55167b1c4af585989
                                  • Instruction Fuzzy Hash: 9FF03036551A26BB8F111B69EC4896F3F6CAB0A7753040065FC099B620D739C814DAB1
                                  APIs
                                  • DecodePointer.KERNEL32(00000000), ref: 6BDC64E3
                                    • Part of subcall function 6BDAA504: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 6BDAA52A
                                    • Part of subcall function 6BDAA504: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6BDAA53A
                                    • Part of subcall function 6BDAA504: EncodePointer.KERNEL32(00000000), ref: 6BDAA543
                                  • GetProcAddress.KERNEL32(00000000,DwmSetIconicLivePreviewBitmap), ref: 6BDC64CC
                                  • EncodePointer.KERNEL32(00000000), ref: 6BDC64D5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressEncodeProc$DecodeHandleModule
                                  • String ID: DwmSetIconicLivePreviewBitmap$dwmapi.dll
                                  • API String ID: 1102202064-1757063745
                                  • Opcode ID: 576d3e193d20a7c7b2f395390ac1b5081f9d07b283ba59681e40323bad25d96f
                                  • Instruction ID: b312bc836965b52d9c30e05181e876e974a6a28bb51451e06e82905ba3b1d089
                                  • Opcode Fuzzy Hash: 576d3e193d20a7c7b2f395390ac1b5081f9d07b283ba59681e40323bad25d96f
                                  • Instruction Fuzzy Hash: A6F05E77525226AB8F115FA8EC08A6F7F6DAB06B707004465FC05EB624EB39CD109BA1
                                  APIs
                                  • DecodePointer.KERNEL32(00000000), ref: 6BDC6425
                                    • Part of subcall function 6BDAA504: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 6BDAA52A
                                    • Part of subcall function 6BDAA504: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6BDAA53A
                                    • Part of subcall function 6BDAA504: EncodePointer.KERNEL32(00000000), ref: 6BDAA543
                                  • GetProcAddress.KERNEL32(00000000,DwmSetIconicThumbnail), ref: 6BDC640E
                                  • EncodePointer.KERNEL32(00000000), ref: 6BDC6417
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressEncodeProc$DecodeHandleModule
                                  • String ID: DwmSetIconicThumbnail$dwmapi.dll
                                  • API String ID: 1102202064-2331651847
                                  • Opcode ID: 5f0dfc2a837c52143030f998236b0a2ece2b811d8a405932652c7f9cdc3011f3
                                  • Instruction ID: ac6c07c201f6716a5e8a7df133702c7f97ca3efc46bcb46aeedb5fc6780f718f
                                  • Opcode Fuzzy Hash: 5f0dfc2a837c52143030f998236b0a2ece2b811d8a405932652c7f9cdc3011f3
                                  • Instruction Fuzzy Hash: 5BF08977919627AB8F111F68DC4896F3F6CEF067B03004061FC05DB220D739C8118AA1
                                  APIs
                                  • DecodePointer.KERNEL32(00000000,?,?,6BDBECCE,6BF7825C,0000002C), ref: 6BDC6361
                                    • Part of subcall function 6BDAA504: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 6BDAA52A
                                    • Part of subcall function 6BDAA504: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6BDAA53A
                                    • Part of subcall function 6BDAA504: EncodePointer.KERNEL32(00000000), ref: 6BDAA543
                                  • GetProcAddress.KERNEL32(00000000,DwmIsCompositionEnabled), ref: 6BDC634A
                                  • EncodePointer.KERNEL32(00000000,?,?,6BDBECCE,6BF7825C,0000002C), ref: 6BDC6353
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressEncodeProc$DecodeHandleModule
                                  • String ID: DwmIsCompositionEnabled$dwmapi.dll
                                  • API String ID: 1102202064-1198327662
                                  • Opcode ID: 2b357ffc0e39ebd4552df2196be0483939bc870bf8957fd73ad9efbb5fc0e2a3
                                  • Instruction ID: 800c4aedcf93671889d61de8e273e328af504a0fdb5c1c3d7440609613c78530
                                  • Opcode Fuzzy Hash: 2b357ffc0e39ebd4552df2196be0483939bc870bf8957fd73ad9efbb5fc0e2a3
                                  • Instruction Fuzzy Hash: FAF08936521A259FCF015BB8D804B6F3B6CBB067717050061FD05DB610EB39C800CBE1
                                  APIs
                                  • DecodePointer.KERNEL32(00000000), ref: 6BDC6487
                                    • Part of subcall function 6BDAA504: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 6BDAA52A
                                    • Part of subcall function 6BDAA504: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6BDAA53A
                                    • Part of subcall function 6BDAA504: EncodePointer.KERNEL32(00000000), ref: 6BDAA543
                                  • GetProcAddress.KERNEL32(00000000,DwmInvalidateIconicBitmaps), ref: 6BDC6470
                                  • EncodePointer.KERNEL32(00000000), ref: 6BDC6479
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Pointer$AddressEncodeProc$DecodeHandleModule
                                  • String ID: DwmInvalidateIconicBitmaps$dwmapi.dll
                                  • API String ID: 1102202064-1901905683
                                  • Opcode ID: 230ebaf4a8c2b1aea4bd247d4969dcd24227afba2869793fddcf356411c0395a
                                  • Instruction ID: 2748ac07a68d76f83478d93b7d99968b13ce4e38e385cc047aa54bfb28ae0adc
                                  • Opcode Fuzzy Hash: 230ebaf4a8c2b1aea4bd247d4969dcd24227afba2869793fddcf356411c0395a
                                  • Instruction Fuzzy Hash: CDF0A73692D627AB8F111F69D808A2F3A5C9B4ABB13008161FC05DB620DB3CCC008EA1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Empty$Client
                                  • String ID:
                                  • API String ID: 1457177775-0
                                  • Opcode ID: 37e27f0a86a58cdf5ad5eda8283893df24f7a449c1b65fc8449e400ab5c5b250
                                  • Instruction ID: 2eb795b9f849bc6b0540724abc35366de9d639f079324c7774700e8e572cd7bb
                                  • Opcode Fuzzy Hash: 37e27f0a86a58cdf5ad5eda8283893df24f7a449c1b65fc8449e400ab5c5b250
                                  • Instruction Fuzzy Hash: FFD10531D00A19CFCB05CFA8C58069EBBF2FF49324F1541A9E955BF240DB75AA46CBA0
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDDA8FE
                                  • IsWindow.USER32(00000000), ref: 6BDDA912
                                  • GetClientRect.USER32(00000000,00000000), ref: 6BDDA967
                                  • GetCursorPos.USER32(?), ref: 6BDDAB30
                                  • ScreenToClient.USER32(00000000,?), ref: 6BDDAB3D
                                    • Part of subcall function 6BDD5491: __EH_prolog3_GS.LIBCMT ref: 6BDD549B
                                    • Part of subcall function 6BDD5491: GetClientRect.USER32(00000000,00000000), ref: 6BDD54F5
                                    • Part of subcall function 6BDD32CB: __EH_prolog3_GS.LIBCMT ref: 6BDD32D5
                                    • Part of subcall function 6BDD32CB: SendMessageW.USER32(00000000,0000040D,00000000,00000000), ref: 6BDD3300
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ClientH_prolog3_$Rect$CursorMessageScreenSendWindow
                                  • String ID:
                                  • API String ID: 3214297127-0
                                  • Opcode ID: cb8d8de2ba61b8cdde89be6a1811f7351c1865ee8cc6b5ffb494a10dec03c8b0
                                  • Instruction ID: 06e66cdf17977c4071a055bdbd71227d407c87e4da4691c455a8f37e93281f3b
                                  • Opcode Fuzzy Hash: cb8d8de2ba61b8cdde89be6a1811f7351c1865ee8cc6b5ffb494a10dec03c8b0
                                  • Instruction Fuzzy Hash: 9A915971D00618DFCF04CFA4C880ADDBBB5BF49324F1541AAE946AF255DB38AA45CF60
                                  APIs
                                  • __EH_prolog3_catch.LIBCMT ref: 6BDB10F8
                                  • GlobalLock.KERNEL32(00000000), ref: 6BDB11FA
                                  • DestroyWindow.USER32(00000000,?,00000000,00000000,6BDB1CBF,00000000), ref: 6BDB12E3
                                  • GlobalUnlock.KERNEL32(00000000), ref: 6BDB12F0
                                  • GlobalFree.KERNEL32(00000000), ref: 6BDB12F7
                                    • Part of subcall function 6BDCC854: GetStockObject.GDI32(00000011), ref: 6BDCC876
                                    • Part of subcall function 6BDCC854: GetStockObject.GDI32(0000000D), ref: 6BDCC882
                                    • Part of subcall function 6BDCC854: GetObjectW.GDI32(00000000,0000005C,?), ref: 6BDCC893
                                    • Part of subcall function 6BDCC854: GetDC.USER32(00000000), ref: 6BDCC8A2
                                    • Part of subcall function 6BDCC854: GetDeviceCaps.GDI32(00000000,0000005A), ref: 6BDCC8B9
                                    • Part of subcall function 6BDCC854: MulDiv.KERNEL32(?,00000048,00000000), ref: 6BDCC8C5
                                    • Part of subcall function 6BDCC854: ReleaseDC.USER32(00000000,00000000), ref: 6BDCC8D1
                                    • Part of subcall function 6BDCC966: GlobalFree.KERNEL32(?), ref: 6BDCC96D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Global$Object$FreeStock$CapsDestroyDeviceH_prolog3_catchLockReleaseUnlockWindow
                                  • String ID:
                                  • API String ID: 15253214-0
                                  • Opcode ID: 854056d26498ff4bdb99fb63bd061924e63c7a02bf64e0aefe062b0ededb1ac0
                                  • Instruction ID: 4df77c9140e534f408c3cc27c55996c7eb8f93dcc0def63e6e2bdb04c9d325c9
                                  • Opcode Fuzzy Hash: 854056d26498ff4bdb99fb63bd061924e63c7a02bf64e0aefe062b0ededb1ac0
                                  • Instruction Fuzzy Hash: F2516071E10219DFCF01DFB4C985AAEB7B4BF09724F104499E912BB290DB389E05DBA5
                                  APIs
                                  • GetClientRect.USER32(?,?), ref: 6BDDD8EF
                                    • Part of subcall function 6BDA3B11: ClientToScreen.USER32(?,6BDDD900), ref: 6BDA3B20
                                    • Part of subcall function 6BDA3B11: ClientToScreen.USER32(?,6BDDD908), ref: 6BDA3B2D
                                  • PtInRect.USER32(?,00000000,?), ref: 6BDDD909
                                  • PtInRect.USER32(?,?,?), ref: 6BDDD982
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ClientRect$Screen
                                  • String ID:
                                  • API String ID: 3187875807-0
                                  • Opcode ID: ec1f003c753ca54acf5844be0ea29c8a151983d62e324575deaa7f35dbdaa4ed
                                  • Instruction ID: f2b01b0efd8f91101a448a2d709e23c519eb51f27ef5007d3f12afbb7e69e00e
                                  • Opcode Fuzzy Hash: ec1f003c753ca54acf5844be0ea29c8a151983d62e324575deaa7f35dbdaa4ed
                                  • Instruction Fuzzy Hash: C2414C72A4010AEFCF00CFB8CA84A9EB7B5EF0A754F100569E985FB154D636EA45DF60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDC0E66
                                    • Part of subcall function 6BDA3A38: __EH_prolog3.LIBCMT ref: 6BDA3A3F
                                    • Part of subcall function 6BDA3A38: GetWindowDC.USER32(00000000,00000004,6BDBDFDA,00000000), ref: 6BDA3A6B
                                    • Part of subcall function 6BDA322D: SetMapMode.GDI32(?,?), ref: 6BDA3241
                                    • Part of subcall function 6BDA322D: SetMapMode.GDI32(?,?), ref: 6BDA3253
                                  • LPtoDP.GDI32(?,?,00000001), ref: 6BDC0ECA
                                  • LPtoDP.GDI32(?,?,00000001), ref: 6BDC0EE9
                                  • LPtoDP.GDI32(?,?,00000001), ref: 6BDC0F08
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 6BDC0FCC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: H_prolog3Mode$InvalidateRectWindow
                                  • String ID:
                                  • API String ID: 1124340077-0
                                  • Opcode ID: e7598d8c9217754ec6e27dea67964a71f7eabe34819adad2d18bd5dde343af41
                                  • Instruction ID: e82a8209f7a0c7b26b791353a0b5c08fdad260c91c57bfa19e8badaeb0ad3b1c
                                  • Opcode Fuzzy Hash: e7598d8c9217754ec6e27dea67964a71f7eabe34819adad2d18bd5dde343af41
                                  • Instruction Fuzzy Hash: 1941F3B5A01705DFDB24CF78C481B9AB7F5BF4A360F00885EE5AADB290D774A940CB61
                                  APIs
                                  • LoadCursorW.USER32(?,00007904), ref: 6BDD72C3
                                  • LoadCursorW.USER32(?,00007905), ref: 6BDD72F6
                                  • LoadCursorW.USER32(00000000,00007F86), ref: 6BDD7321
                                  • CreatePen.GDI32(00000000,00000001,?), ref: 6BDD7399
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CursorLoad$Create
                                  • String ID:
                                  • API String ID: 1516763891-0
                                  • Opcode ID: 0c19c3c633b90136862e8c8d2cb692b88a0b555523c2d35be097b2ccacd52514
                                  • Instruction ID: 830f4c8944cb956a8ea59770826eaa2c137c3eea4e4acc9b21a64bb1d8c82c8b
                                  • Opcode Fuzzy Hash: 0c19c3c633b90136862e8c8d2cb692b88a0b555523c2d35be097b2ccacd52514
                                  • Instruction Fuzzy Hash: 1631D5B1680601ABDB11AB74CC8AF6D37A8AF45778F1401F6E956AF191EF3C8500D735
                                  APIs
                                    • Part of subcall function 6BDBB682: GetWindowLongW.USER32(458BF84D,000000F0), ref: 6BDBB68F
                                  • GetWindowRect.USER32(?,?), ref: 6BDE5B16
                                  • GetSystemMetrics.USER32(00000021), ref: 6BDE5B1E
                                  • GetSystemMetrics.USER32(00000020), ref: 6BDE5B28
                                  • GetKeyState.USER32(00000002), ref: 6BDE5B4C
                                  • InflateRect.USER32(?,?,00000000), ref: 6BDE5B85
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MetricsRectSystemWindow$InflateLongState
                                  • String ID:
                                  • API String ID: 2406722796-0
                                  • Opcode ID: 17d2c3fe48f7970cad15db17c4c376c1fbaf4aa6d0f03bacb6620ae915d6ccb3
                                  • Instruction ID: 2b4a1782f8cfb9b8ad3946680cb9b44ab2ed0e5ab76399b66d7006ea6f9e414f
                                  • Opcode Fuzzy Hash: 17d2c3fe48f7970cad15db17c4c376c1fbaf4aa6d0f03bacb6620ae915d6ccb3
                                  • Instruction Fuzzy Hash: 5F31E732E00209DBDF109F78C899BBE7764FB45768F104555E652DF190D778C981CBA0
                                  APIs
                                  • GetCursorPos.USER32(00000000), ref: 6BDA691C
                                  • GetKeyState.USER32(00000011), ref: 6BDA6924
                                  • ScreenToClient.USER32(?,00000000), ref: 6BDA69BC
                                  • ClientToScreen.USER32(?,00000000), ref: 6BDA6A09
                                  • SetCursorPos.USER32(00000000,00000000), ref: 6BDA6A15
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ClientCursorScreen$State
                                  • String ID:
                                  • API String ID: 3982492586-0
                                  • Opcode ID: 7d1cf7e631c33b3dd4e6183e99d6b2674e266efc5f3889b1d9743b287b42d185
                                  • Instruction ID: bca1176e8163a5ab36efaa2e392beeb79824474542a50c9ee752fe856c10a547
                                  • Opcode Fuzzy Hash: 7d1cf7e631c33b3dd4e6183e99d6b2674e266efc5f3889b1d9743b287b42d185
                                  • Instruction Fuzzy Hash: 8831C172A40505EBCB09CFBCC894BADBBB5FB46720F10426AE452EA1A0D738DA40DB50
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ClientCursorScreen$Rect
                                  • String ID:
                                  • API String ID: 1082406499-0
                                  • Opcode ID: edc643f66d8a8a0af5d6d06badd0d287d34c7fe8e6d264cdbaa184d54a6ca64b
                                  • Instruction ID: aefe00343baad765cfb676301979d9d1f477aaeebdb9933726996e0c2d4b8e83
                                  • Opcode Fuzzy Hash: edc643f66d8a8a0af5d6d06badd0d287d34c7fe8e6d264cdbaa184d54a6ca64b
                                  • Instruction Fuzzy Hash: 6231A231F1020ADFCF09DFB4D884AAEB7B9FF49314F10016AD452A7250DB39A945DBA0
                                  APIs
                                    • Part of subcall function 6BDA1CA1: GetParent.USER32(?), ref: 6BDA1CA4
                                    • Part of subcall function 6BDA1CA1: GetParent.USER32(00000000), ref: 6BDA1CAB
                                  • GetWindowLongW.USER32(?,000000EC), ref: 6BDA228F
                                  • RedrawWindow.USER32(?,00000000,00000000,00000081), ref: 6BDA22E3
                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 6BDA22F2
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000137), ref: 6BDA2308
                                  • GetClientRect.USER32(?,?), ref: 6BDA231C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$LongParent$ClientRectRedraw
                                  • String ID:
                                  • API String ID: 556606033-0
                                  • Opcode ID: b6715ec823b36389c619a3d3506f4ed986959d2677d69d9aad63a48bba6dcdda
                                  • Instruction ID: 1d8bd6d813fc813df0b1c4553535ae94650d93573d4e18a5670455b29ad32d51
                                  • Opcode Fuzzy Hash: b6715ec823b36389c619a3d3506f4ed986959d2677d69d9aad63a48bba6dcdda
                                  • Instruction Fuzzy Hash: 89210832710615EBEF025BB7CC94BAEB678FF1A378F000179E852DA1A0DB68DD109790
                                  APIs
                                    • Part of subcall function 6BDBB682: GetWindowLongW.USER32(458BF84D,000000F0), ref: 6BDBB68F
                                    • Part of subcall function 6BDA1CA1: GetParent.USER32(?), ref: 6BDA1CA4
                                    • Part of subcall function 6BDA1CA1: GetParent.USER32(00000000), ref: 6BDA1CAB
                                  • SendMessageW.USER32(?,00000234,00000000,00000000), ref: 6BDA1FA1
                                  • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 6BDA1FCA
                                  • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 6BDA1FE9
                                  • SendMessageW.USER32(?,00000222,?,00000000), ref: 6BDA2003
                                  • SendMessageW.USER32(?,00000222,00000000,?), ref: 6BDA202C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessageSend$Parent$LongWindow
                                  • String ID:
                                  • API String ID: 4191550487-0
                                  • Opcode ID: 87b8ed5daf63952ffb49ca317b3f9b8fe8a34f644c1a5cbef6cae5920be16417
                                  • Instruction ID: a50025065a17f0cbe961c5deeab39431221023b62dbd76e2daaad285f81fa47e
                                  • Opcode Fuzzy Hash: 87b8ed5daf63952ffb49ca317b3f9b8fe8a34f644c1a5cbef6cae5920be16417
                                  • Instruction Fuzzy Hash: 7421D672650604FFEB115B72CC89FAE76B9FB093A8F000529E1929A190CB79DE10D660
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 6BDDC962
                                  • GetClientRect.USER32(?,?), ref: 6BDDC98E
                                  • PtInRect.USER32(?,?,?), ref: 6BDDC9A6
                                  • MapWindowPoints.USER32(?,?,?,00000001), ref: 6BDDC9CF
                                  • SendMessageW.USER32(?,00000200,?,?), ref: 6BDDC9EE
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$ClientCursorMessagePointsSendWindow
                                  • String ID:
                                  • API String ID: 1257894355-0
                                  • Opcode ID: 20e71569a5a2d7f54c443e6c5191eb2fce1778c9fb37a985f8e67373e1920bf5
                                  • Instruction ID: 86f9e009663035eadad99fc12f7bfc80aed726ad772864d22559a8ea410347a4
                                  • Opcode Fuzzy Hash: 20e71569a5a2d7f54c443e6c5191eb2fce1778c9fb37a985f8e67373e1920bf5
                                  • Instruction Fuzzy Hash: EC31937190020AEFCF10CFA4C844ABEBBB5FF05364F10422AF96696160E735E950DB64
                                  APIs
                                  • GetWindowRect.USER32(?,?), ref: 6BDDE27C
                                    • Part of subcall function 6BDBB6AC: GetWindowLongW.USER32(?,000000EC), ref: 6BDBB6B9
                                  • OffsetRect.USER32(?,?,00000000), ref: 6BDDE2D8
                                  • UnionRect.USER32(?,?,?), ref: 6BDDE2F1
                                  • EqualRect.USER32(?,?), ref: 6BDDE2FF
                                  • UpdateWindow.USER32(?), ref: 6BDDE336
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Window$EqualLongOffsetUnionUpdate
                                  • String ID:
                                  • API String ID: 4261707372-0
                                  • Opcode ID: 7bc2564a3e440ef568bae6b81154084b5446b1adedb0e94a0e14f957fddca8ae
                                  • Instruction ID: 1ae953a8045d042abe40a4c73e4feaf5e1b7bec0d0a4e065cf7088f80852816f
                                  • Opcode Fuzzy Hash: 7bc2564a3e440ef568bae6b81154084b5446b1adedb0e94a0e14f957fddca8ae
                                  • Instruction Fuzzy Hash: 7B318072A10609EBCF04DF74C944BEEF7B9FF19314F104266E455E6260DB74AA94CBA0
                                  APIs
                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 6BE51B99
                                    • Part of subcall function 6BDBBA97: EnableWindow.USER32(?,?), ref: 6BDBBAA8
                                  • SendMessageW.USER32(?,00000146,00000000,00000000), ref: 6BE51BD6
                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 6BE51BED
                                  • SendMessageW.USER32(?,00000146,00000000,00000000), ref: 6BE51C06
                                    • Part of subcall function 6BE52B5C: GetWindowRect.USER32(?,?), ref: 6BE52B89
                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 6BE51C47
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$EnableRect
                                  • String ID:
                                  • API String ID: 3648841934-0
                                  • Opcode ID: a4813d567a000db060aec372d070404f5d6b336580a8abb89695ee0e33572749
                                  • Instruction ID: 8006613ed6063c614c3625d2f118ee3f763b571d6fada963a8b2102dc4d5e472
                                  • Opcode Fuzzy Hash: a4813d567a000db060aec372d070404f5d6b336580a8abb89695ee0e33572749
                                  • Instruction Fuzzy Hash: B9219772210A44AFD7209F76CC84EAB77E9FB81759F10042EF59AD6150DA36A861CB21
                                  APIs
                                    • Part of subcall function 6BDD630C: __EH_prolog3_GS.LIBCMT ref: 6BDD6313
                                    • Part of subcall function 6BDD630C: GetWindowRect.USER32(00000000,00000000), ref: 6BDD635C
                                    • Part of subcall function 6BDD630C: CreateRoundRectRgn.GDI32(00000000,00000000,00000001,?,00000004,00000004), ref: 6BDD6386
                                    • Part of subcall function 6BDD630C: SetWindowRgn.USER32(00000000,?,00000000), ref: 6BDD639C
                                  • GetSystemMenu.USER32(?,00000000), ref: 6BDD8956
                                  • DeleteMenu.USER32(?,0000F120,00000000,00000000), ref: 6BDD8973
                                  • DeleteMenu.USER32(?,0000F020,00000000), ref: 6BDD8982
                                  • DeleteMenu.USER32(?,0000F030,00000000), ref: 6BDD8991
                                  • EnableMenuItem.USER32(?,0000F060,00000001), ref: 6BDD89B9
                                    • Part of subcall function 6BDD70F0: SetRectEmpty.USER32(?), ref: 6BDD711B
                                    • Part of subcall function 6BDD70F0: ReleaseCapture.USER32 ref: 6BDD7121
                                    • Part of subcall function 6BDD70F0: SetCapture.USER32(?,?,?,?,6BDCF092,?), ref: 6BDD7134
                                    • Part of subcall function 6BDD70F0: RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 6BDD7234
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Menu$DeleteRectWindow$Capture$CreateEmptyEnableH_prolog3_ItemRedrawReleaseRoundSystem
                                  • String ID:
                                  • API String ID: 4022425685-0
                                  • Opcode ID: e37471c394b60cc831d124fa12f91d7bbf36a99762add9dcfea3968a5efc056e
                                  • Instruction ID: ffa45b6204e72413429b6b2df6821b3181ee453a997dc6bc0d6b03c2bbcb8387
                                  • Opcode Fuzzy Hash: e37471c394b60cc831d124fa12f91d7bbf36a99762add9dcfea3968a5efc056e
                                  • Instruction Fuzzy Hash: 1821E235210215EBDF121F608C99F6D7F29FF49360B0400B5F9464B261CB39D910DFA1
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDAB72E
                                  • GetTopWindow.USER32(?), ref: 6BDAB75B
                                  • GetDlgCtrlID.USER32(00000000), ref: 6BDAB76D
                                  • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 6BDAB7C8
                                  • GetWindow.USER32(00000000,00000002), ref: 6BDAB80A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$CtrlH_prolog3MessageSend
                                  • String ID:
                                  • API String ID: 849854284-0
                                  • Opcode ID: c2b4558e927288d1a8be13e9d91149ddbf97fe40c850f28f8738b963a52ff239
                                  • Instruction ID: f6d44e4f6f5f61330fa5f30a287f66a385d2e3d018ae3bf23a08032297958e99
                                  • Opcode Fuzzy Hash: c2b4558e927288d1a8be13e9d91149ddbf97fe40c850f28f8738b963a52ff239
                                  • Instruction Fuzzy Hash: A321D1B6812218AADB158B31CD46FADBB76EF45324F100199E816AA191DF389B02DB61
                                  APIs
                                  • IsWindow.USER32(00000000), ref: 6BDA8AA5
                                  • SendMessageW.USER32(?,00000455,00000000,00000000), ref: 6BDA8AB9
                                  • SendMessageW.USER32(?,00000454,00000000,00000000), ref: 6BDA8ACC
                                  • SetWindowLongW.USER32(?,000000F0,?), ref: 6BDA8B03
                                  • SendMessageW.USER32(?,00000454,00000000,00000000), ref: 6BDA8B18
                                    • Part of subcall function 6BDBB682: GetWindowLongW.USER32(458BF84D,000000F0), ref: 6BDBB68F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessageSendWindow$Long
                                  • String ID:
                                  • API String ID: 3430364388-0
                                  • Opcode ID: 4b3fe77b407b6b2262feadf95521dcc2fb92fd38eb359e389e73417ccf8d8404
                                  • Instruction ID: 99086cbe78a53a80a0e94549b8567621e6fd840f8dea8c7ff22768d87c85bfed
                                  • Opcode Fuzzy Hash: 4b3fe77b407b6b2262feadf95521dcc2fb92fd38eb359e389e73417ccf8d8404
                                  • Instruction Fuzzy Hash: 3321A472211A54EFEB008F69CC84F2BBBB9FB45725F10426DF546AA2A0DB75DD04CB24
                                  APIs
                                  • GetCurrentThreadId.KERNEL32 ref: 6BDCF031
                                  • SetWindowsHookExW.USER32(00000007,6BDD5F94,00000000,00000000), ref: 6BDCF041
                                  • UnhookWindowsHookEx.USER32(00000000), ref: 6BDCF059
                                  • UpdateWindow.USER32(?), ref: 6BDCF0D1
                                  • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 6BDCF0ED
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: HookWindows$CurrentMessageSendThreadUnhookUpdateWindow
                                  • String ID:
                                  • API String ID: 1891640330-0
                                  • Opcode ID: bac2c7ea766ea649d3d3b9a30e1fea5b2a0dbd0f1623265e6f50cd5303bbfa42
                                  • Instruction ID: cff22fff7f8d799744c97a7ca95895bd1c67a5fd607865cc0fc6241de7aeeab9
                                  • Opcode Fuzzy Hash: bac2c7ea766ea649d3d3b9a30e1fea5b2a0dbd0f1623265e6f50cd5303bbfa42
                                  • Instruction Fuzzy Hash: 40213D31710611EFDB145B35D809B6A77A8FF45B35F100178E9299F1B0DB38D909DB91
                                  APIs
                                    • Part of subcall function 6BDBB682: GetWindowLongW.USER32(458BF84D,000000F0), ref: 6BDBB68F
                                  • SendMessageW.USER32(?,00000086,00000001,00000000), ref: 6BDB3A5B
                                  • SendMessageW.USER32(?,00000086,00000000,00000000), ref: 6BDB3A74
                                  • GetDesktopWindow.USER32 ref: 6BDB3A7C
                                  • SendMessageW.USER32(00000000,0000036D,0000000C,00000000), ref: 6BDB3A9C
                                  • GetWindow.USER32(00000000), ref: 6BDB3AA5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessageSendWindow$DesktopLong
                                  • String ID:
                                  • API String ID: 2272707703-0
                                  • Opcode ID: 9dc9f4e80cc37178b836248c036b8a155cf7ad62fe50d79f0a0811b80a14d28a
                                  • Instruction ID: 7d27a666c564be35801d27746eea289f758220f6f2ca3935b5ce38f6ab936ad5
                                  • Opcode Fuzzy Hash: 9dc9f4e80cc37178b836248c036b8a155cf7ad62fe50d79f0a0811b80a14d28a
                                  • Instruction Fuzzy Hash: 4311D3B3210A05BBEB224735CC59B6E7A69FB427B4F100118F9934D5A0DB79CD10A7A8
                                  APIs
                                    • Part of subcall function 6BDC2F60: EnterCriticalSection.KERNEL32(6BF78410,?,?,0000007C,?,6BDAF318,00000001), ref: 6BDC2F91
                                    • Part of subcall function 6BDC2F60: InitializeCriticalSection.KERNEL32(00000000,?,6BDAF318,00000001), ref: 6BDC2FA7
                                    • Part of subcall function 6BDC2F60: LeaveCriticalSection.KERNEL32(6BF78410,?,6BDAF318,00000001), ref: 6BDC2FB5
                                    • Part of subcall function 6BDC2F60: EnterCriticalSection.KERNEL32(00000000,?,0000007C,?,6BDAF318,00000001), ref: 6BDC2FC2
                                  • SetCursor.USER32(00000009), ref: 6BDA5EB8
                                  • LoadCursorW.USER32(?,00007905), ref: 6BDA5EFD
                                  • LoadCursorW.USER32(00000000,00007F85), ref: 6BDA5F13
                                  • SetCursor.USER32(?,?,00000009), ref: 6BDA5F2C
                                  • DestroyCursor.USER32(00000000), ref: 6BDA5F37
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Cursor$CriticalSection$EnterLoad$DestroyInitializeLeave
                                  • String ID:
                                  • API String ID: 900973665-0
                                  • Opcode ID: 198b20ff8abcbf05d21bcdbd5f781bca24942eb1072055ef5980276de97d5654
                                  • Instruction ID: 3a99e508be40fa7837a07f1eb4ea6815a59463d4f1c43b23b54dbd75631e1a93
                                  • Opcode Fuzzy Hash: 198b20ff8abcbf05d21bcdbd5f781bca24942eb1072055ef5980276de97d5654
                                  • Instruction Fuzzy Hash: 99119072929215ABDF109BA4D488B4A7728F702738B1104B2FB29DF161CB7CD544D7A1
                                  APIs
                                  • IsWindow.USER32(00000000), ref: 6BDA88E0
                                  • SendMessageW.USER32(?,00000455,00000000,00000000), ref: 6BDA88F4
                                  • SendMessageW.USER32(?,00000454,00000000,00000000), ref: 6BDA8907
                                  • SetWindowLongW.USER32(?,000000F0,?), ref: 6BDA8926
                                  • SendMessageW.USER32(?,00000454,00000000,00000000), ref: 6BDA893C
                                    • Part of subcall function 6BDBB682: GetWindowLongW.USER32(458BF84D,000000F0), ref: 6BDBB68F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessageSendWindow$Long
                                  • String ID:
                                  • API String ID: 3430364388-0
                                  • Opcode ID: c5e72ab688382ae482ed8b74d6bc73763515a7a4f953d660404e53cd6168799c
                                  • Instruction ID: 4d3c1abcc7e3f96ab84c2b597d8771f80916435d01706d65b69e55814bfe2946
                                  • Opcode Fuzzy Hash: c5e72ab688382ae482ed8b74d6bc73763515a7a4f953d660404e53cd6168799c
                                  • Instruction Fuzzy Hash: 6F11D672620644FBDB104B75CC49F1BBAB9FB81724F10422DE6529A2E0DBB5DD04CB24
                                  APIs
                                  • RegDeleteKeyW.ADVAPI32(00000000,?), ref: 6BDBA547
                                  • RegDeleteValueW.ADVAPI32(00000000,?,?,00000000), ref: 6BDBA567
                                  • RegCloseKey.ADVAPI32(00000000), ref: 6BDBA598
                                    • Part of subcall function 6BDBA8ED: RegCloseKey.ADVAPI32(00000000,?,00000000), ref: 6BDBA992
                                    • Part of subcall function 6BDBA8ED: RegCloseKey.ADVAPI32(00000000,?,00000000), ref: 6BDBA9A1
                                  • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000001,?,00000000,?,00000000), ref: 6BDBA58F
                                  • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 6BDBA5B3
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Close$DeleteValue$PrivateProfileStringWrite
                                  • String ID:
                                  • API String ID: 222425065-0
                                  • Opcode ID: c456ed88f96592b63e0c0ffb85e0635efc14e3e7f9f91855dc529ca13f6a9dba
                                  • Instruction ID: 8f5ef57ee82bae60232461b5398d76f7ddab8069c0fc2a2fbdefac76e157ce5a
                                  • Opcode Fuzzy Hash: c456ed88f96592b63e0c0ffb85e0635efc14e3e7f9f91855dc529ca13f6a9dba
                                  • Instruction Fuzzy Hash: AC11A0B7815616FBCB121F648C04E9F3FA9AF8AB70B014024F917AE110DF39CA15DBA0
                                  APIs
                                  • EnableMenuItem.USER32(?,00004212,00000001), ref: 6BDDBB6A
                                  • EnableMenuItem.USER32(?,00004213,00000000), ref: 6BDDBB7B
                                  • EnableMenuItem.USER32(?,00004214,00000000), ref: 6BDDBBAA
                                  • CheckMenuItem.USER32(?,00004213,00000008), ref: 6BDDBBD0
                                  • CheckMenuItem.USER32(?,00004214,00000000), ref: 6BDDBBDC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ItemMenu$Enable$Check
                                  • String ID:
                                  • API String ID: 1852492618-0
                                  • Opcode ID: fdf3790955814aa44355e766bff5bba0044a6d30f6977cc7f615298189594a46
                                  • Instruction ID: 3c163ef9285d6cec099f50ec1418ed77fe83958e795eb0fac891cfd8c66ed306
                                  • Opcode Fuzzy Hash: fdf3790955814aa44355e766bff5bba0044a6d30f6977cc7f615298189594a46
                                  • Instruction Fuzzy Hash: C5119071254605BFEB108F35CE86F12BBACFB16768F404525F286998B0D774EC10CBA0
                                  APIs
                                  • GlobalGetAtomNameW.KERNEL32(?,?,00000103), ref: 6BDB5BC7
                                  • GlobalAddAtomW.KERNEL32(?), ref: 6BDB5BD4
                                  • GlobalGetAtomNameW.KERNEL32(?,?,00000103), ref: 6BDB5BEE
                                  • GlobalAddAtomW.KERNEL32(?), ref: 6BDB5BFB
                                  • SendMessageW.USER32(00000000,000003E4,00000000,?), ref: 6BDB5C20
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AtomGlobal$Name$MessageSend
                                  • String ID:
                                  • API String ID: 1515195355-0
                                  • Opcode ID: 8d101e4d16f343e3c376eceb7a1774428b3eefe1777bade3a17a67625234be7e
                                  • Instruction ID: 0b230016c486384dd87c4e2af0d1e5f358e8312340266dce070c426391a642cd
                                  • Opcode Fuzzy Hash: 8d101e4d16f343e3c376eceb7a1774428b3eefe1777bade3a17a67625234be7e
                                  • Instruction Fuzzy Hash: 7821D2B5600718EBDB109F74C858BFAB3F8FB05719F00855AF96B8A081DB79D984CB60
                                  APIs
                                  • LocalAlloc.KERNEL32(00000000,00000000), ref: 6BDC5101
                                  • LocalReAlloc.KERNEL32(00000000,00000000,00000002), ref: 6BDC510F
                                  • TlsSetValue.KERNEL32(?,?,00000000), ref: 6BDC5140
                                  • LeaveCriticalSection.KERNEL32(6BDA1ADF,?,00000000,?,6BDAEF7B,?,?,?,6BDAA850,00000000,?,?,?,6BDB27D3,00000004,6BDA1ADF), ref: 6BDC515E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AllocLocal$CriticalLeaveSectionValue
                                  • String ID:
                                  • API String ID: 901235349-0
                                  • Opcode ID: 9df68f3c9679702ef1a8ec006ee2774d30c43f93695b3c687035ae1b48ff326c
                                  • Instruction ID: 03dd563ade428215f9998911583755a8a55751de7d76987ee6981e1052a45f6b
                                  • Opcode Fuzzy Hash: 9df68f3c9679702ef1a8ec006ee2774d30c43f93695b3c687035ae1b48ff326c
                                  • Instruction Fuzzy Hash: 2611B231100601EFDB208F25C85AE5B7BB5FF81329B10C028E95B9F260C734EA04CF61
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDD6313
                                  • GetWindowRect.USER32(00000000,00000000), ref: 6BDD635C
                                  • CreateRoundRectRgn.GDI32(00000000,00000000,00000001,?,00000004,00000004), ref: 6BDD6386
                                  • SetWindowRgn.USER32(00000000,?,00000000), ref: 6BDD639C
                                  • SetWindowRgn.USER32(00000000,00000000,00000000), ref: 6BDD63B4
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Rect$CreateH_prolog3_Round
                                  • String ID:
                                  • API String ID: 2502471913-0
                                  • Opcode ID: 57bf22cfbc5af07b01bf501b30f0760cf362736be8b428b059ae4ae264bf94ae
                                  • Instruction ID: 4c39163039ed6f6fca28528210902324464049a5ff0e68cea726a812b858114c
                                  • Opcode Fuzzy Hash: 57bf22cfbc5af07b01bf501b30f0760cf362736be8b428b059ae4ae264bf94ae
                                  • Instruction Fuzzy Hash: E21181B6A00609EFDF05DFB4C894AEDBB79FF09358F040159E546B6260DB349D40DB60
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 6BDE2ADF
                                  • ScreenToClient.USER32(?,?), ref: 6BDE2AEC
                                  • PtInRect.USER32(?,?,?), ref: 6BDE2AFF
                                  • LoadCursorW.USER32(00000000,00007F86), ref: 6BDE2B21
                                  • SetCursor.USER32(?), ref: 6BDE2B3F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Cursor$ClientLoadRectScreen
                                  • String ID:
                                  • API String ID: 2747913190-0
                                  • Opcode ID: 76dcdaf79fc9747601d52c60c9b8d3a32d767846c85b0307c663e18a9126e5e9
                                  • Instruction ID: 85038947002e6a3047b883542d5037fc869a093dd23e4636e636e4a2fe74a627
                                  • Opcode Fuzzy Hash: 76dcdaf79fc9747601d52c60c9b8d3a32d767846c85b0307c663e18a9126e5e9
                                  • Instruction Fuzzy Hash: BA015B7684010AFFDF119F71CC49EAE7BB8EF55764B0040A9F546AA020EB749641EB70
                                  APIs
                                  • PeekMessageW.USER32(?,?,00000367,00000367,00000003), ref: 6BDB3FD6
                                  • PostMessageW.USER32(?,00000367,00000000,00000000), ref: 6BDB3FE6
                                  • GetCapture.USER32 ref: 6BDB3FEC
                                  • ReleaseCapture.USER32 ref: 6BDB3FF8
                                  • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 6BDB401F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Message$CapturePost$PeekRelease
                                  • String ID:
                                  • API String ID: 1125932295-0
                                  • Opcode ID: d07df37ef7d5ee38f0d03084131ea477f3aaec5beaecc117b352ec5421b8d28f
                                  • Instruction ID: 2f2b953e55c3d106ec0453f81862985e0e2fc02ea9785d3125fb985450950d24
                                  • Opcode Fuzzy Hash: d07df37ef7d5ee38f0d03084131ea477f3aaec5beaecc117b352ec5421b8d28f
                                  • Instruction Fuzzy Hash: 2D01AD72500604FFEB216B35CC4DE6B7BBCFB89729F000869F58786161EB34D805DA60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDBC191
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6BDBC19C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6BDBC20A
                                    • Part of subcall function 6BDBC093: std::locale::_Locimp::_Locimp.LIBCPMT ref: 6BDBC0AB
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 6BDBC1B7
                                  • _Yarn.LIBCPMT ref: 6BDBC1CD
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                  • String ID:
                                  • API String ID: 1088826258-0
                                  • Opcode ID: 5747d4aa145b6a3e38223bb70c4ba14da782e4fa71344e508e6575395427a414
                                  • Instruction ID: ea2bb331985e2e6535d50d846f5a5476998ba1531e0c8663dfe00ddcfce60073
                                  • Opcode Fuzzy Hash: 5747d4aa145b6a3e38223bb70c4ba14da782e4fa71344e508e6575395427a414
                                  • Instruction Fuzzy Hash: 6201B1B69101259BCB05DB70D851B7C7B61FF813A4B180068D8125B390CF7CAF06CBE1
                                  APIs
                                  • GetDC.USER32(?), ref: 6BDA467A
                                    • Part of subcall function 6BDC0491: CreateBitmap.GDI32(00000008,00000008,00000001,00000001,?), ref: 6BDC04D8
                                    • Part of subcall function 6BDC0491: CreatePatternBrush.GDI32(00000000), ref: 6BDC04E5
                                    • Part of subcall function 6BDC0491: DeleteObject.GDI32(00000000), ref: 6BDC04F1
                                  • SelectObject.GDI32(?,?), ref: 6BDA4699
                                  • PatBlt.GDI32(?,?,?,?,?,005A0049), ref: 6BDA46BE
                                  • SelectObject.GDI32(?,00000000), ref: 6BDA46CC
                                  • ReleaseDC.USER32(?,?), ref: 6BDA46D8
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Object$CreateSelect$BitmapBrushDeletePatternRelease
                                  • String ID:
                                  • API String ID: 2474928807-0
                                  • Opcode ID: e220248a3f660d1a156aa95cd4b4f738230e410e94431caa5ec07ccf0c46c0b5
                                  • Instruction ID: fc730696455ebcf8a872ad5203398980eadccdd45d362e385273b16df14736fe
                                  • Opcode Fuzzy Hash: e220248a3f660d1a156aa95cd4b4f738230e410e94431caa5ec07ccf0c46c0b5
                                  • Instruction Fuzzy Hash: 32010873110500AFCB019BB5CD48D567BA9EB4AB543148168F61ACA521CB77D821DB50
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: _strcspn
                                  • String ID: .$@
                                  • API String ID: 3709121408-1252397774
                                  • Opcode ID: 5ea41fbff8fcb031783759e7bf9d95458fea9f638594f6a19ea4852470c82da4
                                  • Instruction ID: cc78c2c91c14446a872587c2682d3d11effe4c306adbccdd862c0ccf8c10ed4a
                                  • Opcode Fuzzy Hash: 5ea41fbff8fcb031783759e7bf9d95458fea9f638594f6a19ea4852470c82da4
                                  • Instruction Fuzzy Hash: AB323674D10658CFCB25DF28C991ADDBBB4BF4A310F0481EAD849AB351DB789A80CF61
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDD32D5
                                  • SendMessageW.USER32(00000000,0000040D,00000000,00000000), ref: 6BDD3300
                                  • SendMessageW.USER32(?,0000043A,-00000001,00000030), ref: 6BDD3348
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessageSend$H_prolog3_
                                  • String ID: 0
                                  • API String ID: 3491702567-4108050209
                                  • Opcode ID: cb324896f5823fd0d120515bec776d0df949daa0f55f9dfb52e48a885154c886
                                  • Instruction ID: 38d4490a1641b258efd0db8b53d91b2b2733ce51d671a5ca7f8974203bc89892
                                  • Opcode Fuzzy Hash: cb324896f5823fd0d120515bec776d0df949daa0f55f9dfb52e48a885154c886
                                  • Instruction Fuzzy Hash: 72318075A40219AFDB24CB60CC85FADB778FF45324F0001A9E59D6B190DB786E44DF61
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 6BDD950F
                                  • ScreenToClient.USER32(?,?), ref: 6BDD951C
                                  • SendMessageW.USER32(?,00000030,-0000011C,00000000), ref: 6BDD95A4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ClientCursorMessageScreenSend
                                  • String ID: ,
                                  • API String ID: 3733300889-3772416878
                                  • Opcode ID: 52f075df626f8cedd1cd63c88c692379a6fbe4642c73b6dce9a87218443bab06
                                  • Instruction ID: 83adf3e3596102b3b7d5b0e3478902ce3ff95cc1751f46b339513dc1214eacd1
                                  • Opcode Fuzzy Hash: 52f075df626f8cedd1cd63c88c692379a6fbe4642c73b6dce9a87218443bab06
                                  • Instruction Fuzzy Hash: 3A317F71A11219AFDB10DF74D848B9EBBB9FF09764F004069E855DB1A0DB39E900DBA4
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDD07A9
                                    • Part of subcall function 6BE1DE20: __EH_prolog3.LIBCMT ref: 6BE1DE27
                                    • Part of subcall function 6BDBB793: GetDlgCtrlID.USER32(?), ref: 6BDBB79E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: H_prolog3$Ctrl
                                  • String ID: %TsMFCToolBar-%d$%TsMFCToolBar-%d%x$MFCToolBars
                                  • API String ID: 3879667756-2016111687
                                  • Opcode ID: 6393ef476ac75df089b0f18663c0c2f257f544f4f1a366f976b76258d67aa9fe
                                  • Instruction ID: a4b3eca7b159fe257f9abde99e8afc0ce35a8bfcf8eee21a3a07ae5603679a11
                                  • Opcode Fuzzy Hash: 6393ef476ac75df089b0f18663c0c2f257f544f4f1a366f976b76258d67aa9fe
                                  • Instruction Fuzzy Hash: 4D21B175E0021AEBCF00EFB4CC91ABEB775BF54328F104968D8116B291DB389A05CBA1
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CursorH_prolog3
                                  • String ID: Control Panel\Desktop$MenuShowDelay
                                  • API String ID: 634316419-702829638
                                  • Opcode ID: 68e40c3a147dc536e26bc3b98751b15596ff242d5fae530aefec493bfee5c9f0
                                  • Instruction ID: 6675a3bd45255434b86c545ed33e40c81c852579e81728f18ad099a7b8aa395b
                                  • Opcode Fuzzy Hash: 68e40c3a147dc536e26bc3b98751b15596ff242d5fae530aefec493bfee5c9f0
                                  • Instruction Fuzzy Hash: 2521AE31A1021ADBCF04DBB4DC94ABD7BA1BF49324F140569E921DF290DB79EA05CB90
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDD0887
                                    • Part of subcall function 6BE1DE20: __EH_prolog3.LIBCMT ref: 6BE1DE27
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: H_prolog3
                                  • String ID: %TsMFCToolBarParameters$LargeIcons$MFCToolBars
                                  • API String ID: 431132790-953485693
                                  • Opcode ID: ecdabdedb46424295a76a1ace2ba7531e1d98f7ad03007b1315f986903e73e60
                                  • Instruction ID: 85dc38b2aaf0180990341e6ca09aabb8e3bb1cc2da43dc4227272122c8d4af87
                                  • Opcode Fuzzy Hash: ecdabdedb46424295a76a1ace2ba7531e1d98f7ad03007b1315f986903e73e60
                                  • Instruction Fuzzy Hash: CE215075A00219DBDF04EFB4C8D1ABEB775BF95318F140868D5026B391DB399A09CB61
                                  APIs
                                    • Part of subcall function 6BDAA17B: LoadLibraryW.KERNEL32(00000000,6BF62360,00000010,6BDBFFE4,comctl32.dll,?), ref: 6BDAA1BC
                                  • GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 6BDBFFF8
                                  • FreeLibrary.KERNEL32(00000000), ref: 6BDC0044
                                    • Part of subcall function 6BDBFBF7: GetLastError.KERNEL32(6BDBFFEF,comctl32.dll,?,?,00001000,?,?,?), ref: 6BDBFBF7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Library$AddressErrorFreeLastLoadProc
                                  • String ID: DllGetVersion$comctl32.dll
                                  • API String ID: 2540614322-3857068685
                                  • Opcode ID: 453600dc48ec8f1c3d022e0d75d02f24a58f4434a6a6070c3d41bdd1feecb45e
                                  • Instruction ID: 4102b587384a25b2d8d93439fe0f36bf25f50ce76f99fdb205158d6385a061d0
                                  • Opcode Fuzzy Hash: 453600dc48ec8f1c3d022e0d75d02f24a58f4434a6a6070c3d41bdd1feecb45e
                                  • Instruction Fuzzy Hash: 3311E7B6D002099BCB119FB8C855B9F7BB9EF85360F110069E5059B350DB78D904CBB5
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDBEC01
                                  • LoadCursorW.USER32(00000000,00007F00), ref: 6BDBEC25
                                  • GetClassInfoW.USER32(?,?,?), ref: 6BDBEC60
                                    • Part of subcall function 6BDAF2D4: __EH_prolog3_catch.LIBCMT ref: 6BDAF2DB
                                    • Part of subcall function 6BDAF2D4: GetClassInfoW.USER32(?,?,?), ref: 6BDAF2ED
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ClassInfo$CursorH_prolog3H_prolog3_catchLoad
                                  • String ID: %Ts:%x:%x:%x:%x
                                  • API String ID: 937286869-4057404147
                                  • Opcode ID: e653977b8d1450e4b3fe5a3fac820dc65de558f070618532605353567165c1d3
                                  • Instruction ID: 4fa0b1f78ced8c74de16c5aba91364f08760a53abbb934dafa69db758e19d968
                                  • Opcode Fuzzy Hash: e653977b8d1450e4b3fe5a3fac820dc65de558f070618532605353567165c1d3
                                  • Instruction Fuzzy Hash: 2C213AB6D10208AFDB40DFB5D881BADBBF4BF08328F104469E505EB250D7785A449B64
                                  APIs
                                  • GetModuleHandleW.KERNEL32(Advapi32.dll,?,?,?,80070057), ref: 6BDBA15B
                                  • GetProcAddress.KERNEL32(00000000,RegCreateKeyTransactedW), ref: 6BDBA16B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: Advapi32.dll$RegCreateKeyTransactedW
                                  • API String ID: 1646373207-2994018265
                                  • Opcode ID: 7ae4703f3404d8db183bb447b60498693f0469bb8faff8617c3e0c7d82ae1c97
                                  • Instruction ID: 6225759e06ee1ded8e08a51401ae57f1dda9b38e6b8571d19d6651d3a084bfc2
                                  • Opcode Fuzzy Hash: 7ae4703f3404d8db183bb447b60498693f0469bb8faff8617c3e0c7d82ae1c97
                                  • Instruction Fuzzy Hash: 24016D3321010DEBCF121F98DC04B9A3BAAFB893A1F414066FA56A5420DB7AC461EB90
                                  APIs
                                  • GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 6BDBB2AF
                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 6BDBB2BF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: Advapi32.dll$RegDeleteKeyTransactedW
                                  • API String ID: 1646373207-2168864297
                                  • Opcode ID: 118785b9dd81ffac7f4e9c4e84aa7a45dddca046c49b9815eb73de8f541fb1f0
                                  • Instruction ID: 1e0b35976500650314903b3fbcf0bcffcf623b9457c783d6f01ac085523ae9b9
                                  • Opcode Fuzzy Hash: 118785b9dd81ffac7f4e9c4e84aa7a45dddca046c49b9815eb73de8f541fb1f0
                                  • Instruction Fuzzy Hash: D4F02473610109FFAF011FA9ACC492A7BACFB923B6300403AF15395410CA36CC029760
                                  APIs
                                  • GetWindowLongW.USER32(?,000000F0), ref: 6BDBFD62
                                  • GetClassNameW.USER32(?,?,0000000A), ref: 6BDBFD77
                                  • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,combobox,000000FF,?,?,?,?,?,?,?,?,?,6BDA75A6), ref: 6BDBFD8E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ClassCompareLongNameStringWindow
                                  • String ID: combobox
                                  • API String ID: 1414938635-2240613097
                                  • Opcode ID: cfcb4f2d77972db108c4416f5004eb5a20711edaf8fbab8647b9c3e34c9fa54d
                                  • Instruction ID: 44b07d6561d0ed6732e8843a3d12c57c615ab61cc433a3d2e84922b87a90a0d7
                                  • Opcode Fuzzy Hash: cfcb4f2d77972db108c4416f5004eb5a20711edaf8fbab8647b9c3e34c9fa54d
                                  • Instruction Fuzzy Hash: A2F0A432564118ABCB00DF78CC06FAE77A8DB16730F504315F526EA0C0D674E50487A5
                                  APIs
                                  • GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 6BDBA1CB
                                  • GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 6BDBA1DB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: Advapi32.dll$RegOpenKeyTransactedW
                                  • API String ID: 1646373207-3913318428
                                  • Opcode ID: c16edb0e21a68fe3788bf3c44d5c84e5387d55252195ead905416169e1ff288d
                                  • Instruction ID: 9cd28a55eab0b5b87bcbae7f2272cc804187c09841ce6413ee5123e6166347b5
                                  • Opcode Fuzzy Hash: c16edb0e21a68fe3788bf3c44d5c84e5387d55252195ead905416169e1ff288d
                                  • Instruction Fuzzy Hash: 91F09633150509EBDF121F58DC08BA63BA9FB95762F004075F51295060DB77C461EBA0
                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?,?,6BE19C22,?,00000000,?,00000024), ref: 6BE1986D
                                  • GetProcAddress.KERNEL32(00000000,GetFileAttributesTransactedW), ref: 6BE1987D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: GetFileAttributesTransactedW$kernel32.dll
                                  • API String ID: 1646373207-1378992308
                                  • Opcode ID: c09283b1216e82a6f296799ebb65be65684e8e0d683add3ad8726406a2a29c89
                                  • Instruction ID: 302c99e2a3c4ace95e5bc7371228a5457f0f991b6fad8bc3c4296423f67dee8b
                                  • Opcode Fuzzy Hash: c09283b1216e82a6f296799ebb65be65684e8e0d683add3ad8726406a2a29c89
                                  • Instruction Fuzzy Hash: 2CF09037118209DFEF101F94EC84B6677A8FF15359F20047AE51185561C77AC465C650
                                  APIs
                                  • GdipCreateBitmapFromStream.GDIPLUS(*ak,00000000,00000000,?,?,?,6BE2612A), ref: 6BE213D8
                                  • GdipDisposeImage.GDIPLUS(00000000,*ak,00000000,00000000,?,?,?,6BE2612A), ref: 6BE213EC
                                  • GdipDisposeImage.GDIPLUS(00000082,6BF26668,*ak,00000000,00000000,?,?,?,6BE2612A), ref: 6BE21403
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Gdip$DisposeImage$BitmapCreateFromStream
                                  • String ID: *ak
                                  • API String ID: 800915452-2024954216
                                  • Opcode ID: 57722a5d7e0674fbc139dbee5f078fb83544050b1fa09ebe17cb3f8032c3b22e
                                  • Instruction ID: 66815b8029653cb373243b8ab802137ed576e6eb17a3a5a104d4870660954cbb
                                  • Opcode Fuzzy Hash: 57722a5d7e0674fbc139dbee5f078fb83544050b1fa09ebe17cb3f8032c3b22e
                                  • Instruction Fuzzy Hash: 12F0C2B2D0022AA7CF00EBF5C905AAE77F99B00259F2144699801B7200EF7DCF018BE2
                                  APIs
                                  • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 6BDAF6DB
                                  • FreeLibrary.KERNEL32(?), ref: 6BDAF6EB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AddressFreeLibraryProc
                                  • String ID: HtmlHelpW$hhctrl.ocx
                                  • API String ID: 3013587201-3773518134
                                  • Opcode ID: 7649da2e7caf2453392fec182932fe4e0a290aea4736acaa1682f28d7a34e3e7
                                  • Instruction ID: 1ffb6f7ae87525524374ac21bf784f90763896ef215ecbaa0e53e69e184eb1b8
                                  • Opcode Fuzzy Hash: 7649da2e7caf2453392fec182932fe4e0a290aea4736acaa1682f28d7a34e3e7
                                  • Instruction Fuzzy Hash: 2AF0493251460AAFCB115F74D848A8A7FA5AF01765F0488A9E89ADA870D779D4209B20
                                  APIs
                                  • __current_exception.VCRUNTIME140 ref: 004317AF
                                  • __current_exception_context.VCRUNTIME140 ref: 004317B9
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 004317C0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1782592592.0000000000431000.00000020.00000001.01000000.00000005.sdmp, Offset: 00430000, based on PE: true
                                  • Associated: 00000003.00000002.1782575451.0000000000430000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782606665.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782621103.0000000000433000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000434000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_430000_Update.jbxd
                                  Similarity
                                  • API ID: __current_exception__current_exception_contextterminate
                                  • String ID: csm
                                  • API String ID: 2542180945-1018135373
                                  • Opcode ID: 41fdafd931ad9aaddf137b82d0d58c14b10d2b972e8e795f6593ee17b9bb6dd7
                                  • Instruction ID: 74d7178faa729dbb233784e2a9c8d4df5492f2ef24b732270ebd72a71d9c4562
                                  • Opcode Fuzzy Hash: 41fdafd931ad9aaddf137b82d0d58c14b10d2b972e8e795f6593ee17b9bb6dd7
                                  • Instruction Fuzzy Hash: 74F0A7394003004F8B345E2A944555FF76DAE69375F5C645BD484CBB30CB38ED52C6D9
                                  APIs
                                  • swprintf.LIBCMT ref: 6BE184F8
                                  • GetFileAttributesW.KERNEL32(00000104,AFX,00000000,00000104,00000104,000000FF), ref: 6BE18503
                                  • GetTempFileNameW.KERNEL32(000000FF,00000104,00000000,00000104,?,?,6BDF1169,?,AFX,00000000,00000104,00000104,000000FF), ref: 6BE1851B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: File$AttributesNameTempswprintf
                                  • String ID: %s%s%X.tmp
                                  • API String ID: 2659213859-596088238
                                  • Opcode ID: 86aabbf1256aa42721d5602a3f809eee8e4d23259d4e1c10b9c293690aaec18d
                                  • Instruction ID: 9247cdf6cce109b95d58e408e372895d8c5d99da25a78a3225edac0eb3f8eae4
                                  • Opcode Fuzzy Hash: 86aabbf1256aa42721d5602a3f809eee8e4d23259d4e1c10b9c293690aaec18d
                                  • Instruction Fuzzy Hash: E6F0D43651020ABBCF029FA0DD05ACE7BBAEF15369F204654FA15A40A1D73AD630AB50
                                  APIs
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6BF03C7F,00000000,?,6BF7A3BC,?,?,?,6BF03BB6,00000004,InitializeCriticalSectionEx,6BF43994,6BF4399C), ref: 6BF03BF0
                                  • GetLastError.KERNEL32(?,6BF03C7F,00000000,?,6BF7A3BC,?,?,?,6BF03BB6,00000004,InitializeCriticalSectionEx,6BF43994,6BF4399C,00000000,?,6BEF8C3C), ref: 6BF03BFA
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6BF03C22
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: LibraryLoad$ErrorLast
                                  • String ID: api-ms-
                                  • API String ID: 3177248105-2084034818
                                  • Opcode ID: 93e393545d6c677f869593c365dfc450692ac3a06c851735bc76a26f1371acd6
                                  • Instruction ID: c98a0bfcf14d03d34820bcab6d09db600d085d5b8c5e2c2db655ca3a810d716f
                                  • Opcode Fuzzy Hash: 93e393545d6c677f869593c365dfc450692ac3a06c851735bc76a26f1371acd6
                                  • Instruction Fuzzy Hash: F5E04F33684204B7EF101A60DC06F493FA9EB15B52F108460FA0EE85F1EF76D554A645
                                  APIs
                                    • Part of subcall function 6BD71DC0: GetLastError.KERNEL32(?,?,?,?,?,?), ref: 6BD71E13
                                  • IsDebuggerPresent.KERNEL32(?,?,?,6BD9F4D3), ref: 6BDBBD18
                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,6BD9F4D3), ref: 6BDBBD27
                                  Strings
                                  • MZx, xrefs: 6BDBBCED
                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 6BDBBD22
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: DebugDebuggerErrorLastOutputPresentString
                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule$MZx
                                  • API String ID: 389471666-1466369552
                                  • Opcode ID: 08d6b38e3c20e56387b57495d7887c3a9afe99b22f5e8013b9642b51e223c999
                                  • Instruction ID: 9829b9f4c262ca6bdf8762dcfe45d581422edfb768954082df392204a79788ec
                                  • Opcode Fuzzy Hash: 08d6b38e3c20e56387b57495d7887c3a9afe99b22f5e8013b9642b51e223c999
                                  • Instruction Fuzzy Hash: 5BE039B11057518ED3209F38D448B827BE4EB15364F00896DD49BCA690EB7DD0488BA1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Object$Delete$H_prolog3
                                  • String ID:
                                  • API String ID: 487261545-0
                                  • Opcode ID: 27993021b519e9ead9080e85d7fac854b4b609173ed1585e10e6a3cf2d27a722
                                  • Instruction ID: bccf182cfbb3c72e470188d4d9315853c01dfd61bbf65ab117315e80b8e67e64
                                  • Opcode Fuzzy Hash: 27993021b519e9ead9080e85d7fac854b4b609173ed1585e10e6a3cf2d27a722
                                  • Instruction Fuzzy Hash: 0D120470D007198FDB15CFA8C990B9EFBF5BF09314F20866AD51AAB254EB74A985CF10
                                  APIs
                                    • Part of subcall function 6BDBB6AC: GetWindowLongW.USER32(?,000000EC), ref: 6BDBB6B9
                                  • GetAsyncKeyState.USER32(00000011), ref: 6BDE22CA
                                  • GetClientRect.USER32(?,?), ref: 6BDE246C
                                  • SetScrollPos.USER32(00000000,00000002,?,00000001), ref: 6BDE255A
                                    • Part of subcall function 6BDDED35: GetClientRect.USER32(?,?), ref: 6BDDED6F
                                    • Part of subcall function 6BDDED35: InflateRect.USER32(?,00000000,00000000), ref: 6BDDEDA9
                                    • Part of subcall function 6BDDED35: SetRectEmpty.USER32(?), ref: 6BDDEE4D
                                    • Part of subcall function 6BDDED35: SetRectEmpty.USER32(?), ref: 6BDDEE5A
                                    • Part of subcall function 6BDDED35: GetSystemMetrics.USER32(00000002), ref: 6BDDEE7F
                                    • Part of subcall function 6BDDED35: EqualRect.USER32(?,?), ref: 6BDDEF4C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$ClientEmpty$AsyncEqualInflateLongMetricsScrollStateSystemWindow
                                  • String ID:
                                  • API String ID: 3234605627-0
                                  • Opcode ID: 5269699d385317c338b0d3d3d7523e72092517e620092228bc6a0f3669e63175
                                  • Instruction ID: e36d49f72e9bb5b66774c499ad483ea50d1a352c47d23e6a567c542aa3d69976
                                  • Opcode Fuzzy Hash: 5269699d385317c338b0d3d3d7523e72092517e620092228bc6a0f3669e63175
                                  • Instruction Fuzzy Hash: 6BC18234B00626CBDF059F2888A477D7BA2BB49728F0000B9D9169F395DF78DD46DBA1
                                  APIs
                                  • GetConsoleOutputCP.KERNEL32(5FCB9D08,00000000,00000000,?), ref: 6BF01997
                                    • Part of subcall function 6BEF90A1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6BEFC889,?,00000000,-00000008), ref: 6BEF9102
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6BF01BE9
                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6BF01C2F
                                  • GetLastError.KERNEL32 ref: 6BF01CD2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                  • String ID:
                                  • API String ID: 2112829910-0
                                  • Opcode ID: da1733f243a0bed5b8e9f796944792efa98904d1ffb18c0ae79aec72dfada4d9
                                  • Instruction ID: e6efb27af8328cce86721266a7384de757c97def18e2b6eb80f94f8046bbb3d6
                                  • Opcode Fuzzy Hash: da1733f243a0bed5b8e9f796944792efa98904d1ffb18c0ae79aec72dfada4d9
                                  • Instruction Fuzzy Hash: 79D16D76E042589FCF01CFA9C890ADDBBB5FF09314F14816AE455EB261EB34EA46CB50
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Empty$StateWindow
                                  • String ID:
                                  • API String ID: 2684165152-0
                                  • Opcode ID: ba10f0ed193202958a34b3548addf93cf9ac1c7c24d82cfbec17dceae47e524e
                                  • Instruction ID: 504f20e3c3e0bd659ad0ace46d0fbfcced887b37d22ee826dca8f037d4e2ddf5
                                  • Opcode Fuzzy Hash: ba10f0ed193202958a34b3548addf93cf9ac1c7c24d82cfbec17dceae47e524e
                                  • Instruction Fuzzy Hash: 96A1A235A00219DFDF048FB4D895BAE7BB5FF49314F244059E812AB350DF39A911CBA0
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDDFD06
                                  • GetMenuItemCount.USER32(?), ref: 6BDDFDC6
                                  • GetMenuItemID.USER32(?,00000000), ref: 6BDDFDE6
                                  • GetSubMenu.USER32(?,00000000), ref: 6BDDFF05
                                    • Part of subcall function 6BDCD83B: __EH_prolog3.LIBCMT ref: 6BDCD842
                                    • Part of subcall function 6BDCD83B: SetRectEmpty.USER32(?), ref: 6BDCD9FB
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Menu$Item$CountEmptyH_prolog3H_prolog3_Rect
                                  • String ID:
                                  • API String ID: 2186202558-0
                                  • Opcode ID: 57cc6c5e1ab01567c80d350ef1aa8c32306320f0874fbc647a43e371755a080c
                                  • Instruction ID: bc49fde7ddfaeb5301c1b3d033a36b39033bb894dbfb45da49b08da2ad935efb
                                  • Opcode Fuzzy Hash: 57cc6c5e1ab01567c80d350ef1aa8c32306320f0874fbc647a43e371755a080c
                                  • Instruction Fuzzy Hash: E8A15F31A00229DBDF14DB74CC94BEDB7B5AF49324F1002E9E41AAB291DB39AE45CF50
                                  APIs
                                  • IsThemeBackgroundPartiallyTransparent.UXTHEME(?,00000006,00000000,6BF1DE20), ref: 6BDC3919
                                  • DrawThemeParentBackground.UXTHEME(?,?,00000000), ref: 6BDC3933
                                  • DrawThemeBackground.UXTHEME(?,?,00000006,00000000,00000000,00000000), ref: 6BDC394F
                                  • GetBkColor.GDI32(?), ref: 6BDC3961
                                    • Part of subcall function 6BDC0831: SetBkColor.GDI32(?,?), ref: 6BDC084A
                                    • Part of subcall function 6BDC0831: ExtTextOutW.GDI32(?,00000000,00000000,00000002,00000000,00000000,00000000,00000000), ref: 6BDC087C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: BackgroundTheme$ColorDraw$ParentPartiallyTextTransparent
                                  • String ID:
                                  • API String ID: 501873518-0
                                  • Opcode ID: 4633829ddd9b3c8e6466a4b3164c1f14f4e1d5ce668f9dc5aca083036ef94687
                                  • Instruction ID: ad90badb491836b6d48e9a6eaa09c9df5ae19f9dd5b56212be11e1f3a6af3d50
                                  • Opcode Fuzzy Hash: 4633829ddd9b3c8e6466a4b3164c1f14f4e1d5ce668f9dc5aca083036ef94687
                                  • Instruction Fuzzy Hash: DE914C71E00219EFDF10CF99C885BAEBBB9FF48720F148155E918BB290C7799940CBA5
                                  APIs
                                  • GetClientRect.USER32(?,?), ref: 6BDDF0AA
                                  • InflateRect.USER32(?,00000000,00000000), ref: 6BDDF0E0
                                  • GetSystemMetrics.USER32(00000002), ref: 6BDDF167
                                    • Part of subcall function 6BDAB294: SetScrollInfo.USER32(?,?,?,?), ref: 6BDAB2D8
                                  • EnableScrollBar.USER32(?,00000002,00000003), ref: 6BDDF286
                                    • Part of subcall function 6BDBBA97: EnableWindow.USER32(?,?), ref: 6BDBBAA8
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: EnableRectScroll$ClientInflateInfoMetricsSystemWindow
                                  • String ID:
                                  • API String ID: 3090651611-0
                                  • Opcode ID: aa6b05267671bfb851c9043c9ec5b6acc4e7f159367a423993ec010d2edfdb93
                                  • Instruction ID: c09808c4338ffa0f9a959cf96a8a7905559ba628714fe4a775d78f1f1ed29023
                                  • Opcode Fuzzy Hash: aa6b05267671bfb851c9043c9ec5b6acc4e7f159367a423993ec010d2edfdb93
                                  • Instruction Fuzzy Hash: 9C716E31A00219DFCF00CFA8C985AEDB7B5FF49714F1401BAE949EB245DB74AA45DB60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BE24240
                                  • LoadImageW.USER32(?,?,00000000,00000000,00000000,00002000), ref: 6BE24396
                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 6BE243A8
                                  • DeleteObject.GDI32(00000000), ref: 6BE24400
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Object$DeleteH_prolog3ImageLoad
                                  • String ID:
                                  • API String ID: 91933946-0
                                  • Opcode ID: d59621dcf362a789f8f59575d1abc7a3804e6c1df6fcfa63e9546a7d7cd0d468
                                  • Instruction ID: 11ba1cd0c9a62ede9e134c55414492901d45f1670ee979c12262a8368ceaf808
                                  • Opcode Fuzzy Hash: d59621dcf362a789f8f59575d1abc7a3804e6c1df6fcfa63e9546a7d7cd0d468
                                  • Instruction Fuzzy Hash: 5761E232800615CFDF01CF74C8817AE77B5BF45314F2082AAED256F296DB789A45CBA0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AdjustPointer
                                  • String ID:
                                  • API String ID: 1740715915-0
                                  • Opcode ID: de35bb54937b39d4b9b564741e309d8510dc29be00e71dad5c67c6df49fbefb1
                                  • Instruction ID: b6889c99d66fa5d2fd2f2f43a6435b9ecd6686a07f76c364814fc0223aaa1ed3
                                  • Opcode Fuzzy Hash: de35bb54937b39d4b9b564741e309d8510dc29be00e71dad5c67c6df49fbefb1
                                  • Instruction Fuzzy Hash: F851F172A05602EFEB158F12C841B6A73ADFF00718F3045ADDC15876A0E739E953C7A0
                                  APIs
                                    • Part of subcall function 6BDA41C0: GetDlgCtrlID.USER32(?), ref: 6BDA41CE
                                    • Part of subcall function 6BDA41C0: IsChild.USER32(?,?), ref: 6BDA41DC
                                  • GetScrollPos.USER32(?,00000002), ref: 6BDA5153
                                  • GetScrollPos.USER32(?,00000002), ref: 6BDA517F
                                  • SetScrollPos.USER32(?,00000002,00000000,00000000), ref: 6BDA51DC
                                  • SetScrollPos.USER32(?,00000002,00000000,00000000), ref: 6BDA525E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Scroll$ChildCtrl
                                  • String ID:
                                  • API String ID: 656700424-0
                                  • Opcode ID: 6593b307fd0e38bf773a0520f18965dd2581c71e922db7fc00e9ad737728d287
                                  • Instruction ID: 2571211bb22322381c9a48228f7e1c5624ff34e0bfd03279e945d52a34c90d27
                                  • Opcode Fuzzy Hash: 6593b307fd0e38bf773a0520f18965dd2581c71e922db7fc00e9ad737728d287
                                  • Instruction Fuzzy Hash: 79516071A10229EFDF058FA4C865BBEBBB5FF49710F104069E916AB290DB74AD01DF90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: H_prolog3InvalidateParentRectUpdateWindow
                                  • String ID:
                                  • API String ID: 1954703720-0
                                  • Opcode ID: ff865b2e938de922a636047f42b4a4ae1f72ffd589b6b33c995e24840f179f4e
                                  • Instruction ID: 4edf5b5286ba3989c6d5b9a319c7b601c802b906736c16d8c453d9af0a06d174
                                  • Opcode Fuzzy Hash: ff865b2e938de922a636047f42b4a4ae1f72ffd589b6b33c995e24840f179f4e
                                  • Instruction Fuzzy Hash: FE519275700616DFDB048F79C884BA9B7E5BB49321F000579E82ACB290DB78A845DF60
                                  APIs
                                    • Part of subcall function 6BDA41C0: GetDlgCtrlID.USER32(?), ref: 6BDA41CE
                                    • Part of subcall function 6BDA41C0: IsChild.USER32(?,?), ref: 6BDA41DC
                                  • GetScrollPos.USER32(?,00000002), ref: 6BDA5309
                                  • GetScrollPos.USER32(?,00000002), ref: 6BDA5335
                                  • SetScrollPos.USER32(?,00000002,00000000,00000000), ref: 6BDA5392
                                  • SetScrollPos.USER32(?,00000002,00000000,00000000), ref: 6BDA5407
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Scroll$ChildCtrl
                                  • String ID:
                                  • API String ID: 656700424-0
                                  • Opcode ID: 66cb20fda6cdcbda54c278c7480c615b8ed331673f844fa8ddbdbe5100621b39
                                  • Instruction ID: f94c49d82bd868462ccd4107c310716ced003b5661c15044a6250edc65bbe9b7
                                  • Opcode Fuzzy Hash: 66cb20fda6cdcbda54c278c7480c615b8ed331673f844fa8ddbdbe5100621b39
                                  • Instruction Fuzzy Hash: 12513A75A00219EFDF05CF64C855BAEBBB6BF89310F1040A9E915BB290DB75AE01DF90
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDC6DC4
                                    • Part of subcall function 6BDBA8ED: RegCloseKey.ADVAPI32(00000000,?,00000000), ref: 6BDBA992
                                    • Part of subcall function 6BDBA8ED: RegCloseKey.ADVAPI32(00000000,?,00000000), ref: 6BDBA9A1
                                  • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 6BDC6F49
                                  • RegCloseKey.ADVAPI32(?), ref: 6BDC6F5C
                                  • RegCloseKey.ADVAPI32(?), ref: 6BDC6FB6
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Close$EnumH_prolog3_Value
                                  • String ID:
                                  • API String ID: 431837299-0
                                  • Opcode ID: f4824762b2071198aed0f2532018e868e6046f0d255d478c913be31ac92ddb1f
                                  • Instruction ID: 12c7279f1f6604aa78ed8b25191352195519660c89fc1c7e058955ed54b909ea
                                  • Opcode Fuzzy Hash: f4824762b2071198aed0f2532018e868e6046f0d255d478c913be31ac92ddb1f
                                  • Instruction Fuzzy Hash: BE513FB19001289BCB21DF64CC94ADEBBBCAF49714F4001DAE609A7251DB749B85CFA5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 033b6f6a48bb8d47aa5d70e97606424fbdc7ae531b7d712e05f1763488c02137
                                  • Instruction ID: c409bdd8d7642d8215d5efb2752db49e462f5a210358db0ff4319d27e157cbd0
                                  • Opcode Fuzzy Hash: 033b6f6a48bb8d47aa5d70e97606424fbdc7ae531b7d712e05f1763488c02137
                                  • Instruction Fuzzy Hash: BB413BB3A0030CBFD7258F78CC11B5ABBE9EB85710F20452EE011DB6B0DBB9A9418790
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: EmptyRect
                                  • String ID:
                                  • API String ID: 2270935405-0
                                  • Opcode ID: f87834191976a6960780a13f3d2ba0dd7b18668e0a7155847e844cdb5e816839
                                  • Instruction ID: e4dd8e5790938104ffb29030e361cd20d2252443412e356ebec2494d46c2b98b
                                  • Opcode Fuzzy Hash: f87834191976a6960780a13f3d2ba0dd7b18668e0a7155847e844cdb5e816839
                                  • Instruction Fuzzy Hash: D851D2B0821265CFCB24CF29C4C46E53BA8FB09B64F0841BBED4C8E65ACBB45145DFA1
                                  APIs
                                  • GetPrivateProfileStringW.KERNEL32(?,?,6BF57FB4,?,00001000,?), ref: 6BDBA4F1
                                    • Part of subcall function 6BDBA899: RegCloseKey.ADVAPI32(00000000,?,?,?,?,6BDBA2C8,?,00000000), ref: 6BDBA8DE
                                  • RegQueryValueExW.ADVAPI32(00000000,?,00000000,?,00000000,?,?,00000000,5FCB9D08,?,?,?,?,6BF0BB61,000000FF), ref: 6BDBA43F
                                  • RegQueryValueExW.ADVAPI32(00000000,?,00000000,?,00000000,?,?,?,?,?,?,6BF0BB61,000000FF), ref: 6BDBA47B
                                  • RegCloseKey.ADVAPI32(00000000,?,?,?,?,6BF0BB61,000000FF), ref: 6BDBA495
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CloseQueryValue$PrivateProfileString
                                  • String ID:
                                  • API String ID: 2114517702-0
                                  • Opcode ID: fb5f1b2d614b7b23fae350c18aff25c6f989615f8109ff53c6d8244d4fcd6db1
                                  • Instruction ID: e442a06154f21c4794b3b44efbdc0c3ab90af78d787cc1a3f0c8f82a63895626
                                  • Opcode Fuzzy Hash: fb5f1b2d614b7b23fae350c18aff25c6f989615f8109ff53c6d8244d4fcd6db1
                                  • Instruction Fuzzy Hash: 654174B1900229DFDB25CF24CC49AAEB7B9FF04324F00459AE41AA7291DB389F55DF60
                                  APIs
                                  • MultiByteToWideChar.KERNEL32 ref: 6BD910BA
                                  • MultiByteToWideChar.KERNEL32 ref: 6BD91153
                                  • WideCharToMultiByte.KERNEL32 ref: 6BD9119C
                                  • WideCharToMultiByte.KERNEL32 ref: 6BD91216
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWide
                                  • String ID:
                                  • API String ID: 626452242-0
                                  • Opcode ID: 913941e64377fd24d4b41b0c6ce0706e1ddb61f13d6181036423ce460a898a18
                                  • Instruction ID: 1d147855a813eb874efb51daafe283b2133fc892d2d525f2a1287f4952b4cadb
                                  • Opcode Fuzzy Hash: 913941e64377fd24d4b41b0c6ce0706e1ddb61f13d6181036423ce460a898a18
                                  • Instruction Fuzzy Hash: 5B51C4B19083059FDB04EFA8D49539EBFF1BF88354F10891DE4A99B390D3799644CB86
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 6BDDA851
                                  • ScreenToClient.USER32(000000FF,?), ref: 6BDDA861
                                  • PtInRect.USER32(000000D8,?,?), ref: 6BDDA874
                                  • PostMessageW.USER32(000000FF,00000010,00000000,00000000), ref: 6BDDA88F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ClientCursorMessagePostRectScreen
                                  • String ID:
                                  • API String ID: 1913696736-0
                                  • Opcode ID: 57b543fba3803b8822a681256dc1267305976d6870e2b9cde693eee1cb3f013a
                                  • Instruction ID: ca5f4365a67a38cedc126f638d73f82668f6ea78549c504ee376c28b3245206a
                                  • Opcode Fuzzy Hash: 57b543fba3803b8822a681256dc1267305976d6870e2b9cde693eee1cb3f013a
                                  • Instruction Fuzzy Hash: 6D31F376B00219EFCB099FA4C844B6D7B75FF49360B1041A5ED56DB2A0DB38DE06EB50
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BE3DDD1
                                  • SendMessageW.USER32(?,00000421,00000001,?), ref: 6BE3DE68
                                  • SendMessageW.USER32(?,00000421,00000001,?), ref: 6BE3DE7D
                                  • lstrcpyW.KERNEL32(00000000,00000010,00000000,00000010,6BDD4DF1,00000000,?,00000002,?,?), ref: 6BE3DEAC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessageSend$H_prolog3lstrcpy
                                  • String ID:
                                  • API String ID: 3361160815-0
                                  • Opcode ID: 8631083f367ce8fe3fe5826d39b60164459cc8e0481df45b40f1855dade4eca1
                                  • Instruction ID: 3ee1b781685a44dc093ae1d04fbf4bd108be5d041cd68df7ddb6345a5256810d
                                  • Opcode Fuzzy Hash: 8631083f367ce8fe3fe5826d39b60164459cc8e0481df45b40f1855dade4eca1
                                  • Instruction Fuzzy Hash: E541C376A5021ADBDF04CF74C886BAE77B5BF15328F204868E5129B2D0CB39DA55CB60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDBD8B7
                                  • GetClientRect.USER32(6BF1D79C,?), ref: 6BDBD906
                                    • Part of subcall function 6BDAB073: GetScrollPos.USER32(?,?), ref: 6BDAB09F
                                    • Part of subcall function 6BDC6155: GetModuleHandleW.KERNEL32(uxtheme.dll,?,6BDBD938,?,?,?,?,?,?,?,?,00000008), ref: 6BDC6164
                                    • Part of subcall function 6BDC6155: GetProcAddress.KERNEL32(00000000,BufferedPaintInit), ref: 6BDC6174
                                    • Part of subcall function 6BDC6155: EncodePointer.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000008), ref: 6BDC617D
                                  • CreateCompatibleDC.GDI32(?), ref: 6BDBD9A2
                                  • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6BDBD9C8
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CompatibleCreate$AddressBitmapClientEncodeH_prolog3HandleModulePointerProcRectScroll
                                  • String ID:
                                  • API String ID: 1015973060-0
                                  • Opcode ID: a69c0c429502aa236ded090da3ddd2300dc5a5cb029dd47e39dd7cea58dc4499
                                  • Instruction ID: a7813d73ccc331964d23ecd36bbe778a4dbfc68eccb855568b4b8f8563393eed
                                  • Opcode Fuzzy Hash: a69c0c429502aa236ded090da3ddd2300dc5a5cb029dd47e39dd7cea58dc4499
                                  • Instruction Fuzzy Hash: 4C4160B1900606EFDB00CF79C885B59FBB4BF08328B00856DD45E9B651D778EA54CFA0
                                  APIs
                                    • Part of subcall function 6BDBB682: GetWindowLongW.USER32(458BF84D,000000F0), ref: 6BDBB68F
                                  • GetClientRect.USER32(?,?), ref: 6BDAE497
                                  • IsMenu.USER32(00000000), ref: 6BDAE4D3
                                  • AdjustWindowRectEx.USER32(?,00000000,00000000,?), ref: 6BDAE4EB
                                  • GetClientRect.USER32(?,?), ref: 6BDAE533
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$ClientWindow$AdjustLongMenu
                                  • String ID:
                                  • API String ID: 3435883281-0
                                  • Opcode ID: 5b905712cffda47544d1a7baf413e8c09b14a5fd40fe0320d856c14fc2b97828
                                  • Instruction ID: 241770ce657d2f6ea8c80772bb7140c20bf45fd9fb7030bdb755cd6813065e58
                                  • Opcode Fuzzy Hash: 5b905712cffda47544d1a7baf413e8c09b14a5fd40fe0320d856c14fc2b97828
                                  • Instruction Fuzzy Hash: 9C319475E10209AFDB00DBB5C995BBEBBB9EF55324F204159E902EB250EB34DE40C760
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BDD8BA1
                                  • IsWindow.USER32(?), ref: 6BDD8C49
                                  • GetParent.USER32(?), ref: 6BDD8C69
                                  • GetParent.USER32(?), ref: 6BDD8C85
                                    • Part of subcall function 6BE1EDBA: __EH_prolog3_catch_GS.LIBCMT ref: 6BE1EDC1
                                    • Part of subcall function 6BE1EDBA: CreateCompatibleDC.GDI32(00000000), ref: 6BE1EE01
                                    • Part of subcall function 6BE1EDBA: CreateCompatibleBitmap.GDI32(?,?,?), ref: 6BE1EE23
                                    • Part of subcall function 6BE1EDBA: FillRect.USER32(?,?,?), ref: 6BE1EE6D
                                    • Part of subcall function 6BE1EDBA: OpenClipboard.USER32(?), ref: 6BE1EE9D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CompatibleCreateParent$BitmapClipboardFillH_prolog3H_prolog3_catch_OpenRectWindow
                                  • String ID:
                                  • API String ID: 837828968-0
                                  • Opcode ID: f021f9ca5374d228e3137da3ead5f0ff196930a9e37e0d617637f176c4591213
                                  • Instruction ID: d382ec3130ddbefc5e8109af85a2a6b1124ad970f2e0dc56f2344e80a078ad2b
                                  • Opcode Fuzzy Hash: f021f9ca5374d228e3137da3ead5f0ff196930a9e37e0d617637f176c4591213
                                  • Instruction Fuzzy Hash: 49314976505701EFCB116B78CC42A1A73B8BF44738750147EE5869F4A0EF3EE9009B61
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$ClientEmptyWindow
                                  • String ID:
                                  • API String ID: 742297903-0
                                  • Opcode ID: ac61b75853a370df85139bca3c2128d3ac8c2f4eff3a6caedd23089645daf3af
                                  • Instruction ID: 8735cf6547097f518df07a32764f14dc444152bb5c8aea93e42bf7635478eea8
                                  • Opcode Fuzzy Hash: ac61b75853a370df85139bca3c2128d3ac8c2f4eff3a6caedd23089645daf3af
                                  • Instruction Fuzzy Hash: E2318D75A00219DFCB00DF28C884A6DB7B9FF59314B208569E81AEB351DB34ED45CFA0
                                  APIs
                                  • SetRectEmpty.USER32(6BDC9ED9), ref: 6BDC98FB
                                  • GetClientRect.USER32(00000000,6BDC9ED9), ref: 6BDC991B
                                  • GetParent.USER32(00000000), ref: 6BDC993A
                                  • OffsetRect.USER32(6BDC9ED9,00000000,00000000), ref: 6BDC99BC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$ClientEmptyOffsetParent
                                  • String ID:
                                  • API String ID: 3819956977-0
                                  • Opcode ID: 96d411d2601790446cc5aee8c0fbdaf5219cc27083fef973113eea3cd363ca3b
                                  • Instruction ID: 3035bda2e1da25d5e62e2f04af75f54916aac8960bd2873583469fe8f5f6efae
                                  • Opcode Fuzzy Hash: 96d411d2601790446cc5aee8c0fbdaf5219cc27083fef973113eea3cd363ca3b
                                  • Instruction Fuzzy Hash: E0318176200602EFD709CF65C895E26B7A8FF45724B10825DE81A8B691DF38EC51CBA1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$FocusInvalidateRectUpdate
                                  • String ID:
                                  • API String ID: 593871241-0
                                  • Opcode ID: 7978e73bfce2692827cf75889a13e96475e69989fbd3f6e6b3e9ed3f026db03a
                                  • Instruction ID: b9f3f3546c543e17951274f5c1dcc5bfe18078da2217e6db197cd1a6b03936a0
                                  • Opcode Fuzzy Hash: 7978e73bfce2692827cf75889a13e96475e69989fbd3f6e6b3e9ed3f026db03a
                                  • Instruction Fuzzy Hash: 5A313832A14605EFDB118F64D810BDA77B8FF85378F1102A6D894AF050DB78EA04DBA0
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BEAA6B3
                                  • CoTaskMemFree.OLE32(?,?,?,?,?,00000000,?,00000040,6BE26D3C,?,00000000,00000000,0000005C), ref: 6BEAA757
                                  • CoTaskMemFree.OLE32(?,?,?,00000000,?,00000040,6BE26D3C,?,00000000,00000000,0000005C), ref: 6BEAA797
                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,00000003,000000FF,00000000,?,00000000,?,00000040,6BE26D3C,?,00000000,00000000), ref: 6BEAA7B5
                                    • Part of subcall function 6BDA0447: __EH_prolog3.LIBCMT ref: 6BDA044E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: FreeTask$CreateGlobalH_prolog3H_prolog3_Stream
                                  • String ID:
                                  • API String ID: 655328227-0
                                  • Opcode ID: 8869846f2a199ecdfd652d06917784a659523f01301c89088cc60010ab97bfdb
                                  • Instruction ID: ed138fa038f38bfff4d5441774fd7087de1266dc8e0d7d8281e46905d3eaa77c
                                  • Opcode Fuzzy Hash: 8869846f2a199ecdfd652d06917784a659523f01301c89088cc60010ab97bfdb
                                  • Instruction Fuzzy Hash: 9731A67194421DABDF109F74CC89BAEB7B8BF04328F100199F5059F290CB399A85DFA1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$EqualInflateParentWindow
                                  • String ID:
                                  • API String ID: 719057501-0
                                  • Opcode ID: 7dc0083eee8e69136d24b1574e487f1c36a50125ef6bcdbe051404a844c63f67
                                  • Instruction ID: a0ee7d1f3562afc2577295e99c2af40d854ed836738382ae022d459b1e8ad504
                                  • Opcode Fuzzy Hash: 7dc0083eee8e69136d24b1574e487f1c36a50125ef6bcdbe051404a844c63f67
                                  • Instruction Fuzzy Hash: B5312F76A10209EBCF00DFB4C945AEEB7B9FF19314F10056AE506EB150EB39EA558B60
                                  APIs
                                  • GetWindowRect.USER32(?,?), ref: 6BE3C12C
                                  • EqualRect.USER32(?,?), ref: 6BE3C152
                                  • BeginDeferWindowPos.USER32(?), ref: 6BE3C15F
                                  • EndDeferWindowPos.USER32(00000000), ref: 6BE3C185
                                    • Part of subcall function 6BE2B8C5: GetWindowRect.USER32(?,?), ref: 6BE2B8D9
                                    • Part of subcall function 6BE2B8C5: GetParent.USER32(?), ref: 6BE2B92F
                                    • Part of subcall function 6BE2B8C5: GetParent.USER32(?), ref: 6BE2B942
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Rect$DeferParent$BeginEqual
                                  • String ID:
                                  • API String ID: 2054780619-0
                                  • Opcode ID: cb3f1cfdeb5e520c14f21fe457ec196e56ec3d0ebaee3095103a01b36bbe36bf
                                  • Instruction ID: 635b106bbcbbd6ff2f968921bb2f62452b8b1185e6af0e1a921e4267af91ddbb
                                  • Opcode Fuzzy Hash: cb3f1cfdeb5e520c14f21fe457ec196e56ec3d0ebaee3095103a01b36bbe36bf
                                  • Instruction Fuzzy Hash: 1F315471E006199BCF01DF74C984ADEB7B9FF19314F60416AE406A7210DB35EA54CBA1
                                  APIs
                                    • Part of subcall function 6BEF90A1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6BEFC889,?,00000000,-00000008), ref: 6BEF9102
                                  • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 6BEFEBCD
                                  • __dosmaperr.LIBCMT ref: 6BEFEBD4
                                  • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000), ref: 6BEFEC0E
                                  • __dosmaperr.LIBCMT ref: 6BEFEC15
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                  • String ID:
                                  • API String ID: 1913693674-0
                                  • Opcode ID: 8901536d49d56c5e8503ccf5bb244bf59e72dab7549d31f3cc4385ba6b419a9b
                                  • Instruction ID: 14010e4b74530e263de6e9ae21d7036870f3bddc901ddeb03105ff3411736ceb
                                  • Opcode Fuzzy Hash: 8901536d49d56c5e8503ccf5bb244bf59e72dab7549d31f3cc4385ba6b419a9b
                                  • Instruction Fuzzy Hash: 6F21C571A14A05AFD7209F75C88182BB7ADFF45368B20895DF91697250EB3DFC1387A0
                                  APIs
                                  • GetClientRect.USER32(?,?), ref: 6BDDC779
                                  • PtInRect.USER32(?,?,?), ref: 6BDDC7A3
                                    • Part of subcall function 6BDDA412: ScreenToClient.USER32(?,?), ref: 6BDDA42E
                                    • Part of subcall function 6BDDA412: GetParent.USER32(?), ref: 6BDDA43E
                                    • Part of subcall function 6BDDA412: GetClientRect.USER32(?,?), ref: 6BDDA4D1
                                    • Part of subcall function 6BDDA412: MapWindowPoints.USER32(?,?,?,00000002), ref: 6BDDA4E3
                                    • Part of subcall function 6BDDA412: PtInRect.USER32(?,?,?), ref: 6BDDA4F3
                                  • MapWindowPoints.USER32(?,?,?,00000001), ref: 6BDDC7CC
                                  • SendMessageW.USER32(?,00000202,?,?), ref: 6BDDC7EB
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Client$PointsWindow$MessageParentScreenSend
                                  • String ID:
                                  • API String ID: 2689702638-0
                                  • Opcode ID: a75076c760c091c9370467adc06922bbb48b8906f9b0c1b1bd0f4f8b9853cf93
                                  • Instruction ID: a43741e9abc71c921c4ddebf80098bdde6b54598d0b04e18e4f50f6a479d6f77
                                  • Opcode Fuzzy Hash: a75076c760c091c9370467adc06922bbb48b8906f9b0c1b1bd0f4f8b9853cf93
                                  • Instruction Fuzzy Hash: CF319331A10609EBCF06CF75C804EAE7BB5FF49764F10412AF89A9A120EB35DA11DF90
                                  APIs
                                  • RedrawWindow.USER32(00000041,?,?,00000041), ref: 6BDA45A2
                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 6BDA45E5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: InflateRectRedrawWindow
                                  • String ID:
                                  • API String ID: 3190756164-0
                                  • Opcode ID: 0aed8946b346570bbd01afe363e9b493a0c78bd5c73a73355882c11ccc576fec
                                  • Instruction ID: c79944171af6cbb6300d7e0187ac79ee0d0f215b21808443a3082bed6b07d44b
                                  • Opcode Fuzzy Hash: 0aed8946b346570bbd01afe363e9b493a0c78bd5c73a73355882c11ccc576fec
                                  • Instruction Fuzzy Hash: 14218DB151411AABCF00DFA4CC84DAE7779FB0A338B204269B521AB1E0CB75DA08CF31
                                  APIs
                                  • RedrawWindow.USER32(?,00000000,00000000,00000585,?,?,00000000,?,6BDE912F,00000002,00000000,?,?,?,6BDBEE3E), ref: 6BDE9175
                                  • RedrawWindow.USER32(?,00000000,00000000,00000585,?,00000000,?,6BDE912F,00000002,00000000,?,?,?,6BDBEE3E,?,00000000), ref: 6BDE91A2
                                  • RedrawWindow.USER32(?,00000000,00000000,00000185,?,00000000,?,6BDE912F,00000002,00000000,?,?,?,6BDBEE3E,?,00000000), ref: 6BDE91DF
                                  • RedrawWindow.USER32(?,00000000,00000000,00000585,?,?,?,?,6BDBEE3E,?,00000000), ref: 6BE04DB8
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: RedrawWindow
                                  • String ID:
                                  • API String ID: 2219533335-0
                                  • Opcode ID: 77e083bcc37383f28efd9f6b12be2491ea502fdd688870381917a3221793db97
                                  • Instruction ID: 2b11cfb1019c5e9983d17785f9b56d2b9b132039aed472dcbd72b0591bb067d8
                                  • Opcode Fuzzy Hash: 77e083bcc37383f28efd9f6b12be2491ea502fdd688870381917a3221793db97
                                  • Instruction Fuzzy Hash: FC21D632681B11EBEB250B24CC09B497371BF49B71F154194FC447F2A0DF78E8119BA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 72f8c50d17c425204a8de18f0cc9000c8f1ae1f894bbdbceb3e7d6b8092ad24d
                                  • Instruction ID: 54882979e573105d855220bc1a4ba8add48f9515b616c77aac540681a51648ab
                                  • Opcode Fuzzy Hash: 72f8c50d17c425204a8de18f0cc9000c8f1ae1f894bbdbceb3e7d6b8092ad24d
                                  • Instruction Fuzzy Hash: E321BB31A08206AF97509E75D88181F77F8FF41368F20452AF91597660EB78E812C7B0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0b0b472759bca8ca3d82ffbb3d01e24226e49f7a3a86022cfdaf6f5cfe54d87c
                                  • Instruction ID: 5f60558ff99dd6f75e07f2f8dfc92c2e046b2e0fc9679ea6410faa9b44ed663a
                                  • Opcode Fuzzy Hash: 0b0b472759bca8ca3d82ffbb3d01e24226e49f7a3a86022cfdaf6f5cfe54d87c
                                  • Instruction Fuzzy Hash: 89110A72614208BBDB201EB4DC05B4A7BEDFB82765F3101A8F512D7292E7B9D902C760
                                  APIs
                                  • DestroyMenu.USER32(?,5FCB9D08,?,?,?,Function_0019BAD0,000000FF), ref: 6BDDCF54
                                  • IsWindow.USER32(?), ref: 6BDDCF65
                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6BDDCF79
                                  • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6BDDCFD6
                                    • Part of subcall function 6BE4FED1: GetParent.USER32(00000000), ref: 6BE4FF58
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ContextExternal$BaseBase::~Concurrency::details::DestroyMenuMessageParentSendWindow
                                  • String ID:
                                  • API String ID: 3377428259-0
                                  • Opcode ID: 1b341b0af053fa901cdf634a923179b58853b688af5fe0b1ab51260b186d315a
                                  • Instruction ID: b891e3a39ca218b361e2d457ccfb0baafccdef43040e9a8b54e7d2b0b2985992
                                  • Opcode Fuzzy Hash: 1b341b0af053fa901cdf634a923179b58853b688af5fe0b1ab51260b186d315a
                                  • Instruction Fuzzy Hash: 71218D322157008BC725DF34C890BEAB7A8FF95764F10085DE4AB8B290DB79A206DB20
                                  APIs
                                  • KillTimer.USER32(?,0000EC17), ref: 6BDDC475
                                  • KillTimer.USER32(?,0000EC18), ref: 6BDDC483
                                  • IsWindow.USER32(?), ref: 6BDDC4F3
                                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 6BDDC51A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: KillTimer$MessagePostWindow
                                  • String ID:
                                  • API String ID: 3970157719-0
                                  • Opcode ID: e9bcde7bdd2aef25251867299fafd85e074e2d25e309db80837e993699350acf
                                  • Instruction ID: 2c58e14f04f8dfefcc19b9fad5973e979a1dc5beb6e5dcd98858f335287fa092
                                  • Opcode Fuzzy Hash: e9bcde7bdd2aef25251867299fafd85e074e2d25e309db80837e993699350acf
                                  • Instruction Fuzzy Hash: 10219F32710205EFEF049F64C898F5DBBB5FF89320F1401A5D9429B2A1DB74E905DB90
                                  APIs
                                  • GetClientRect.USER32 ref: 6BDDC885
                                  • PtInRect.USER32(?,?,?), ref: 6BDDC89E
                                    • Part of subcall function 6BDDA412: ScreenToClient.USER32(?,?), ref: 6BDDA42E
                                    • Part of subcall function 6BDDA412: GetParent.USER32(?), ref: 6BDDA43E
                                    • Part of subcall function 6BDDA412: GetClientRect.USER32(?,?), ref: 6BDDA4D1
                                    • Part of subcall function 6BDDA412: MapWindowPoints.USER32(?,?,?,00000002), ref: 6BDDA4E3
                                    • Part of subcall function 6BDDA412: PtInRect.USER32(?,?,?), ref: 6BDDA4F3
                                  • MapWindowPoints.USER32(?,?,?,00000001), ref: 6BDDC8D4
                                  • SendMessageW.USER32(?,00000201,?,?), ref: 6BDDC8F3
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$Client$PointsWindow$MessageParentScreenSend
                                  • String ID:
                                  • API String ID: 2689702638-0
                                  • Opcode ID: 19524cfb425d88ab6c254b21580f0c5518170b05eb6855cd08a22adc44c20038
                                  • Instruction ID: 096e5eaea67a0848afcb8f1535ce60ea37549ce2158020fef5a358021d185c9f
                                  • Opcode Fuzzy Hash: 19524cfb425d88ab6c254b21580f0c5518170b05eb6855cd08a22adc44c20038
                                  • Instruction Fuzzy Hash: 2721503591030EEBDF058F65C809EAE7BB6FF48314F10412AF85666150EB75D954DFA0
                                  APIs
                                  • BeginDeferWindowPos.USER32(?), ref: 6BDC9AC8
                                  • IsWindow.USER32(?), ref: 6BDC9AE3
                                  • DeferWindowPos.USER32(00000000,00000000,00000000,?,?,?,?,00000000), ref: 6BDC9B2C
                                  • EndDeferWindowPos.USER32(00000000), ref: 6BDC9B37
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Defer$Begin
                                  • String ID:
                                  • API String ID: 2880567340-0
                                  • Opcode ID: 440a00b3914d08be8bbb40eac04f29c521c8f707a428a0e622a5cbe4a21a0dec
                                  • Instruction ID: efe02422917af016a6d0f820a511e114f9ed2f16ed229da8cd99da5ad46408fe
                                  • Opcode Fuzzy Hash: 440a00b3914d08be8bbb40eac04f29c521c8f707a428a0e622a5cbe4a21a0dec
                                  • Instruction Fuzzy Hash: 0C113D72E00209AFDB01CFA9C844BAFBBBDFF19314F100159E502E7251DB38A950DBA1
                                  APIs
                                  • FindResourceW.KERNEL32(?,?,00000005), ref: 6BDCB18B
                                  • LoadResource.KERNEL32(?,00000000), ref: 6BDCB1A0
                                  • LockResource.KERNEL32(00000000), ref: 6BDCB1B2
                                  • GlobalFree.KERNEL32(?), ref: 6BDCB1F1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Resource$FindFreeGlobalLoadLock
                                  • String ID:
                                  • API String ID: 3898064442-0
                                  • Opcode ID: bc354de4ee250c4aca921da66a2dd201b0ebce64b3a12cee21f453f1ab7fbd38
                                  • Instruction ID: 7e13e7ff10ce51b11b974c6a9a1dceec9953b751afc9189f7027a0308a031ee7
                                  • Opcode Fuzzy Hash: bc354de4ee250c4aca921da66a2dd201b0ebce64b3a12cee21f453f1ab7fbd38
                                  • Instruction Fuzzy Hash: 3D11B632901629EBCB119F66C444B9FBBA8FF01379F0581A4EC59AB250CB78DD04DBE1
                                  APIs
                                  • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6BDAEABC
                                  • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6BDAEAE6
                                  • GetCapture.USER32 ref: 6BDAEAFC
                                  • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6BDAEB0B
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: MessageSend$Capture
                                  • String ID:
                                  • API String ID: 1665607226-0
                                  • Opcode ID: 134e0965d94aa90335881237e1c7a8a1260629de8c757dbd84c3abbbe37b3022
                                  • Instruction ID: d52587dc9c6ac24fed18428481acfebc971e5075a5844532669d6669704a02a3
                                  • Opcode Fuzzy Hash: 134e0965d94aa90335881237e1c7a8a1260629de8c757dbd84c3abbbe37b3022
                                  • Instruction Fuzzy Hash: BA115272320619BFEA211B30CCCDF7E766DFB49794F040064F606AB6E5DB559C01D660
                                  APIs
                                  • GetCursorPos.USER32(00000000), ref: 6BDB1E03
                                  • GetWindowRect.USER32(?,?), ref: 6BDB1E1F
                                  • PtInRect.USER32(?,00000000,00000000), ref: 6BDB1E2F
                                  • CallNextHookEx.USER32(?,?,?), ref: 6BDB1E57
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$CallCursorHookNextWindow
                                  • String ID:
                                  • API String ID: 3719484595-0
                                  • Opcode ID: 4565d797fe2a4689d378a7f1319f2a6f14570fb32ddeabae7288f7b116e7fade
                                  • Instruction ID: d28677ffa75fed40ea7df9527149d87118f7ae4fd39bde66f552795997119e43
                                  • Opcode Fuzzy Hash: 4565d797fe2a4689d378a7f1319f2a6f14570fb32ddeabae7288f7b116e7fade
                                  • Instruction Fuzzy Hash: 28215C72D2012ADBCF01CFA4C908BAE7BB4EF16325F1041A9E516EA060D738D6449B50
                                  APIs
                                  • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004,?,00000000), ref: 6BDBA356
                                  • RegCloseKey.ADVAPI32(00000000), ref: 6BDBA35F
                                  • swprintf.LIBCMT ref: 6BDBA37C
                                  • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 6BDBA38D
                                    • Part of subcall function 6BDBA899: RegCloseKey.ADVAPI32(00000000,?,?,?,?,6BDBA2C8,?,00000000), ref: 6BDBA8DE
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Close$PrivateProfileStringValueWriteswprintf
                                  • String ID:
                                  • API String ID: 581541481-0
                                  • Opcode ID: 84b928e24a0e823cb89b1563f0b926eba90c10a77b853cbc01ebcd4fac99d450
                                  • Instruction ID: 99d9cb65b5c8c3e0b8096d916dd948c7d972ef94ac4379b6320a82bf7afddbd4
                                  • Opcode Fuzzy Hash: 84b928e24a0e823cb89b1563f0b926eba90c10a77b853cbc01ebcd4fac99d450
                                  • Instruction Fuzzy Hash: 6B0161B3500708BBDB119B64CC45FAE77ACEF49714F11046AF602AB150DBB9ED1487A0
                                  APIs
                                  • GetObjectW.GDI32(?,0000000C,?), ref: 6BDAE729
                                  • SetBkColor.GDI32(?,?), ref: 6BDAE733
                                  • GetSysColor.USER32(00000008), ref: 6BDAE743
                                  • SetTextColor.GDI32(?,?), ref: 6BDAE74B
                                    • Part of subcall function 6BDBFD47: GetWindowLongW.USER32(?,000000F0), ref: 6BDBFD62
                                    • Part of subcall function 6BDBFD47: GetClassNameW.USER32(?,?,0000000A), ref: 6BDBFD77
                                    • Part of subcall function 6BDBFD47: CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,combobox,000000FF,?,?,?,?,?,?,?,?,?,6BDA75A6), ref: 6BDBFD8E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Color$ClassCompareLongNameObjectStringTextWindow
                                  • String ID:
                                  • API String ID: 3274569906-0
                                  • Opcode ID: 54b97acbf49e569072143e559055bec4d19de3883b19b06eb37a0fc14261a48f
                                  • Instruction ID: 8bcb85e77f9a0b052cef91acaf50e6f1daf5d34d831f6bbea6dc2319cbe2afe5
                                  • Opcode Fuzzy Hash: 54b97acbf49e569072143e559055bec4d19de3883b19b06eb37a0fc14261a48f
                                  • Instruction Fuzzy Hash: D9018C36620108EBDB109FB8C844EAF77B9EF0A720F604555F922DA190DB38E906D7B5
                                  APIs
                                  • SetActiveWindow.USER32(?), ref: 6BDB4FE4
                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 6BDB4FF7
                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 6BDB5025
                                  • DragFinish.SHELL32(?), ref: 6BDB505A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Drag$FileQuery$ActiveFinishWindow
                                  • String ID:
                                  • API String ID: 892977027-0
                                  • Opcode ID: dcc028d4fb6798a8f706f1b2b654dcc119e494a74ee1a9fcbfbf46c364050cac
                                  • Instruction ID: 14d18a0846e534c5882062c060f644f68697974f1529c00883988b8d85c531ea
                                  • Opcode Fuzzy Hash: dcc028d4fb6798a8f706f1b2b654dcc119e494a74ee1a9fcbfbf46c364050cac
                                  • Instruction Fuzzy Hash: 8A1121B55102189BCB10DB35CC8CE9E7BB8FF99714F0045A9E51AA7251CB749E45CFA0
                                  APIs
                                  • CreateThread.KERNEL32(00000000,?,6BEEF1E4,00000000,00000004,00000000), ref: 6BEEF108
                                  • GetLastError.KERNEL32(?,?,?,6BE38E73,6BE38EC3,00000000,00000000,?,00000000,?,6BDD1275,00000001,00000000,?,?,6BDD0F0B), ref: 6BEEF114
                                  • __dosmaperr.LIBCMT ref: 6BEEF11B
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CreateErrorLastThread__dosmaperr
                                  • String ID:
                                  • API String ID: 2744730728-0
                                  • Opcode ID: 48c9655399834c42621139551c6bd4e53bdfd249f4f0cac795c32b7dcb798f71
                                  • Instruction ID: 383fea6a329731e8f912981f6c0b075ee9f3ef3334103f6d8dc1de1100ac6a2b
                                  • Opcode Fuzzy Hash: 48c9655399834c42621139551c6bd4e53bdfd249f4f0cac795c32b7dcb798f71
                                  • Instruction Fuzzy Hash: 1B01D672400608BBEB008BA4EC05B9E7BB9EF82779F304258F525921D0DB7CC502D7B0
                                  APIs
                                  • GetDlgCtrlID.USER32(?), ref: 6BDA6B18
                                  • GetScrollPos.USER32(?,00000002), ref: 6BDA6B2B
                                  • SendMessageW.USER32(?,00000115,?,?), ref: 6BDA6B65
                                  • SetScrollPos.USER32(?,00000002,?,00000000), ref: 6BDA6B83
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Scroll$CtrlMessageSend
                                  • String ID:
                                  • API String ID: 1219558039-0
                                  • Opcode ID: 4eff0b1a90a056b2181690c3be9fa28ec65ba3639ccaa0381eb6bc421e5f9861
                                  • Instruction ID: abb7c8bc8407f76dcf3b018dd3af15e62a22e87fa3b601b0de7c8081b4efb909
                                  • Opcode Fuzzy Hash: 4eff0b1a90a056b2181690c3be9fa28ec65ba3639ccaa0381eb6bc421e5f9861
                                  • Instruction Fuzzy Hash: BD117C72610214EFDB118FA9CC49EAE7BB5FB49350F000569F9469B1A1E7709810DB60
                                  APIs
                                  • GetDlgCtrlID.USER32(?), ref: 6BDA6A87
                                  • GetScrollPos.USER32(?,00000002), ref: 6BDA6A9A
                                  • SendMessageW.USER32(?,00000114,?,?), ref: 6BDA6AD4
                                  • SetScrollPos.USER32(?,00000002,?,00000000), ref: 6BDA6AF2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Scroll$CtrlMessageSend
                                  • String ID:
                                  • API String ID: 1219558039-0
                                  • Opcode ID: e19465d9044087c20b7959a9cc35a7bc531b91b3c2a571c96d1f3e80f4ae6196
                                  • Instruction ID: 4ecc0b3be917e5d9ac02a9675c2310878aea1383fc4604eb0b595e73d2cb48be
                                  • Opcode Fuzzy Hash: e19465d9044087c20b7959a9cc35a7bc531b91b3c2a571c96d1f3e80f4ae6196
                                  • Instruction Fuzzy Hash: 50118E72610214EFEB018FA8CC89EAE7BB5FB49354F014469F9469B161D6709C10DB60
                                  APIs
                                  • InflateRect.USER32(?,00000002,00000002), ref: 6BDD3F8F
                                  • InvalidateRect.USER32(?,?,00000001), ref: 6BDD3FA3
                                  • UpdateWindow.USER32(?), ref: 6BDD3FAC
                                  • SetRectEmpty.USER32(?), ref: 6BDD3FB3
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Rect$EmptyInflateInvalidateUpdateWindow
                                  • String ID:
                                  • API String ID: 3040190709-0
                                  • Opcode ID: 3edf52a75fd74870e98965c01ba9c5b28fb17f4eeaa829202d564f82a28b2d02
                                  • Instruction ID: 543279cfd8dfc4a035628af479108ec3137bfea8ec7f404e872fac607a2398ab
                                  • Opcode Fuzzy Hash: 3edf52a75fd74870e98965c01ba9c5b28fb17f4eeaa829202d564f82a28b2d02
                                  • Instruction Fuzzy Hash: 0C018472500209DFDB10DF68C889F9B7BF4FB4A324F510669E557E71A1D7709908CB50
                                  APIs
                                  • GetMenuItemCount.USER32(00000000), ref: 6BDA1342
                                  • GetSubMenu.USER32(00000000,-00000001), ref: 6BDA1351
                                  • GetMenuItemCount.USER32(00000000), ref: 6BDA135E
                                  • GetMenuItemID.USER32(00000000,00000000), ref: 6BDA1374
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Menu$Item$Count
                                  • String ID:
                                  • API String ID: 879546783-0
                                  • Opcode ID: 5a61782195e50bd36078d739e0b6a4e63148f0dd3c2fe89dbf3ab4915d91f6fc
                                  • Instruction ID: ff227685aac83a3803bbbb71abd4d336b49446b8d876dd728c4d4d1cb9278af7
                                  • Opcode Fuzzy Hash: 5a61782195e50bd36078d739e0b6a4e63148f0dd3c2fe89dbf3ab4915d91f6fc
                                  • Instruction Fuzzy Hash: 5C016271A10B25FFDB01EF64CD9479E7EA9DB06361F114464F846EA610D739CE809690
                                  APIs
                                  • GetKeyboardState.USER32(?), ref: 6BDF0E05
                                  • GetKeyboardLayout.USER32(?), ref: 6BDF0E2B
                                  • MapVirtualKeyW.USER32(00000000,00000000), ref: 6BDF0E38
                                  • ToUnicodeEx.USER32(00000000,00000000,?,?,00000002,00000000,00000000), ref: 6BDF0E55
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Keyboard$LayoutStateUnicodeVirtual
                                  • String ID:
                                  • API String ID: 961187839-0
                                  • Opcode ID: 3c1e426524607c33bd5fb99af8d166b218a4b8bf1e200862c356c0bfb711886f
                                  • Instruction ID: bc58cb4d8ddb9c128319b9ea8623dea8672114b6e43f5c25ef59fe6bf80b7469
                                  • Opcode Fuzzy Hash: 3c1e426524607c33bd5fb99af8d166b218a4b8bf1e200862c356c0bfb711886f
                                  • Instruction Fuzzy Hash: 2501B576A10108ABDB149F70DC0AFDA7B68EF15310F0000A9B647EA190DBB4DA84CBA4
                                  APIs
                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 6BDA1E60
                                  • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 6BDA1E6F
                                  • IsWindow.USER32(00000000), ref: 6BDA1E80
                                  • SetWindowLongW.USER32(00000000,000000F0,?), ref: 6BDA1E90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Long
                                  • String ID:
                                  • API String ID: 847901565-0
                                  • Opcode ID: f5208816e3b9ec597ae67f9233b4cc0bafcb80a17989b645c1ebcbc603c03c95
                                  • Instruction ID: 1c5e15cd395cff63c3c6ea1c744d164310d393c9ed798f2b1dbb80faf488d949
                                  • Opcode Fuzzy Hash: f5208816e3b9ec597ae67f9233b4cc0bafcb80a17989b645c1ebcbc603c03c95
                                  • Instruction Fuzzy Hash: 9B01A232618124AFDF005B74CC48B7E3668EB87734B100368E822DA2D1DB68D9019651
                                  APIs
                                  • GetTopWindow.USER32(?), ref: 6BDAE975
                                  • GetTopWindow.USER32(00000000), ref: 6BDAE9B8
                                  • GetWindow.USER32(00000000,00000002), ref: 6BDAE9DA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window
                                  • String ID:
                                  • API String ID: 2353593579-0
                                  • Opcode ID: 4f9cf12e8663731b38d8a64802543fea1ffe0cb955ef1db5c3d6a65337608e3b
                                  • Instruction ID: c48c4ecc8279fec2db1584a94e3c8d5f2be5693d8821afd950986a8525ba1b66
                                  • Opcode Fuzzy Hash: 4f9cf12e8663731b38d8a64802543fea1ffe0cb955ef1db5c3d6a65337608e3b
                                  • Instruction Fuzzy Hash: 27010832011629FBCF425FA1CC49EDE3B26AF0A360F104055FA5559060C73AC661EBA5
                                  APIs
                                  • GetDlgItem.USER32(?,00000001), ref: 6BDAE901
                                  • GetTopWindow.USER32(00000000), ref: 6BDAE90E
                                    • Part of subcall function 6BDAE8F7: GetWindow.USER32(00000000,00000002), ref: 6BDAE95D
                                  • GetTopWindow.USER32(?), ref: 6BDAE942
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$Item
                                  • String ID:
                                  • API String ID: 369458955-0
                                  • Opcode ID: 651e1f4f6971c02d9141d5a865650c5e90ec07069e4a64fc86f2ff127bc4ba47
                                  • Instruction ID: b6cde94a587d4fdb6bc62dbc8900edde01271a16a45a8d696f2494178736aec8
                                  • Opcode Fuzzy Hash: 651e1f4f6971c02d9141d5a865650c5e90ec07069e4a64fc86f2ff127bc4ba47
                                  • Instruction Fuzzy Hash: DF014B32461726F7DB521F70CC48B8E7B69AF1A7B0F104155FD45AD010E73DC651E6A2
                                  APIs
                                  • GetParent.USER32(?), ref: 6BDBBADC
                                  • GetParent.USER32(?), ref: 6BDBBAEF
                                  • GetParent.USER32(?), ref: 6BDBBB09
                                  • SetFocus.USER32(?,00000000,?,?,6BDB4C3F,?,6BD71906), ref: 6BDBBB22
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Parent$Focus
                                  • String ID:
                                  • API String ID: 384096180-0
                                  • Opcode ID: 8103b7ba2db7810fdd8a3432751a0058c5803e6e9bae28ee182083caa49dfee1
                                  • Instruction ID: 9d04da78685c8cf18646e42bde03c0406e9b25b40f3fb0ae652314230255cfc9
                                  • Opcode Fuzzy Hash: 8103b7ba2db7810fdd8a3432751a0058c5803e6e9bae28ee182083caa49dfee1
                                  • Instruction Fuzzy Hash: ADF08C72A20600DBCE052B74C98CA1EBAA9FF957217000568E997DB1B0EF38E901CB20
                                  APIs
                                  • WriteConsoleW.KERNEL32(00000000,6BEFF9BC,00000000,00000000,00000000,?,6BF091F0,00000000,00000001,00000000,?,?,6BF01D26,?,00000000,00000000), ref: 6BF0A220
                                  • GetLastError.KERNEL32(?,6BF091F0,00000000,00000001,00000000,?,?,6BF01D26,?,00000000,00000000,?,?,?,6BF0166C,?), ref: 6BF0A22C
                                    • Part of subcall function 6BF0A27D: CloseHandle.KERNEL32(FFFFFFFE,6BF0A23C,?,6BF091F0,00000000,00000001,00000000,?,?,6BF01D26,?,00000000,00000000,?,?), ref: 6BF0A28D
                                  • ___initconout.LIBCMT ref: 6BF0A23C
                                    • Part of subcall function 6BF0A25E: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6BF0A1FA,6BF091DD,?,?,6BF01D26,?,00000000,00000000,?), ref: 6BF0A271
                                  • WriteConsoleW.KERNEL32(00000000,6BEFF9BC,00000000,00000000,?,6BF091F0,00000000,00000001,00000000,?,?,6BF01D26,?,00000000,00000000,?), ref: 6BF0A251
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                  • String ID:
                                  • API String ID: 2744216297-0
                                  • Opcode ID: 4dd1aa75a0fee18b3cd61b4aebe0a711c19ac20867752032310d42984c3ff9a0
                                  • Instruction ID: 12b86186c2dfddb93c0e28a008a1fc7eb16f83f46a52526a42d1e068329a46be
                                  • Opcode Fuzzy Hash: 4dd1aa75a0fee18b3cd61b4aebe0a711c19ac20867752032310d42984c3ff9a0
                                  • Instruction Fuzzy Hash: 22F0F837450129BBCF121EA19C08A893F66FF4A3A0B144470FE1A86530CB33C960EB91
                                  APIs
                                  • PeekConsoleInputA.KERNEL32(?,?,6BF6F740,00000000,?,6BEF144A,00000000,0000000C,6BF6F740,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFAD2
                                  • GetLastError.KERNEL32(?,6BEF144A,00000000,0000000C,6BF6F740,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFADE
                                    • Part of subcall function 6BEFFBBA: CloseHandle.KERNEL32(FFFFFFFF,6BEFFAA2,?,?,6BEF13E0,0000000C,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFBCA
                                  • ___initconin.LIBCMT ref: 6BEFFAEE
                                    • Part of subcall function 6BEFFB9B: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6BEFFA16,6BEF13CF,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFBAE
                                  • PeekConsoleInputA.KERNEL32(?,?,6BF6F740,?,6BEF144A,00000000,0000000C,6BF6F740,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFB02
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ConsoleInputPeek$CloseCreateErrorFileHandleLast___initconin
                                  • String ID:
                                  • API String ID: 1545762386-0
                                  • Opcode ID: 17d521ae68f1a26aedc8be1498022d8c7cd69e320bc7e5fe8d33483f49e1e25a
                                  • Instruction ID: dc6a57c949cfda76393798c31145903bfbc9039fc3fc9d079e16ca24835e12c2
                                  • Opcode Fuzzy Hash: 17d521ae68f1a26aedc8be1498022d8c7cd69e320bc7e5fe8d33483f49e1e25a
                                  • Instruction Fuzzy Hash: 4DF06537811129BB8F221FE1DC189893F6AFB5A3E1B144594FE0991530C736C921EBC0
                                  APIs
                                  • ReadConsoleInputW.KERNEL32(0000000C,6BF6F760,6BEF1148,00000000,?,6BEF11CC,?,00000001,?,6BF6F780,00000038,6BEF1148,6BF6F760,0000000C,6BD74C92), ref: 6BEFFA3A
                                  • GetLastError.KERNEL32(?,6BEF11CC,?,00000001,?,6BF6F780,00000038,6BEF1148,6BF6F760,0000000C,6BD74C92), ref: 6BEFFA46
                                    • Part of subcall function 6BEFFBBA: CloseHandle.KERNEL32(FFFFFFFF,6BEFFAA2,?,?,6BEF13E0,0000000C,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFBCA
                                  • ___initconin.LIBCMT ref: 6BEFFA56
                                    • Part of subcall function 6BEFFB9B: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6BEFFA16,6BEF13CF,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFBAE
                                  • ReadConsoleInputW.KERNEL32(0000000C,6BF6F760,6BEF1148,?,6BEF11CC,?,00000001,?,6BF6F780,00000038,6BEF1148,6BF6F760,0000000C,6BD74C92), ref: 6BEFFA6A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ConsoleInputRead$CloseCreateErrorFileHandleLast___initconin
                                  • String ID:
                                  • API String ID: 838051604-0
                                  • Opcode ID: 8078de575d37f6ff07ef51d10f2752e1cb654390156a7027365d7b746d72d69d
                                  • Instruction ID: 7b34798355a182a050bb7cec6faefcfd0aa995f81672944e48520edd666efc53
                                  • Opcode Fuzzy Hash: 8078de575d37f6ff07ef51d10f2752e1cb654390156a7027365d7b746d72d69d
                                  • Instruction Fuzzy Hash: E5F06537811128BB8F121FD1DC08D893F6AFB4A3E0B544154FE0991130D736C921EBD1
                                  APIs
                                    • Part of subcall function 6BDBBA35: ShowWindow.USER32(?,00000000,?,?,6BDB921A,00000000), ref: 6BDBBA46
                                  • UpdateWindow.USER32(?), ref: 6BED9A18
                                  • UpdateWindow.USER32(?), ref: 6BED9A2B
                                  • SetRectEmpty.USER32(?), ref: 6BED9A38
                                  • SetRectEmpty.USER32(?), ref: 6BED9A45
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Window$EmptyRectUpdate$Show
                                  • String ID:
                                  • API String ID: 1262231214-0
                                  • Opcode ID: 8254323d0f450473e22ee635d40f73d1dd65b0fac2702aba64b667c19a458b89
                                  • Instruction ID: 12e5484defd3cff5fdd8bf195b7c73b2b0fb0b1645b8f2820aaf20cfc9e45580
                                  • Opcode Fuzzy Hash: 8254323d0f450473e22ee635d40f73d1dd65b0fac2702aba64b667c19a458b89
                                  • Instruction Fuzzy Hash: D3F01C72220615CFEB109F70C958BD67BE8FF15309F118899E4AED61A1CB74E809CF10
                                  APIs
                                  • GetSystemTimeAsFileTime.KERNEL32(00000001), ref: 6BEE1CD3
                                  • GetCurrentThreadId.KERNEL32 ref: 6BEE1CE2
                                  • GetCurrentProcessId.KERNEL32 ref: 6BEE1CEB
                                  • QueryPerformanceCounter.KERNEL32(?), ref: 6BEE1CF8
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                  • String ID:
                                  • API String ID: 2933794660-0
                                  • Opcode ID: 644e3d06fe70a46618a2933c411b66240c04a0240638863c5ab20caa7a3a4b9f
                                  • Instruction ID: 9203dfa4363dab6eb4c312863d17c3bb79e222be4b48d58d4a1f23c32dc4ed50
                                  • Opcode Fuzzy Hash: 644e3d06fe70a46618a2933c411b66240c04a0240638863c5ab20caa7a3a4b9f
                                  • Instruction Fuzzy Hash: B6F05F75D1020DEBCF00DBB4C549A9EBBF8FF2D205B914995E412E7110E730EA48DB50
                                  APIs
                                  • SetConsoleMode.KERNEL32(0000000C,00000000,?,6BEF11B3,00000000,6BD74C92,6BF6F780,00000038,6BEF1148,6BF6F760,0000000C,6BD74C92), ref: 6BEFFB64
                                  • GetLastError.KERNEL32(?,6BEF11B3,00000000,6BD74C92,6BF6F780,00000038,6BEF1148,6BF6F760,0000000C,6BD74C92), ref: 6BEFFB70
                                    • Part of subcall function 6BEFFBBA: CloseHandle.KERNEL32(FFFFFFFF,6BEFFAA2,?,?,6BEF13E0,0000000C,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFBCA
                                  • ___initconin.LIBCMT ref: 6BEFFB80
                                    • Part of subcall function 6BEFFB9B: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6BEFFA16,6BEF13CF,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFBAE
                                  • SetConsoleMode.KERNEL32(0000000C,?,6BEF11B3,00000000,6BD74C92,6BF6F780,00000038,6BEF1148,6BF6F760,0000000C,6BD74C92), ref: 6BEFFB8E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ConsoleMode$CloseCreateErrorFileHandleLast___initconin
                                  • String ID:
                                  • API String ID: 3067319862-0
                                  • Opcode ID: 3892007554a46aae14fdcd18c2ecc6b340d6de64e7b63ac85e30f4291716141e
                                  • Instruction ID: a7a414bba6b8e08b653fb97b9b4b46e32961c0c99edd33df84480c2c129d82cb
                                  • Opcode Fuzzy Hash: 3892007554a46aae14fdcd18c2ecc6b340d6de64e7b63ac85e30f4291716141e
                                  • Instruction Fuzzy Hash: 9EE04F378221246B8F211BA5D8189493F2AFB567E571401A4F90A92630DB2ACD15D7D0
                                  APIs
                                  • GetConsoleMode.KERNEL32(0000000C,?,?,6BEF11AB,6BD74C92,6BF6F780,00000038,6BEF1148,6BF6F760,0000000C,6BD74C92), ref: 6BEFFB1E
                                  • GetLastError.KERNEL32(?,?,6BEF11AB,6BD74C92,6BF6F780,00000038,6BEF1148,6BF6F760,0000000C,6BD74C92), ref: 6BEFFB2A
                                    • Part of subcall function 6BEFFBBA: CloseHandle.KERNEL32(FFFFFFFF,6BEFFAA2,?,?,6BEF13E0,0000000C,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFBCA
                                  • ___initconin.LIBCMT ref: 6BEFFB3A
                                    • Part of subcall function 6BEFFB9B: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6BEFFA16,6BEF13CF,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFBAE
                                  • GetConsoleMode.KERNEL32(0000000C,?,?,6BEF11AB,6BD74C92,6BF6F780,00000038,6BEF1148,6BF6F760,0000000C,6BD74C92), ref: 6BEFFB48
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ConsoleMode$CloseCreateErrorFileHandleLast___initconin
                                  • String ID:
                                  • API String ID: 3067319862-0
                                  • Opcode ID: 0b0564270855f228413e2bc39f9d9cb76ef6c6e6f313b543468dd64dd83802d0
                                  • Instruction ID: 7530cf765ddc43eec96f244f00a0702c0f3229d724b9b090346ec2b714f77ae9
                                  • Opcode Fuzzy Hash: 0b0564270855f228413e2bc39f9d9cb76ef6c6e6f313b543468dd64dd83802d0
                                  • Instruction Fuzzy Hash: 9DE086338211256B8F111BA5EC289493F2DFB6B3E5B1401A4F90ED2730DB2ACD15E7D0
                                  APIs
                                  • GetNumberOfConsoleInputEvents.KERNEL32(?,?,?,6BEF13E0,0000000C,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFA86
                                  • GetLastError.KERNEL32(?,?,6BEF13E0,0000000C,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFA92
                                    • Part of subcall function 6BEFFBBA: CloseHandle.KERNEL32(FFFFFFFF,6BEFFAA2,?,?,6BEF13E0,0000000C,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFBCA
                                  • ___initconin.LIBCMT ref: 6BEFFAA2
                                    • Part of subcall function 6BEFFB9B: CreateFileW.KERNEL32(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6BEFFA16,6BEF13CF,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFBAE
                                  • GetNumberOfConsoleInputEvents.KERNEL32(?,?,?,6BEF13E0,0000000C,?,?,?,6BEF10F8,6BF6F740,0000000C,6BD74C7E), ref: 6BEFFAB0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ConsoleEventsInputNumber$CloseCreateErrorFileHandleLast___initconin
                                  • String ID:
                                  • API String ID: 1600138625-0
                                  • Opcode ID: e77fecbc1aeb847f0be2692d0c9209bb80cb478f9ec6ca1b3f0b1d7c86aa3e95
                                  • Instruction ID: ce9455fd96e592dd259d577927d5f68ff9bdd7cc32a95ab389ac273b61b8a2de
                                  • Opcode Fuzzy Hash: e77fecbc1aeb847f0be2692d0c9209bb80cb478f9ec6ca1b3f0b1d7c86aa3e95
                                  • Instruction Fuzzy Hash: 09E0DF37811134AB8F111BA9E8089883F2DEB463E071001A1FE0AD2630CB3ACC12D7C0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: EmptyRect
                                  • String ID:
                                  • API String ID: 2270935405-0
                                  • Opcode ID: db349149e4819bce21a42b52a98d61c9b56a0c46f9f701f376d5ec7bdef48a8b
                                  • Instruction ID: dc6592d7d79a5fe34c83c99c56f1f35c8651d0835ab24765c1c118c3cc1ba21e
                                  • Opcode Fuzzy Hash: db349149e4819bce21a42b52a98d61c9b56a0c46f9f701f376d5ec7bdef48a8b
                                  • Instruction Fuzzy Hash: 1CE0A5724246668BDB20EFB1D54CA9677ECEB15319B40085AE18782525DB78E1898B50
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: __aulldiv
                                  • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                  • API String ID: 3732870572-1956417402
                                  • Opcode ID: a037ca8574d8b11c1f57732a981071743119fd89ddd0670c2d1eb931ae7ee3bf
                                  • Instruction ID: 33e9d77a96cf220a86a34db61cb8cff8e716cf655afa349335c203605aa0ef91
                                  • Opcode Fuzzy Hash: a037ca8574d8b11c1f57732a981071743119fd89ddd0670c2d1eb931ae7ee3bf
                                  • Instruction Fuzzy Hash: 5161C6B0E44249DFEF15CFB988807AEBBF9BF49721F184099D4929F240D37C89428B64
                                  APIs
                                    • Part of subcall function 6BEF91E3: GetLastError.KERNEL32(?,?,6BEF5D32,?,6BD75477), ref: 6BEF91E7
                                    • Part of subcall function 6BEF91E3: SetLastError.KERNEL32(00000000,?,6BD75477), ref: 6BEF9289
                                  • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,6BEF9B18,?,?,?,00000055,?,-00000050,?,?,?), ref: 6BF04D98
                                  • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,6BEF9B18,?,?,?,00000055,?,-00000050,?,?), ref: 6BF04DCF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CodePageValid
                                  • String ID: utf8
                                  • API String ID: 943130320-905460609
                                  • Opcode ID: e55225b6e1dac34fb8bb86ebdb0180af545aeddd1c5bf266cc7d2b807816a06f
                                  • Instruction ID: 6f62504f99d2660cbe6e5174c2c0a31d6011a8db1b1ddc472bf4b0f74c3136fc
                                  • Opcode Fuzzy Hash: e55225b6e1dac34fb8bb86ebdb0180af545aeddd1c5bf266cc7d2b807816a06f
                                  • Instruction Fuzzy Hash: D5515833A00706AAF7159F74CCA2BAB73B8EF25704F1004A9E515975B0FF7CE641A6A1
                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 6BDC8127
                                  • CoCreateGuid.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,00000028), ref: 6BDC8182
                                  Strings
                                  • %08lX%04X%04x%02X%02X%02X%02X%02X%02X%02X%02X, xrefs: 6BDC81CC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CreateGuidH_prolog3_
                                  • String ID: %08lX%04X%04x%02X%02X%02X%02X%02X%02X%02X%02X
                                  • API String ID: 2971167768-1017209998
                                  • Opcode ID: 1455353262ea3572707323a4e581aac8c4d7a576e5b3f0b8ddc865c177f297bf
                                  • Instruction ID: ae0cd26a0492bc9e877864a16fa5227441f81a9d6b12a96320a00db566233c35
                                  • Opcode Fuzzy Hash: 1455353262ea3572707323a4e581aac8c4d7a576e5b3f0b8ddc865c177f297bf
                                  • Instruction Fuzzy Hash: A6418C72901159AECF01DBB8C851AFEBBF9AF09228F140459E541BB291DB3D9F05CB70
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 6BE1DE27
                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,?,00000008,6BDD0217,?,MFCToolBars,?,000000A8), ref: 6BE1DF72
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: H_prolog3QueryValue
                                  • String ID: SOFTWARE\
                                  • API String ID: 2373586757-3302998844
                                  • Opcode ID: 0abca2fc89323b39a3e78a1dbb7a49c0a16ca07b8daee7c893496d6c1d1dc6bb
                                  • Instruction ID: 3cbd5e0b0f5cf1b558bc6e808952f38d27b1b78a0c54c658b3231956226b8e54
                                  • Opcode Fuzzy Hash: 0abca2fc89323b39a3e78a1dbb7a49c0a16ca07b8daee7c893496d6c1d1dc6bb
                                  • Instruction Fuzzy Hash: 91317EB2600105EBDF059B70DC86E7EB76AEF4432CB208049F8255E2A1DB7D9F51DB61
                                  APIs
                                  • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,6BEF8914,?,?,00000000,00000000,00000000,?), ref: 6BEF8A38
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: EncodePointer
                                  • String ID: MOC$RCC
                                  • API String ID: 2118026453-2084237596
                                  • Opcode ID: 3acbfa30504a03bfb71d9ebe419571733c2ee35b119796da3cd596fd7cc8d3ae
                                  • Instruction ID: 22c64e10bee64021f80e17d77a1b278bca520618ae2852ee02eeb0878c6a6474
                                  • Opcode Fuzzy Hash: 3acbfa30504a03bfb71d9ebe419571733c2ee35b119796da3cd596fd7cc8d3ae
                                  • Instruction Fuzzy Hash: FA413971900109EFDF06CFA5CC81AAE7BB9FF48348F248199E91866225D339D962DB51
                                  APIs
                                  • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6BDA9B38
                                  • PathFindExtensionW.SHLWAPI(?,?), ref: 6BDA9B4E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ExtensionFileFindModuleNamePath
                                  • String ID: %Ts%Ts.dll
                                  • API String ID: 2295281026-1896370695
                                  • Opcode ID: f5542d64e203ce7f1be291cb526b9bb43e7440ba81fc6715aaeb63adae871331
                                  • Instruction ID: 744163ea22c3bd8d3193219a46109ea4a1d7040c6588d962cc31804caf549830
                                  • Opcode Fuzzy Hash: f5542d64e203ce7f1be291cb526b9bb43e7440ba81fc6715aaeb63adae871331
                                  • Instruction Fuzzy Hash: 8731E932600115ABDB00DF78D8C49ABB7B9EF45724B0141A6E416DF285DB7EE905D7E0
                                  APIs
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 6BEF84F6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: ___except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3493665558-3733052814
                                  • Opcode ID: fd74f6dd186f638bae46260a9b99f9753d06b56a9dbfc132a1503fd87401d176
                                  • Instruction ID: ba286e2696b846af200541b2a5db542386a34475895f31055133d08f01d2d98e
                                  • Opcode Fuzzy Hash: fd74f6dd186f638bae46260a9b99f9753d06b56a9dbfc132a1503fd87401d176
                                  • Instruction Fuzzy Hash: B431B772900618DBCF124F92DC4199A7B6EFF0975DB2442DAFC5449211E33AD9B3DB82
                                  APIs
                                    • Part of subcall function 6BDBA899: RegCloseKey.ADVAPI32(00000000,?,?,?,?,6BDBA2C8,?,00000000), ref: 6BDBA8DE
                                  • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000003,?,?,?,00000000), ref: 6BDBA728
                                  • RegCloseKey.ADVAPI32(00000000), ref: 6BDBA731
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: Close$Value
                                  • String ID: A
                                  • API String ID: 299128501-3554254475
                                  • Opcode ID: a8cff879101f8cb0988364b999e670b49a982fb9be0ef96a303cbb775db3f9a3
                                  • Instruction ID: 19fa1dc6d71a361ca2deee637e6c89bea07e41250718f196ef2838264222f47a
                                  • Opcode Fuzzy Hash: a8cff879101f8cb0988364b999e670b49a982fb9be0ef96a303cbb775db3f9a3
                                  • Instruction Fuzzy Hash: 96210376500225BBCB158F68DC45AAE7BB9EF49770F10406AF815DB250EF3ACD42D7A0
                                  APIs
                                  • GetMonitorInfoW.USER32(?,?), ref: 6BDBF0AC
                                  • CopyRect.USER32(?,?), ref: 6BDBF0BE
                                    • Part of subcall function 6BDA0447: __EH_prolog3.LIBCMT ref: 6BDA044E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CopyH_prolog3InfoMonitorRect
                                  • String ID: (
                                  • API String ID: 76778085-3887548279
                                  • Opcode ID: 99b591da443f3980509e0207f93360bd450fac970e5adfde6dd74294c479e337
                                  • Instruction ID: bbe2d4a942ab2ed7d6e4869275e6812c93a1076924fc81a0a72228370e68796a
                                  • Opcode Fuzzy Hash: 99b591da443f3980509e0207f93360bd450fac970e5adfde6dd74294c479e337
                                  • Instruction Fuzzy Hash: 9C212C71900609EFCB10DFB8D545A9EB7F4FF08324B10886DE496E7250D774EA44DB61
                                  APIs
                                  • GetSysColor.USER32(00000014), ref: 6BDBEFB0
                                  • CreateDIBitmap.GDI32(?,00000028,00000004,?,00000028,00000000), ref: 6BDBF029
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: BitmapColorCreate
                                  • String ID: (
                                  • API String ID: 2048008349-3887548279
                                  • Opcode ID: c60265af7aead4e29a680c6261404093aecb7f4beeff21b71c6a2d0f6d219dc1
                                  • Instruction ID: ee7f0d1858585f21ffa8a84eb698c8ae9e4ef495ece5a3ff35f3f13da779e39d
                                  • Opcode Fuzzy Hash: c60265af7aead4e29a680c6261404093aecb7f4beeff21b71c6a2d0f6d219dc1
                                  • Instruction Fuzzy Hash: 8D21843191128C9ADF01CBB888527DCB7B4BF19304F50C16AD945FB151DB74AA48D764
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: EmptyH_prolog3_Rect
                                  • String ID: Afx:ToolBar
                                  • API String ID: 2941628838-177727192
                                  • Opcode ID: 789ab78d506a6e91a30c8ee646910c59c046204de37ac0df54a0b86ac63df7b0
                                  • Instruction ID: 4ca66d081b6c56be9337479246f970669bc7f7242a762ed171f4e58c5c7dfc53
                                  • Opcode Fuzzy Hash: 789ab78d506a6e91a30c8ee646910c59c046204de37ac0df54a0b86ac63df7b0
                                  • Instruction Fuzzy Hash: 8A21A172A101189BCF08CF78C996AED7BA1AF08324F04022DF816EB290DB789D508B74
                                  APIs
                                  • SetFileAttributesA.KERNEL32 ref: 6BD91AE3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID: "$@
                                  • API String ID: 3188754299-1136454570
                                  • Opcode ID: c16c029c306b286dc68ea53672381cf4822dc7fac54dfe922ac6785f7a3e02bc
                                  • Instruction ID: 918ecc8400559e12aa23b36147bb4e6a6374fc774eb5b1cbe4f889190658dd10
                                  • Opcode Fuzzy Hash: c16c029c306b286dc68ea53672381cf4822dc7fac54dfe922ac6785f7a3e02bc
                                  • Instruction Fuzzy Hash: E2314171500B04DFC724EF38D545B9ABBF4FF04768F008A2DD49A8B691D738A949CB95
                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00431AC2
                                  • ___raise_securityfailure.LIBCMT ref: 00431BAA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1782592592.0000000000431000.00000020.00000001.01000000.00000005.sdmp, Offset: 00430000, based on PE: true
                                  • Associated: 00000003.00000002.1782575451.0000000000430000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782606665.0000000000432000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782621103.0000000000433000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000434000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1782634554.0000000000476000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_430000_Update.jbxd
                                  Similarity
                                  • API ID: FeaturePresentProcessor___raise_securityfailure
                                  • String ID: 0C
                                  • API String ID: 3761405300-3567432261
                                  • Opcode ID: da615a22eb889d2221bb5391e04a99992a4587b2d20bfb441e2e1c80a15d3fc5
                                  • Instruction ID: a1bc59c18f6cc924329da22c83cd4f89ac5421e9b32e9a34f26235069dc1cd2a
                                  • Opcode Fuzzy Hash: da615a22eb889d2221bb5391e04a99992a4587b2d20bfb441e2e1c80a15d3fc5
                                  • Instruction Fuzzy Hash: 0D21C3B46003019ADB18CF15F986A507BF4BB09716F10B13AEA198B3B0E7B59B84CF4C
                                  APIs
                                  • CloseThemeData.UXTHEME(?,6BF1DE20), ref: 6BDC4DC6
                                  • OpenThemeData.UXTHEME(?,REBAR,6BF1DE20), ref: 6BDC4DD4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: DataTheme$CloseOpen
                                  • String ID: REBAR
                                  • API String ID: 1809247333-925029515
                                  • Opcode ID: ee8e98a2510fd6df0f01414e3e3cfac5bf9063bdf614098133ab2a3c7456bc37
                                  • Instruction ID: f607413a8db66d593317a9c22201508ef4e17ab2862b6d6a6946459a43a0bb14
                                  • Opcode Fuzzy Hash: ee8e98a2510fd6df0f01414e3e3cfac5bf9063bdf614098133ab2a3c7456bc37
                                  • Instruction Fuzzy Hash: 07E0867B654710ABEB507B349D04F573EBAAF21665B000869E89ECB124DF3DC401DBB1
                                  APIs
                                  • EnterCriticalSection.KERNEL32(6BF78410,?,?,0000007C,?,6BDAF318,00000001), ref: 6BDC2F91
                                  • InitializeCriticalSection.KERNEL32(00000000,?,6BDAF318,00000001), ref: 6BDC2FA7
                                  • LeaveCriticalSection.KERNEL32(6BF78410,?,6BDAF318,00000001), ref: 6BDC2FB5
                                  • EnterCriticalSection.KERNEL32(00000000,?,0000007C,?,6BDAF318,00000001), ref: 6BDC2FC2
                                    • Part of subcall function 6BDC2FF8: InitializeCriticalSection.KERNEL32(6BF78410,?,0000007C,?,6BDAF318,00000001), ref: 6BDC3010
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterInitialize$Leave
                                  • String ID:
                                  • API String ID: 713024617-0
                                  • Opcode ID: 2ada22a30a90c0c00897817171ffe29413a25b37c89319fb11491c6ce4d838f1
                                  • Instruction ID: 102216733b640a677976121ed6117830e1a7dc885de32a42bf5e972b83e9645b
                                  • Opcode Fuzzy Hash: 2ada22a30a90c0c00897817171ffe29413a25b37c89319fb11491c6ce4d838f1
                                  • Instruction Fuzzy Hash: D7F0C2B3815228ABCE002F56EC48B9E7B6CEB5777AF5010B6E542D6421C779C805C9A2
                                  APIs
                                  • EnterCriticalSection.KERNEL32(6BF784E0,?,?,?,?,6BDC52BB,00000000,00000004,6BDB6A7F,6BDB0B94,6BDBA9D6,?,6BDAEF7B), ref: 6BDC51A2
                                  • TlsGetValue.KERNEL32(6BF784C4,?,?,?,?,6BDC52BB,00000000,00000004,6BDB6A7F,6BDB0B94,6BDBA9D6,?,6BDAEF7B), ref: 6BDC51B6
                                  • LeaveCriticalSection.KERNEL32(6BF784E0,?,?,?,?,6BDC52BB,00000000,00000004,6BDB6A7F,6BDB0B94,6BDBA9D6,?,6BDAEF7B), ref: 6BDC51D0
                                  • LeaveCriticalSection.KERNEL32(6BF784E0,?,?,?,?,6BDC52BB,00000000,00000004,6BDB6A7F,6BDB0B94,6BDBA9D6,?,6BDAEF7B), ref: 6BDC51DB
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1783106021.000000006BD71000.00000020.00000001.01000000.00000006.sdmp, Offset: 6BD70000, based on PE: true
                                  • Associated: 00000003.00000002.1783092781.000000006BD70000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783209928.000000006BF1A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783242031.000000006BF70000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783255900.000000006BF73000.00000008.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF75000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783268752.000000006BF77000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000003.00000002.1783296143.000000006BF7D000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_6bd70000_Update.jbxd
                                  Similarity
                                  • API ID: CriticalSection$Leave$EnterValue
                                  • String ID:
                                  • API String ID: 3969253408-0
                                  • Opcode ID: 443070d267fa32b97e4d46527329be96aa6ff3f78e52b953dd403fa6c2e7b85c
                                  • Instruction ID: 869973e94f5ccf19e5284a4aa3725449d67c63f2a63b3a8c4f78db94c18e597e
                                  • Opcode Fuzzy Hash: 443070d267fa32b97e4d46527329be96aa6ff3f78e52b953dd403fa6c2e7b85c
                                  • Instruction Fuzzy Hash: C7F0B433A01118EBDB059F25CC5C94BBBBCFE15B757115055EE029B511C734F805CBA1