Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
zPJUOck9wt.exe

Overview

General Information

Sample name:zPJUOck9wt.exe
renamed because original name is a hash value
Original sample name:1bf851229cdc8a1b97523ed4fa48b977.exe
Analysis ID:1581726
MD5:1bf851229cdc8a1b97523ed4fa48b977
SHA1:037c0db18b290df45a54ff23556516b24206173d
SHA256:ce6667acf10faea38244c15da512a68d09725f9e21bb5edc6b22d1048ddc552f
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Execution from Suspicious Folder
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • zPJUOck9wt.exe (PID: 6976 cmdline: "C:\Users\user\Desktop\zPJUOck9wt.exe" MD5: 1BF851229CDC8A1B97523ED4FA48B977)
    • cmd.exe (PID: 6296 cmdline: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Update.exe (PID: 1432 cmdline: C:\Users\Public\Bilite\Axialis\Update.exe MD5: FB325C945A08D06FE91681179BDCCC66)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Users\Public\Bilite\Axialis\Update.exe, CommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Bilite\Axialis\Update.exe, NewProcessName: C:\Users\Public\Bilite\Axialis\Update.exe, OriginalFileName: C:\Users\Public\Bilite\Axialis\Update.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6296, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\Public\Bilite\Axialis\Update.exe, ProcessId: 1432, ProcessName: Update.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\Public\Bilite\Axialis\Update.dllReversingLabs: Detection: 47%
Source: zPJUOck9wt.exeReversingLabs: Detection: 34%
Source: zPJUOck9wt.exeVirustotal: Detection: 48%Perma Link
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C849FF0 CryptAcquireContextW,std::bad_exception::bad_exception,CryptImportKey,CryptReleaseContext,std::bad_exception::bad_exception,CryptSetKeyParam,CryptDestroyKey,CryptReleaseContext,std::bad_exception::bad_exception,CryptSetKeyParam,CryptDestroyKey,CryptReleaseContext,std::bad_exception::bad_exception,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,std::bad_exception::bad_exception,CryptDestroyKey,CryptReleaseContext,3_2_6C849FF0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C849A10 CryptAcquireContextW,std::bad_exception::bad_exception,CryptCreateHash,CryptReleaseContext,std::bad_exception::bad_exception,CryptHashData,CryptDestroyHash,CryptReleaseContext,std::bad_exception::bad_exception,CryptHashData,CryptDestroyHash,CryptReleaseContext,std::bad_exception::bad_exception,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,std::bad_exception::bad_exception,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,std::bad_exception::bad_exception,CryptDestroyHash,CryptReleaseContext,3_2_6C849A10
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C8498F0 CryptStringToBinaryA,std::bad_exception::bad_exception,CryptStringToBinaryA,std::bad_exception::bad_exception,3_2_6C8498F0
Source: zPJUOck9wt.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Binary string: \YSS\Release\Update.pdb source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002B7C000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmp, Update.dll.0.dr
Source: Binary string: Morpheme.pdb source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.dr
Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002B7C000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000000.1692112652.0000000000852000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000002.1695714101.0000000000852000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb((& source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002B7C000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000000.1692112652.0000000000852000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000002.1695714101.0000000000852000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040301A
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402B79
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C88EB8C __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,3_2_6C88EB8C
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C85C030 WSAStartup,getaddrinfo,WSACleanup,socket,WSACleanup,connect,closesocket,freeaddrinfo,WSACleanup,recv,closesocket,WSACleanup,VirtualAlloc,3_2_6C85C030
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: zPJUOck9wt.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: zPJUOck9wt.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: zPJUOck9wt.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: zPJUOck9wt.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Update.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
Source: zPJUOck9wt.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: zPJUOck9wt.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: zPJUOck9wt.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: zPJUOck9wt.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: http://ocsp.digicert.com0H
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: http://ocsp.digicert.com0I
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: zPJUOck9wt.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: http://s.symcd.com06
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, Update.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: https://://fpdownload.macromedia.com/get/flashplayer/update/current/install/install_all_win_install_
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: zPJUOck9wt.exeString found in binary or memory: https://sectigo.com/CPS0
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C8E2294 __EH_prolog3_catch_GS,CreateCompatibleDC,CreateCompatibleBitmap,FillRect,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,3_2_6C8E2294
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C8A2969 GetAsyncKeyState,SendMessageW,GetClientRect,SetScrollPos,3_2_6C8A2969
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C887757 ScreenToClient,GetKeyState,GetKeyState,GetKeyState,KillTimer,IsWindow,3_2_6C887757
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C8651AD GetKeyState,GetKeyState,GetKeyState,SendMessageW,3_2_6C8651AD
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C849FF0 CryptAcquireContextW,std::bad_exception::bad_exception,CryptImportKey,CryptReleaseContext,std::bad_exception::bad_exception,CryptSetKeyParam,CryptDestroyKey,CryptReleaseContext,std::bad_exception::bad_exception,CryptSetKeyParam,CryptDestroyKey,CryptReleaseContext,std::bad_exception::bad_exception,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,std::bad_exception::bad_exception,CryptDestroyKey,CryptReleaseContext,3_2_6C849FF0
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_00404FAA0_2_00404FAA
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_0041206B0_2_0041206B
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_0041022D0_2_0041022D
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_00411F910_2_00411F91
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C894EAB3_2_6C894EAB
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C880AA63_2_6C880AA6
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C9A45903_2_6C9A4590
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C89E6EA3_2_6C89E6EA
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C9C408E3_2_6C9C408E
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C8700CD3_2_6C8700CD
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C9B80683_2_6C9B8068
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C9A02D43_2_6C9A02D4
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C8762D43_2_6C8762D4
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C9ABCBF3_2_6C9ABCBF
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C9ADCF03_2_6C9ADCF0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C8658983_2_6C865898
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C8758FE3_2_6C8758FE
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C9A94353_2_6C9A9435
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C8751A83_2_6C8751A8
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C8733A63_2_6C8733A6
Source: Joe Sandbox ViewDropped File: C:\Users\Public\Bilite\Axialis\Update.exe 0C2CC4513EC9101A28A7988C72A46175EFD82F387BB3BCFB2612E808804282B5
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: String function: 0040243B appears 37 times
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C99FAC1 appears 64 times
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C87B869 appears 44 times
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C99FB70 appears 66 times
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C85FF40 appears 39 times
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C99F6A7 appears 63 times
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: String function: 6C99FA8E appears 199 times
Source: zPJUOck9wt.exeStatic PE information: invalid certificate
Source: zPJUOck9wt.exe, 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs zPJUOck9wt.exe
Source: zPJUOck9wt.exe, 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7zSfxNew.exe< vs zPJUOck9wt.exe
Source: zPJUOck9wt.exe, 00000000.00000003.1690202144.0000000000590000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFlashUtil.exev+ vs zPJUOck9wt.exe
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002B7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamensdksetupJ vs zPJUOck9wt.exe
Source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002B7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUpdate.exe vs zPJUOck9wt.exe
Source: zPJUOck9wt.exe, 00000000.00000003.1655677334.000000000247D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs zPJUOck9wt.exe
Source: zPJUOck9wt.exe, 00000000.00000003.1655677334.000000000247D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7zSfxNew.exe< vs zPJUOck9wt.exe
Source: zPJUOck9wt.exeBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs zPJUOck9wt.exe
Source: zPJUOck9wt.exeBinary or memory string: OriginalFilename7zSfxNew.exe< vs zPJUOck9wt.exe
Source: zPJUOck9wt.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@6/5@0/0
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_00407776 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_00407776
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_0040118A GetDiskFreeSpaceExW,SendMessageW,0_2_0040118A
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C85C940 CreateToolhelp32Snapshot,Process32FirstW,WideCharToMultiByte,CloseHandle,Process32NextW,CloseHandle,3_2_6C85C940
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_004034C1 _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_004034C1
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_00401BDF GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,0_2_00401BDF
Source: C:\Users\user\Desktop\zPJUOck9wt.exeFile created: C:\Users\Public\BiliteJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6336:120:WilError_03
Source: zPJUOck9wt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\zPJUOck9wt.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: zPJUOck9wt.exeReversingLabs: Detection: 34%
Source: zPJUOck9wt.exeVirustotal: Detection: 48%
Source: C:\Users\user\Desktop\zPJUOck9wt.exeFile read: C:\Users\user\Desktop\zPJUOck9wt.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\zPJUOck9wt.exe "C:\Users\user\Desktop\zPJUOck9wt.exe"
Source: C:\Users\user\Desktop\zPJUOck9wt.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exe
Source: C:\Users\user\Desktop\zPJUOck9wt.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: update.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00021401-0000-0000-C000-000000000046}\InProcServer32Jump to behavior
Source: install_flash_player_ppapi.exe.lnk.3.drLNK file: ..\..\Public\Bilite\install_flash_player_ppapi.exe
Source: zPJUOck9wt.exeStatic file information: File size 21615909 > 1048576
Source: Binary string: \YSS\Release\Update.pdb source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002B7C000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmp, Update.dll.0.dr
Source: Binary string: Morpheme.pdb source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.dr
Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002B7C000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000000.1692112652.0000000000852000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000002.1695714101.0000000000852000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
Source: Binary string: E:\agent\workspace\p-e3cf6c00cb1d4f41832c02872427999a\src\Ufo4WinMac\GamerUFO\ufo4Desktop\Output\bin\Release\UpdateApp.pdb((& source: zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002B7C000.00000004.00000020.00020000.00000000.sdmp, Update.exe, 00000003.00000000.1692112652.0000000000852000.00000002.00000001.01000000.00000005.sdmp, Update.exe, 00000003.00000002.1695714101.0000000000852000.00000002.00000001.01000000.00000005.sdmp, Update.exe.0.dr
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,0_2_00406D5D
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_00411C20 push eax; ret 0_2_00411C4E
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C99FA5C push ecx; ret 3_2_6C99FA6F
Source: C:\Users\user\Desktop\zPJUOck9wt.exeFile created: C:\Users\Public\Bilite\Axialis\Update.dllJump to dropped file
Source: C:\Users\user\Desktop\zPJUOck9wt.exeFile created: C:\Users\Public\Bilite\Axialis\Update.exeJump to dropped file
Source: C:\Users\user\Desktop\zPJUOck9wt.exeFile created: C:\Users\Public\Bilite\install_flash_player_ppapi.exeJump to dropped file
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C8668AC IsIconic,3_2_6C8668AC
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C8699DC IsWindowVisible,IsIconic,3_2_6C8699DC
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C885ACD GetParent,IsIconic,GetParent,3_2_6C885ACD
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C86F4BA SendMessageW,IsIconic,IsWindowVisible,3_2_6C86F4BA
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C897012 SetRectEmpty,RedrawWindow,ReleaseCapture,SetCapture,ReleaseCapture,SetCapture,SendMessageW,UpdateWindow,SendMessageW,IsWindow,IsIconic,IsZoomed,IsWindow,UpdateWindow,3_2_6C897012
Source: C:\Users\user\Desktop\zPJUOck9wt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeDropped PE file which has not been started: C:\Users\Public\Bilite\install_flash_player_ppapi.exeJump to dropped file
Source: C:\Users\Public\Bilite\Axialis\Update.exeEvaded block: after key decisiongraph_3-62444
Source: C:\Users\Public\Bilite\Axialis\Update.exeAPI coverage: 4.8 %
Source: C:\Users\Public\Bilite\Axialis\Update.exe TID: 3848Thread sleep time: -73000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040301A
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402B79
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C88EB8C __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,3_2_6C88EB8C
Source: C:\Users\Public\Bilite\Axialis\Update.exeThread delayed: delay time: 73000Jump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_008515D0 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_008515D0
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,0_2_00406D5D
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00851A8F SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00851A8F
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_008515D0 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_008515D0
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_00851764 SetUnhandledExceptionFilter,3_2_00851764
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C9AA83C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6C9AA83C
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C9A060D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6C9A060D
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: 3_2_6C99FE55 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_6C99FE55
Source: C:\Users\user\Desktop\zPJUOck9wt.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\Public\Bilite\Axialis\Update.exe C:\Users\Public\Bilite\Axialis\Update.exeJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_0040D72E cpuid 0_2_0040D72E
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_00401F9D
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6C9C6DC7
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetLocaleInfoW,3_2_6C87EDE4
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6C9C6EB9
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6C9C6E6E
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_6C9C6FDF
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6C9C6F54
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6C9BC911
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,3_2_6C9C6BC2
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: EnumSystemLocalesW,3_2_6C9BC3A5
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6C9C7461
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_6C9C7537
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,3_2_6C9C7232
Source: C:\Users\Public\Bilite\Axialis\Update.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_6C9C735B
Source: C:\Users\Public\Bilite\Axialis\Update.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_00401626 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00401626
Source: C:\Users\user\Desktop\zPJUOck9wt.exeCode function: 0_2_00404FAA GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,memset,ShellExecuteExW,WaitForSingleObject,CloseHandle,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,0_2_00404FAA
Source: C:\Users\Public\Bilite\Axialis\Update.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Native API
1
DLL Side-Loading
11
Process Injection
1
Masquerading
21
Input Capture
1
System Time Discovery
Remote Services21
Input Capture
2
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
LSASS Memory11
Security Software Discovery
Remote Desktop Protocol11
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares1
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync35
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1581726 Sample: zPJUOck9wt.exe Startdate: 28/12/2024 Architecture: WINDOWS Score: 60 22 Multi AV Scanner detection for dropped file 2->22 24 Multi AV Scanner detection for submitted file 2->24 26 Sigma detected: Execution from Suspicious Folder 2->26 7 zPJUOck9wt.exe 10 2->7         started        process3 file4 16 C:\Users\...\install_flash_player_ppapi.exe, PE32 7->16 dropped 18 C:\Users\Public\Bilite\Axialis\Update.exe, PE32 7->18 dropped 20 C:\Users\Public\Bilite\Axialis\Update.dll, PE32 7->20 dropped 10 cmd.exe 1 7->10         started        process5 process6 12 Update.exe 2 10->12         started        14 conhost.exe 10->14         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
zPJUOck9wt.exe35%ReversingLabsWin32.Dropper.Vilsel
zPJUOck9wt.exe49%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\Public\Bilite\Axialis\Update.dll48%ReversingLabsWin32.Trojan.Generic
C:\Users\Public\Bilite\Axialis\Update.exe0%ReversingLabs
C:\Users\Public\Bilite\install_flash_player_ppapi.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://://fpdownload.macromedia.com/get/flashplayer/update/current/install/install_all_win_install_0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#zPJUOck9wt.exefalse
    high
    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tzPJUOck9wt.exefalse
      high
      https://sectigo.com/CPS0zPJUOck9wt.exefalse
        high
        http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#zPJUOck9wt.exefalse
          high
          https://://fpdownload.macromedia.com/get/flashplayer/update/current/install/install_all_win_install_zPJUOck9wt.exe, 00000000.00000003.1688917721.0000000002DA8000.00000004.00000020.00020000.00000000.sdmp, install_flash_player_ppapi.exe.0.drfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yzPJUOck9wt.exefalse
            high
            http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0zPJUOck9wt.exefalse
              high
              http://ocsp.sectigo.com0zPJUOck9wt.exefalse
                high
                http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#zPJUOck9wt.exefalse
                  high
                  No contacted IP infos
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1581726
                  Start date and time:2024-12-28 20:56:08 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 3m 33s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:4
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:zPJUOck9wt.exe
                  renamed because original name is a hash value
                  Original Sample Name:1bf851229cdc8a1b97523ed4fa48b977.exe
                  Detection:MAL
                  Classification:mal60.winEXE@6/5@0/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 99%
                  • Number of executed functions: 84
                  • Number of non-executed functions: 352
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Stop behavior analysis, all processes terminated
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  14:57:02API Interceptor1x Sleep call for process: Update.exe modified
                  No context
                  No context
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\Public\Bilite\Axialis\Update.exeMEuu1a2o6n.exeGet hashmaliciousGhostRatBrowse
                    MEuu1a2o6n.exeGet hashmaliciousUnknownBrowse
                      Process:C:\Users\user\Desktop\zPJUOck9wt.exe
                      File Type:openssl enc'd data with salted password, base64 encoded
                      Category:dropped
                      Size (bytes):64
                      Entropy (8bit):5.265319531114784
                      Encrypted:false
                      SSDEEP:3:iqkdd0LEgncgVjfkbRn:ilfwBctn
                      MD5:E6A32CA4BF503C5CA8A78E2F5472A4DF
                      SHA1:5D3E6DF8AA7FA052F7CB212B08A1801C5A6561B1
                      SHA-256:D23108539C9A78F5FBC141FB1AE2A980967E188BF693DFF1055F83028D29833D
                      SHA-512:0E39657A57D3813FB441EB1FB5280AF573CE717D13178FAEC2F4B4DFBD605BEA5658A6A35FFB29B2EDA9BB0F7D24EE51286A66E509A1A9CD8ADBE2514C4CEB93
                      Malicious:false
                      Reputation:low
                      Preview:U2FsdGVkX19I8ZtoqW93Fj6yeovix5itQRtgLoSHjApm80LQ/4FyDlKt1AiPVRRD
                      Process:C:\Users\user\Desktop\zPJUOck9wt.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):2214912
                      Entropy (8bit):6.635782448765808
                      Encrypted:false
                      SSDEEP:49152:6WProiAXfi2iG9bcEaU0yl0bZU4yBhQV2bYQKabQQ4o5gnKqxSpkDUC:6WPrZAXfPiG9bKU0FlU4ybpPKabQg5gD
                      MD5:9939E9DDC47F7DC405A107DC882126E3
                      SHA1:2EF13A0ECC77F7FA6578FC04D8F913759808881D
                      SHA-256:037929DF4F79A5060FDB189A9248C22A926D937018E52FB8BA36FA2AFB05404C
                      SHA-512:753FBBC04C52391C0815D94BB101FF585DD72FF643CDA09BF0F72ADC80AB667ADB9F19299357743B1905DE38EB9D75D4D2BD30E7AC57F9DF7E1DBDA782B3AF81
                      Malicious:true
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 48%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........3i{.R.(.R.(.R.(.*.).R.(.*.).R.(.*.)wR.(.*.).R.(.*.).R.(.R.(.Q.(...).R.(...).R.(...)&S.( ..).R.( ..).R.( ..(.R.( ..).R.(Rich.R.(........................PE..L...B.kg...........!...*.....2......+........................................@"...........@.............................P.......h........H.................... .0....8..p....................9.......7..@............................................text.............................. ..`.rdata..p].......^..................@..@.data...........\..................@....rsrc....H.......H...T..............@..@.reloc..0..... ..0..................@..B................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\zPJUOck9wt.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):395368
                      Entropy (8bit):5.090673225697451
                      Encrypted:false
                      SSDEEP:6144:I0acLF3rgypB1Grf/TRfiJ7BePaEvLJggZy:Y/TRfi3ePtJRg
                      MD5:FB325C945A08D06FE91681179BDCCC66
                      SHA1:F5D91B7D75D34E156066AB4099E0FD0DF9227B32
                      SHA-256:0C2CC4513EC9101A28A7988C72A46175EFD82F387BB3BCFB2612E808804282B5
                      SHA-512:2BB588EBE2FA35D03652AEC4E5D51DABD3A24E996336A4D5EC9C762D6084862D5CD5F530F1DA0B98D2887BA88F4E077697D128071FF497D2967F9F42ADC2F533
                      Malicious:true
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Joe Sandbox View:
                      • Filename: MEuu1a2o6n.exe, Detection: malicious, Browse
                      • Filename: MEuu1a2o6n.exe, Detection: malicious, Browse
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:..[...[...[...#l..[.......[.......[.......[.......[..b....[..e....[...0...[...[...[..e....[..e....[...[h..[..e....[..Rich.[..........................PE..L...X..e............................\........ ....@..................................8....@.................................D(.......@..................h(...........!..T............................!..@............ ...............................text............................... ..`.rdata....... ......................@..@.data........0.......$..............@....rsrc........@.......&..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\zPJUOck9wt.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):20846560
                      Entropy (8bit):7.987627287733052
                      Encrypted:false
                      SSDEEP:393216:zaD7gW+8fh6K6SHC17vRtYHL6pvUBIl2vnhbGwxi:zEnwK6Si9vo6JUE41Gb
                      MD5:3CBDCE6D8C779406AC208A16E4953D10
                      SHA1:60A251BC7383443131C4C58DF9081B73009AA955
                      SHA-256:6B0CC56214DBB2199DABF5CD7D60C6A07EF418342E9343EDCA12F8ABA1061A72
                      SHA-512:7E76B71B5BF7DE40D0174AC8B73ED7EA3E7D957CEEE7989A655E48EE8AF56533D721195DB500200DA4BCAC3690921DF821E4C58EB2C92CC554CAFA40ECFA2383
                      Malicious:true
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........N...........W....W.E......F.....T......T..............W.......P.G.....G.....D......B....Rich...........................PE..L...8g.Z......................:...................@..........................@>.....Pj>...@.................................l........0....8...........=.......=..-.....................................@............................................text............................... ..`.rdata..............................@..@.data...$8..........................@....rsrc.....8..0....8.................@..@.reloc..zA....=..B....=.............@..B................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\Public\Bilite\Axialis\Update.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Dec 28 18:56:59 2024, mtime=Sat Dec 28 18:57:01 2024, atime=Sun Jun 21 05:05:14 2020, length=20846560, window=hide
                      Category:dropped
                      Size (bytes):1131
                      Entropy (8bit):4.7331574952283155
                      Encrypted:false
                      SSDEEP:12:82NOUlGI7iCICHqXmm2sX/lv3ACmqmcAD7zwHl/QY2ojAb0ncG/Y2zavbMg44t2W:8UGIq23ukND+l/+sAb0J2vAfqyFm
                      MD5:369507171E30CE9B984DC58A9E71B9CD
                      SHA1:C7B8D44EF036542C4CC50CB8C68AAA0EF87AC0E7
                      SHA-256:C00BF21723B45F86FCD995159C8AAD60C3CF0A916352760D90500582CEF4CC74
                      SHA-512:450F2087CA004E105F70F064C7BE507431229E2DB9516AE664B95B4F9C4E9E6E1FA36BC808C8B3405624F7CD45C53184AD8AEC64969EF726D3223830F15CE899
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.... ....v..bY..!.7.bY.....G....>..........................P.O. .:i.....+00.../C:\...................x.1.....CW;^..Users.d......OwH.Y......................:.....K...U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....|.1......Y ...Public..f......O.I.Y".....+...............<.......P.u.b.l.i.c...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.6.....T.1......Y ...Bilite..>......Y ..Y .............................o.B.i.l.i.t.e.......2...>..P.0 .INSTAL~1.EXE..n......Y ..Y!...........................".#.i.n.s.t.a.l.l._.f.l.a.s.h._.p.l.a.y.e.r._.p.p.a.p.i...e.x.e.......d...............-.......c...........r..y.....C:\Users\Public\Bilite\install_flash_player_ppapi.exe..2.....\.....\.P.u.b.l.i.c.\.B.i.l.i.t.e.\.i.n.s.t.a.l.l._.f.l.a.s.h._.p.l.a.y.e.r._.p.p.a.p.i...e.x.e..........v..*.cM.jVD.Es.!...`.......X.......657773...........hT..CrF.f4... .j.T..b...,.......hT..CrF.f4... .j.T..b...,..................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.998823108737483
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:zPJUOck9wt.exe
                      File size:21'615'909 bytes
                      MD5:1bf851229cdc8a1b97523ed4fa48b977
                      SHA1:037c0db18b290df45a54ff23556516b24206173d
                      SHA256:ce6667acf10faea38244c15da512a68d09725f9e21bb5edc6b22d1048ddc552f
                      SHA512:8e8aca3ccd5b9cde98255c2bf7fa95f75c9c3cb575c91e3304a7a90bb0a1ea0b98eacde725809c4b201288fb280045efd02518fc379a4322725cd5cdad32c2ce
                      SSDEEP:393216:Hpd0SoUNyS1eey9cLBzAAua7MdTlBW9F9CxkmjjzomHA3YvwFBNZ3laN4z:JaSoiy19cduakTlQ9q2mjjzHgIvMBNZx
                      TLSH:B22733C2F78467F4C2B2A1BAD9555BB38973CB42E6051988DE3949172F4A4F2810B1FF
                      File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................................0....@..........................@...............................................P........................I..).
                      Icon Hash:01e0f2ccd4d4c400
                      Entrypoint:0x411def
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:
                      Time Stamp:0x4C26F87E [Sun Jun 27 07:06:38 2010 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:b5a014d7eeb4c2042897567e1288a095
                      Signature Valid:false
                      Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                      Signature Validation Error:The digital signature of the object did not verify
                      Error Number:-2146869232
                      Not Before, Not After
                      • 17/07/2022 20:00:00 17/07/2024 19:59:59
                      Subject Chain
                      • CN=Incredibuild Software Ltd., O=Incredibuild Software Ltd., S=Tel Aviv, C=IL
                      Version:3
                      Thumbprint MD5:8164525B12F9B6829CCD5054865F2D41
                      Thumbprint SHA-1:583F01EE72450A9945FB1CFA539BAAB983D3F1D9
                      Thumbprint SHA-256:2EBD549CFBD28201F8773F370E920A21BB010F577BA74B4726332D2CE7836F69
                      Serial:7098774ED29B0565AB114EF2F2871CF7
                      Instruction
                      push ebp
                      mov ebp, esp
                      push FFFFFFFFh
                      push 00414C50h
                      push 00411F80h
                      mov eax, dword ptr fs:[00000000h]
                      push eax
                      mov dword ptr fs:[00000000h], esp
                      sub esp, 68h
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [ebp-18h], esp
                      xor ebx, ebx
                      mov dword ptr [ebp-04h], ebx
                      push 00000002h
                      call dword ptr [00413184h]
                      pop ecx
                      or dword ptr [00419924h], FFFFFFFFh
                      or dword ptr [00419928h], FFFFFFFFh
                      call dword ptr [00413188h]
                      mov ecx, dword ptr [0041791Ch]
                      mov dword ptr [eax], ecx
                      call dword ptr [0041318Ch]
                      mov ecx, dword ptr [00417918h]
                      mov dword ptr [eax], ecx
                      mov eax, dword ptr [00413190h]
                      mov eax, dword ptr [eax]
                      mov dword ptr [00419920h], eax
                      call 00007F3618C59402h
                      cmp dword ptr [00417710h], ebx
                      jne 00007F3618C592EEh
                      push 00411F78h
                      call dword ptr [00413194h]
                      pop ecx
                      call 00007F3618C593D4h
                      push 00417048h
                      push 00417044h
                      call 00007F3618C593BFh
                      mov eax, dword ptr [00417914h]
                      mov dword ptr [ebp-6Ch], eax
                      lea eax, dword ptr [ebp-6Ch]
                      push eax
                      push dword ptr [00417910h]
                      lea eax, dword ptr [ebp-64h]
                      push eax
                      lea eax, dword ptr [ebp-70h]
                      push eax
                      lea eax, dword ptr [ebp-60h]
                      push eax
                      call dword ptr [0041319Ch]
                      push 00417040h
                      push 00417000h
                      call 00007F3618C5938Ch
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x150dc0xb4.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x190d7.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x149ac0d0x2918
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x130000x310.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x113170x11400797279c5ab1a163aed1f2a528f9fe3ceFalse0.6174988677536232data6.576987441854239IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x130000x30ea0x32001359639b02bcb8f0a8743e6ead1c0030False0.43828125data5.549434098115495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x170000x292c0x8009415c9c8dea3245d6d73c23393e27d8eFalse0.431640625data3.6583182363171756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x1a0000x190d70x19200aedf42f084dabb70902985d8cb8d4f42False0.14223802860696516data4.481844282645869IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x1a2080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.42819148936170215
                      RT_ICON0x1a6700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224RussianRussia0.2767354596622889
                      RT_ICON0x1b7180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.2513485477178423
                      RT_ICON0x1dcc00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896RussianRussia0.17170524326877656
                      RT_ICON0x21ee80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584RussianRussia0.09922512717378446
                      RT_GROUP_ICON0x327100x4cdataRussianRussia0.7763157894736842
                      RT_VERSION0x3275c0x350dataEnglishUnited States0.47523584905660377
                      RT_VERSION0x32aac0x3b0dataChineseChina0.4523305084745763
                      RT_MANIFEST0x32e5c0x27bASCII text, with very long lines (635), with no line terminatorsEnglishUnited States0.5118110236220472
                      DLLImport
                      COMCTL32.dll
                      KERNEL32.dllGetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, LoadLibraryA, LockResource, LoadResource, SizeofResource, FindResourceExA, MulDiv, GlobalFree, GlobalAlloc, lstrcmpiA, GetSystemDefaultLCID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, MultiByteToWideChar, GetLocaleInfoW, lstrlenA, lstrcmpiW, GetEnvironmentVariableW, lstrcmpW, GlobalMemoryStatusEx, VirtualAlloc, WideCharToMultiByte, ExpandEnvironmentStringsW, RemoveDirectoryW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, SetThreadLocale, GetLocalTime, GetSystemTimeAsFileTime, lstrlenW, GetTempPathW, SetEnvironmentVariableW, CloseHandle, CreateFileW, GetDriveTypeW, SetCurrentDirectoryW, GetModuleFileNameW, GetCommandLineW, GetVersionExW, CreateEventW, SetEvent, ResetEvent, InitializeCriticalSection, TerminateThread, ResumeThread, SuspendThread, IsBadReadPtr, LocalFree, lstrcpyW, FormatMessageW, GetSystemDirectoryW, DeleteCriticalSection, GetFileSize, SetFilePointer, ReadFile, SetFileTime, SetEndOfFile, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetModuleHandleA, SystemTimeToFileTime, GetLastError, CreateThread, WaitForSingleObject, GetExitCodeThread, Sleep, SetLastError, SetFileAttributesW, GetDiskFreeSpaceExW, lstrcatW, ExitProcess, CompareFileTime, GetStartupInfoA
                      USER32.dllCharUpperW, EndDialog, DestroyWindow, KillTimer, ReleaseDC, DispatchMessageW, GetMessageW, SetTimer, CreateWindowExW, ScreenToClient, GetWindowRect, wsprintfW, GetParent, GetSystemMenu, EnableMenuItem, EnableWindow, MessageBeep, LoadIconW, LoadImageW, wvsprintfW, IsWindow, DefWindowProcW, CallWindowProcW, DrawIconEx, DialogBoxIndirectParamW, GetWindow, ClientToScreen, GetDC, DrawTextW, ShowWindow, SystemParametersInfoW, SetFocus, SetWindowLongW, GetSystemMetrics, GetClientRect, GetDlgItem, GetKeyState, MessageBoxA, wsprintfA, SetWindowTextW, GetSysColor, GetWindowTextLengthW, GetWindowTextW, GetClassNameA, GetWindowLongW, GetMenu, SetWindowPos, CopyImage, SendMessageW, GetWindowDC
                      GDI32.dllGetCurrentObject, StretchBlt, SetStretchBltMode, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, GetObjectW, GetDeviceCaps, DeleteObject, CreateFontIndirectW, DeleteDC
                      SHELL32.dllSHGetFileInfoW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteExW, SHGetSpecialFolderPathW, ShellExecuteW
                      ole32.dllCoInitialize, CreateStreamOnHGlobal, CoCreateInstance
                      OLEAUT32.dllVariantClear, OleLoadPicture, SysAllocString
                      MSVCRT.dll__set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, memset, _wcsnicmp, strncmp, malloc, memmove, _wtol, memcpy, free, memcmp, _purecall, ??2@YAPAXI@Z, ??3@YAXPAX@Z, _except_handler3, _controlfp
                      Language of compilation systemCountry where language is spokenMap
                      RussianRussia
                      EnglishUnited States
                      ChineseChina
                      No network behavior found

                      Click to jump to process

                      Click to jump to process

                      Click to jump to process

                      Target ID:0
                      Start time:14:56:58
                      Start date:28/12/2024
                      Path:C:\Users\user\Desktop\zPJUOck9wt.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\zPJUOck9wt.exe"
                      Imagebase:0x400000
                      File size:21'615'909 bytes
                      MD5 hash:1BF851229CDC8A1B97523ED4FA48B977
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:14:57:02
                      Start date:28/12/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\cmd.exe" /c start C:\Users\Public\Bilite\Axialis\Update.exe
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:14:57:02
                      Start date:28/12/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:14:57:02
                      Start date:28/12/2024
                      Path:C:\Users\Public\Bilite\Axialis\Update.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\Public\Bilite\Axialis\Update.exe
                      Imagebase:0x850000
                      File size:395'368 bytes
                      MD5 hash:FB325C945A08D06FE91681179BDCCC66
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Antivirus matches:
                      • Detection: 0%, ReversingLabs
                      Reputation:low
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:18%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:26.8%
                        Total number of Nodes:1423
                        Total number of Limit Nodes:15
                        execution_graph 9093 410e7f 9094 410e9a 9093->9094 9095 410eb5 9094->9095 9097 40f42d 9094->9097 9098 40f445 free 9097->9098 9099 40f437 9097->9099 9100 4024e7 46 API calls 9098->9100 9099->9098 9101 40f456 9099->9101 9100->9101 9101->9095 9089 40e63c 9090 40e5d3 6 API calls 9089->9090 9091 40e644 9090->9091 8241 4024c4 8242 40245a 45 API calls 8241->8242 8243 4024cd 8242->8243 8244 4024d2 8243->8244 8245 4024d3 VirtualAlloc 8243->8245 8246 4096c7 _EH_prolog 8260 4096fa 8246->8260 8247 40971c 8248 409827 8281 40118a 8248->8281 8250 409851 8255 40985e ??2@YAPAXI 8250->8255 8251 40983c 8332 409425 8251->8332 8252 4094e0 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8252->8260 8254 40969d 8 API calls 8254->8260 8256 409878 8255->8256 8261 409925 ??2@YAPAXI 8256->8261 8262 4098c2 8256->8262 8266 409530 3 API calls 8256->8266 8268 409425 ctype 3 API calls 8256->8268 8270 4099a2 8256->8270 8275 409a65 8256->8275 8291 409fb4 8256->8291 8295 408ea4 8256->8295 8338 409c13 ??2@YAPAXI 8256->8338 8340 409f49 8256->8340 8258 40e959 VirtualFree ??3@YAXPAX free free ctype 8258->8260 8260->8247 8260->8248 8260->8252 8260->8254 8260->8258 8325 4095b7 8260->8325 8329 409403 8260->8329 8261->8256 8335 409530 8262->8335 8266->8256 8268->8256 8271 409530 3 API calls 8270->8271 8272 4099c7 8271->8272 8273 409425 ctype 3 API calls 8272->8273 8273->8247 8277 409530 3 API calls 8275->8277 8278 409a84 8277->8278 8279 409425 ctype 3 API calls 8278->8279 8279->8247 8282 401198 GetDiskFreeSpaceExW 8281->8282 8283 4011ee SendMessageW 8281->8283 8282->8283 8284 4011b0 8282->8284 8289 4011d6 8283->8289 8284->8283 8285 401f9d 19 API calls 8284->8285 8286 4011c9 8285->8286 8287 407717 25 API calls 8286->8287 8288 4011cf 8287->8288 8288->8289 8290 4011e7 8288->8290 8289->8250 8289->8251 8290->8283 8292 409fdd 8291->8292 8344 409dff 8292->8344 8618 40aef3 8295->8618 8298 408ec1 8298->8256 8300 408fd5 8636 408b7c 8300->8636 8301 408f0d ??2@YAPAXI 8310 408ef5 8301->8310 8303 408f31 ??2@YAPAXI 8303->8310 8310->8300 8310->8301 8310->8303 8681 40cdb8 ??2@YAPAXI 8310->8681 8326 4095c6 8325->8326 8328 4095cc 8325->8328 8326->8260 8327 4095e2 _CxxThrowException 8327->8326 8328->8326 8328->8327 8330 40e8e2 4 API calls 8329->8330 8331 40940b 8330->8331 8331->8260 8333 40e8da ctype 3 API calls 8332->8333 8334 409433 8333->8334 8336 408963 ctype 3 API calls 8335->8336 8337 40953b 8336->8337 8339 409c45 8338->8339 8339->8256 8341 409f4e 8340->8341 8342 409f75 8341->8342 8343 409cde 110 API calls 8341->8343 8342->8256 8343->8341 8346 409e04 8344->8346 8345 409e3a 8345->8256 8346->8345 8348 409cde 8346->8348 8349 409cf8 8348->8349 8353 40db1f 8349->8353 8356 401626 8349->8356 8350 409d2c 8350->8346 8419 40da56 8353->8419 8357 401642 8356->8357 8363 401638 8356->8363 8427 40a62f _EH_prolog 8357->8427 8359 40166f 8495 40eca9 8359->8495 8360 401411 2 API calls 8362 401688 8360->8362 8364 401962 ??3@YAXPAX 8362->8364 8365 40169d 8362->8365 8363->8350 8369 40eca9 VariantClear 8364->8369 8453 401329 8365->8453 8368 4016a8 8457 401454 8368->8457 8369->8363 8372 401362 2 API calls 8373 4016c7 ??3@YAXPAX 8372->8373 8378 4016d9 8373->8378 8405 401928 ??3@YAXPAX 8373->8405 8375 40eca9 VariantClear 8375->8363 8376 4016fa 8377 40eca9 VariantClear 8376->8377 8379 401702 ??3@YAXPAX 8377->8379 8378->8376 8380 401764 8378->8380 8393 401725 8378->8393 8379->8359 8382 4017a2 8380->8382 8383 401789 8380->8383 8381 40eca9 VariantClear 8384 401737 ??3@YAXPAX 8381->8384 8386 4017c4 GetLocalTime SystemTimeToFileTime 8382->8386 8387 4017aa 8382->8387 8385 40eca9 VariantClear 8383->8385 8384->8359 8388 401791 ??3@YAXPAX 8385->8388 8386->8387 8389 4017e1 8387->8389 8390 4017f8 8387->8390 8387->8393 8388->8359 8462 403354 lstrlenW 8389->8462 8486 40301a GetFileAttributesW 8390->8486 8393->8381 8395 401934 GetLastError 8395->8405 8396 401818 ??2@YAPAXI 8398 401824 8396->8398 8397 40192a 8397->8395 8499 40db53 8398->8499 8401 40190f 8404 40eca9 VariantClear 8401->8404 8402 40185f GetLastError 8502 4012f7 8402->8502 8404->8405 8405->8375 8406 401871 8407 403354 86 API calls 8406->8407 8411 40187f ??3@YAXPAX 8406->8411 8409 4018cc 8407->8409 8409->8411 8412 40db53 2 API calls 8409->8412 8410 40189c 8413 40eca9 VariantClear 8410->8413 8411->8410 8414 4018f1 8412->8414 8415 4018aa ??3@YAXPAX 8413->8415 8416 4018f5 GetLastError 8414->8416 8417 401906 ??3@YAXPAX 8414->8417 8415->8359 8416->8411 8417->8401 8424 40d985 8419->8424 8422 40da65 CreateFileW 8423 40da8a 8422->8423 8423->8350 8425 40d98f CloseHandle 8424->8425 8426 40d99a 8424->8426 8425->8426 8426->8422 8426->8423 8428 40a738 8427->8428 8429 40a66a 8427->8429 8430 40a687 8428->8430 8431 40a73d 8428->8431 8429->8430 8432 40a704 8429->8432 8433 40a679 8429->8433 8440 40a6ad 8430->8440 8531 40a3b0 8430->8531 8434 40a6f2 8431->8434 8437 40a747 8431->8437 8438 40a699 8431->8438 8432->8440 8505 40e69c 8432->8505 8433->8434 8435 40a67e 8433->8435 8527 40ed34 8434->8527 8439 40a6b2 8435->8439 8444 40a684 8435->8444 8437->8434 8437->8439 8438->8440 8519 40ed59 8438->8519 8439->8440 8523 40ed79 8439->8523 8514 40ecae 8440->8514 8443 40a71a 8508 40eced 8443->8508 8444->8430 8444->8438 8450 40eca9 VariantClear 8452 40166b 8450->8452 8452->8359 8452->8360 8454 401340 8453->8454 8455 40112b 2 API calls 8454->8455 8456 40134b 8455->8456 8456->8368 8458 4012f7 2 API calls 8457->8458 8459 401462 8458->8459 8546 4013e2 8459->8546 8461 40146d 8461->8372 8463 4024fc 2 API calls 8462->8463 8464 403375 8463->8464 8465 40112b 2 API calls 8464->8465 8468 403385 8464->8468 8465->8468 8467 4033d3 GetSystemTimeAsFileTime GetFileAttributesW 8469 4033e8 8467->8469 8470 4033f2 8467->8470 8468->8467 8476 403477 8468->8476 8549 401986 CreateDirectoryW 8468->8549 8471 40301a 22 API calls 8469->8471 8472 401986 4 API calls 8470->8472 8483 4033f8 ??3@YAXPAX 8470->8483 8471->8470 8485 403405 8472->8485 8473 4034a7 8474 407776 55 API calls 8473->8474 8479 4034b1 ??3@YAXPAX 8474->8479 8475 40340a 8555 407776 8475->8555 8476->8473 8476->8483 8477 40346b ??3@YAXPAX 8482 4034bc 8477->8482 8478 40341d memcpy 8478->8485 8479->8482 8482->8393 8483->8482 8484 401986 4 API calls 8484->8485 8485->8475 8485->8477 8485->8478 8485->8484 8487 403037 8486->8487 8493 401804 8486->8493 8488 403048 8487->8488 8489 40303b SetLastError 8487->8489 8490 403051 8488->8490 8492 40305f FindFirstFileW 8488->8492 8488->8493 8489->8493 8574 402fed 8490->8574 8492->8490 8494 403072 FindClose CompareFileTime 8492->8494 8493->8395 8493->8396 8493->8397 8494->8490 8494->8493 8496 40ec65 8495->8496 8497 40ec86 VariantClear 8496->8497 8498 40ec9d 8496->8498 8497->8363 8498->8363 8615 40db3c 8499->8615 8503 40112b 2 API calls 8502->8503 8504 401311 8503->8504 8504->8406 8506 4012f7 2 API calls 8505->8506 8507 40e6a9 8506->8507 8507->8443 8535 40ecd7 8508->8535 8511 40ed12 8512 40a726 ??3@YAXPAX 8511->8512 8513 40ed17 _CxxThrowException 8511->8513 8512->8440 8513->8512 8538 40ec65 8514->8538 8516 40ecba 8517 40a7b2 8516->8517 8518 40ecbe memcpy 8516->8518 8517->8450 8518->8517 8520 40ed62 8519->8520 8521 40ed67 8519->8521 8522 40ecd7 VariantClear 8520->8522 8521->8440 8522->8521 8524 40ed82 8523->8524 8525 40ed87 8523->8525 8526 40ecd7 VariantClear 8524->8526 8525->8440 8526->8525 8528 40ed42 8527->8528 8529 40ed3d 8527->8529 8528->8440 8530 40ecd7 VariantClear 8529->8530 8530->8528 8532 40a3c2 8531->8532 8533 40a3de 8532->8533 8542 40eda0 8532->8542 8533->8440 8536 40eca9 VariantClear 8535->8536 8537 40ecdf SysAllocString 8536->8537 8537->8511 8537->8512 8539 40ec6d 8538->8539 8540 40ec86 VariantClear 8539->8540 8541 40ec9d 8539->8541 8540->8516 8541->8516 8543 40edae 8542->8543 8544 40eda9 8542->8544 8543->8533 8545 40ecd7 VariantClear 8544->8545 8545->8543 8547 401398 2 API calls 8546->8547 8548 4013f2 8547->8548 8548->8461 8550 4019c7 8549->8550 8551 401997 GetLastError 8549->8551 8550->8468 8552 4019b1 GetFileAttributesW 8551->8552 8554 4019a6 8551->8554 8552->8550 8552->8554 8553 4019a7 SetLastError 8553->8468 8554->8550 8554->8553 8556 401f9d 19 API calls 8555->8556 8557 40778a wvsprintfW 8556->8557 8558 407859 8557->8558 8559 4077ab GetLastError FormatMessageW 8557->8559 8562 4076a8 25 API calls 8558->8562 8560 4077d9 FormatMessageW 8559->8560 8561 4077ee lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 8559->8561 8560->8558 8560->8561 8566 4076a8 8561->8566 8564 407865 8562->8564 8564->8483 8567 407715 ??3@YAXPAX LocalFree 8566->8567 8568 4076b7 8566->8568 8567->8564 8569 40661a 2 API calls 8568->8569 8570 4076c6 IsWindow 8569->8570 8571 4076ef 8570->8571 8572 4076dd IsBadReadPtr 8570->8572 8573 4073d1 21 API calls 8571->8573 8572->8571 8573->8567 8580 402c86 8574->8580 8576 402ff6 8577 403017 8576->8577 8578 402ffb GetLastError 8576->8578 8577->8493 8579 403006 8578->8579 8579->8493 8581 402c93 GetFileAttributesW 8580->8581 8582 402c8f 8580->8582 8583 402ca4 8581->8583 8584 402ca9 8581->8584 8582->8576 8583->8576 8585 402cc7 8584->8585 8586 402cad SetFileAttributesW 8584->8586 8591 402b79 8585->8591 8588 402cc3 8586->8588 8589 402cba DeleteFileW 8586->8589 8588->8576 8589->8576 8592 4024fc 2 API calls 8591->8592 8593 402b90 8592->8593 8594 40254d 2 API calls 8593->8594 8595 402b9d FindFirstFileW 8594->8595 8596 402c55 SetFileAttributesW 8595->8596 8609 402bbf 8595->8609 8598 402c60 RemoveDirectoryW 8596->8598 8599 402c78 ??3@YAXPAX 8596->8599 8597 401329 2 API calls 8597->8609 8598->8599 8600 402c6d ??3@YAXPAX 8598->8600 8601 402c80 8599->8601 8600->8601 8601->8576 8603 40254d 2 API calls 8603->8609 8604 402c24 SetFileAttributesW 8604->8599 8606 402c2d DeleteFileW 8604->8606 8605 402bef lstrcmpW 8607 402c05 lstrcmpW 8605->8607 8608 402c38 FindNextFileW 8605->8608 8606->8609 8607->8608 8607->8609 8608->8609 8610 402c4e FindClose 8608->8610 8609->8597 8609->8599 8609->8603 8609->8604 8609->8605 8609->8608 8611 402b79 2 API calls 8609->8611 8612 401429 8609->8612 8610->8596 8611->8609 8613 401398 2 API calls 8612->8613 8614 401433 8613->8614 8614->8609 8616 40db1f 2 API calls 8615->8616 8617 401857 8616->8617 8617->8401 8617->8402 8619 40af0c 8618->8619 8634 408ebd 8618->8634 8619->8634 8711 40ac7a 8619->8711 8621 40af3f 8622 40ac7a 7 API calls 8621->8622 8623 40b0cb 8621->8623 8627 40af96 8622->8627 8625 40e959 ctype 4 API calls 8623->8625 8624 40afbd 8718 40e959 8624->8718 8625->8634 8627->8623 8627->8624 8628 40b043 8631 40e959 ctype 4 API calls 8628->8631 8629 408761 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8630 40afc6 8629->8630 8630->8628 8630->8629 8632 40b07f 8631->8632 8633 40e959 ctype 4 API calls 8632->8633 8633->8634 8634->8298 8635 4065ea InitializeCriticalSection 8634->8635 8635->8310 8730 4086f0 8636->8730 8682 40cdc7 8681->8682 8683 408761 4 API calls 8682->8683 8684 40cdde 8683->8684 8684->8310 8712 40e8da ctype 3 API calls 8711->8712 8713 40ac86 8712->8713 8722 40e811 8713->8722 8715 40aca2 8715->8621 8716 409403 4 API calls 8717 40ac90 8716->8717 8717->8715 8717->8716 8719 40e93b 8718->8719 8720 40e8da ctype 3 API calls 8719->8720 8721 40e943 ??3@YAXPAX 8720->8721 8721->8630 8723 40e8a5 8722->8723 8724 40e824 8722->8724 8723->8717 8725 40e833 _CxxThrowException 8724->8725 8726 40e863 ??2@YAPAXI 8724->8726 8727 40e895 ??3@YAXPAX 8724->8727 8725->8724 8726->8724 8728 40e879 memcpy 8726->8728 8727->8723 8728->8727 8731 40e8da ctype 3 API calls 8730->8731 8732 4086f8 8731->8732 8733 40e8da ctype 3 API calls 8732->8733 8734 408700 8733->8734 8735 40e8da ctype 3 API calls 8734->8735 8736 408708 8735->8736 9102 40dace 9105 40daac 9102->9105 9108 40da8f 9105->9108 9109 40da56 2 API calls 9108->9109 9110 40daa9 9109->9110 9092 40dadc ReadFile 9111 411def __set_app_type __p__fmode __p__commode 9112 411e5e 9111->9112 9113 411e72 9112->9113 9114 411e66 __setusermatherr 9112->9114 9123 411f66 _controlfp 9113->9123 9114->9113 9116 411e77 _initterm __getmainargs _initterm 9117 411ecb GetStartupInfoA 9116->9117 9119 411eff GetModuleHandleA 9117->9119 9124 4064af _EH_prolog 9119->9124 9123->9116 9127 404faa 9124->9127 9432 401b37 GetModuleHandleW CreateWindowExW 9127->9432 9130 404fdc 9131 40648e MessageBoxA 9130->9131 9133 404ff6 9130->9133 9132 4064a5 exit _XcptFilter 9131->9132 9134 401411 2 API calls 9133->9134 9135 40502d 9134->9135 9136 401411 2 API calls 9135->9136 9137 405035 9136->9137 9435 403e23 9137->9435 9142 40254d 2 API calls 9143 405073 9142->9143 9444 402a69 9143->9444 9145 40507c 9458 403d71 9145->9458 9149 40509b _wtol 9151 4050b1 9149->9151 9150 4050d6 9152 403d71 6 API calls 9150->9152 9463 404405 9151->9463 9153 4050e1 9152->9153 9154 4050e7 9153->9154 9155 405118 9153->9155 9620 404996 9154->9620 9156 405130 GetModuleFileNameW 9155->9156 9158 40112b 2 API calls 9155->9158 9159 405151 9156->9159 9160 405142 9156->9160 9158->9156 9165 403d71 6 API calls 9159->9165 9161 407776 55 API calls 9160->9161 9170 4050ec 9161->9170 9162 4050ee ??3@YAXPAX 9638 403e70 9162->9638 9164 4050ff ??3@YAXPAX ??3@YAXPAX 9164->9132 9178 405173 9165->9178 9166 4052d5 9167 401362 2 API calls 9166->9167 9168 4052e5 9167->9168 9169 401362 2 API calls 9168->9169 9173 4052f2 9169->9173 9170->9162 9171 4051fa 9171->9170 9172 40522a 9171->9172 9175 405213 _wtol 9171->9175 9176 403d71 6 API calls 9172->9176 9174 40538d ??2@YAPAXI 9173->9174 9177 401329 2 API calls 9173->9177 9184 405399 9174->9184 9175->9172 9182 405289 9176->9182 9179 405327 9177->9179 9178->9166 9178->9170 9178->9171 9178->9172 9181 401429 2 API calls 9178->9181 9180 401329 2 API calls 9179->9180 9186 40533d 9180->9186 9181->9178 9182->9166 9183 404594 2 API calls 9182->9183 9185 4052ba 9183->9185 9187 4053cf 9184->9187 9191 407776 55 API calls 9184->9191 9185->9166 9189 401362 2 API calls 9185->9189 9190 401362 2 API calls 9186->9190 9488 4025ae 9187->9488 9189->9166 9193 405367 9190->9193 9191->9187 9195 401f9d 19 API calls 9193->9195 9194 4025ae 2 API calls 9196 4053f6 9194->9196 9197 40536e 9195->9197 9198 4025ae 2 API calls 9196->9198 9199 40254d 2 API calls 9197->9199 9201 4053fe 9198->9201 9200 405377 9199->9200 9200->9174 9491 404e3f 9201->9491 9206 40546f 9207 405534 9206->9207 9210 403d71 6 API calls 9206->9210 9209 40e8da ctype 3 API calls 9207->9209 9208 402844 10 API calls 9211 405441 9208->9211 9212 40553c 9209->9212 9213 405493 9210->9213 9211->9206 9214 407776 55 API calls 9211->9214 9215 405573 9212->9215 9669 403093 9212->9669 9213->9207 9224 40549d 9213->9224 9216 405450 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9214->9216 9218 405506 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9215->9218 9219 40557c 9215->9219 9216->9206 9218->9162 9218->9170 9222 405588 wsprintfW 9219->9222 9223 4055ed 9219->9223 9230 401411 2 API calls 9219->9230 9232 401329 ??2@YAPAXI ??3@YAXPAX 9219->9232 9234 401f9d 19 API calls 9219->9234 9703 402f6c ??2@YAPAXI 9219->9703 9709 402425 ??3@YAXPAX ??3@YAXPAX 9219->9709 9221 405556 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9225 4054f5 9221->9225 9226 401411 2 API calls 9222->9226 9519 404603 9223->9519 9224->9218 9643 404cbc 9224->9643 9225->9218 9226->9219 9229 4054cc 9229->9218 9231 407776 55 API calls 9229->9231 9230->9219 9233 4054da ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9231->9233 9232->9219 9233->9225 9234->9219 9235 40584a 9236 404603 26 API calls 9235->9236 9268 40586a 9236->9268 9240 405933 9581 404034 9240->9581 9241 4024fc 2 API calls 9241->9268 9245 4059d8 CoInitialize 9251 40243b lstrcmpW 9245->9251 9246 40595a 9249 40243b lstrcmpW 9246->9249 9247 405935 ??3@YAXPAX 9247->9240 9250 405969 9249->9250 9252 405979 9250->9252 9255 401f9d 19 API calls 9250->9255 9253 4059fe 9251->9253 9736 403b40 9252->9736 9256 405a12 9253->9256 9259 401329 2 API calls 9253->9259 9254 401411 ??2@YAPAXI ??3@YAXPAX 9254->9268 9255->9252 9587 403b59 9256->9587 9258 401362 2 API calls 9258->9268 9259->9256 9263 4073d1 21 API calls 9267 40599c ctype 9263->9267 9264 401329 2 API calls 9264->9268 9265 4055f6 9265->9235 9275 403b94 lstrlenW lstrlenW _wcsnicmp 9265->9275 9279 4057dd _wtol 9265->9279 9294 405878 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9265->9294 9710 40484d 9265->9710 9721 40408b 9265->9721 9266 405a4d 9272 405a2b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9266->9272 9308 405a61 9266->9308 9756 4082e9 9266->9756 9273 4059a7 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9267->9273 9268->9240 9268->9241 9268->9247 9268->9254 9268->9258 9268->9264 9271 402f6c 7 API calls 9268->9271 9578 40243b 9268->9578 9735 402425 ??3@YAXPAX ??3@YAXPAX 9268->9735 9271->9268 9272->9266 9273->9170 9275->9265 9276 405910 ??3@YAXPAX 9276->9268 9277 401411 2 API calls 9277->9308 9279->9265 9280 405bd8 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9301 405bf3 9280->9301 9281 405a9f GetKeyState 9281->9308 9282 405c6c 9285 405ca2 9282->9285 9286 405c74 9282->9286 9283 401329 ??2@YAPAXI ??3@YAXPAX 9283->9308 9284 40243b lstrcmpW 9284->9308 9289 4012f7 2 API calls 9285->9289 9798 403f85 9286->9798 9292 405cb0 9289->9292 9295 403b59 15 API calls 9292->9295 9293 401362 2 API calls 9299 405c91 ??3@YAXPAX 9293->9299 9294->9170 9297 405cb9 9295->9297 9296 407776 55 API calls 9298 405c13 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9296->9298 9300 405cca ??3@YAXPAX 9297->9300 9304 401362 2 API calls 9297->9304 9298->9301 9305 405cd9 9299->9305 9300->9305 9301->9296 9302 405c4a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9301->9302 9302->9301 9303 405bcd ??3@YAXPAX 9303->9308 9304->9300 9306 405d24 9305->9306 9307 405d16 9305->9307 9811 40786b 9306->9811 9594 404a44 9307->9594 9308->9277 9308->9280 9308->9281 9308->9282 9308->9283 9308->9284 9308->9301 9308->9302 9308->9303 9311 401429 ??2@YAPAXI ??3@YAXPAX 9308->9311 9783 407613 9308->9783 9792 407674 9308->9792 9311->9308 9312 405d20 9313 405d65 9312->9313 9817 403e0d 9312->9817 9314 404034 21 API calls 9313->9314 9316 405d77 9314->9316 9318 406373 9316->9318 9319 401411 2 API calls 9316->9319 9321 4063f7 ctype 9318->9321 9324 40243b lstrcmpW 9318->9324 9320 405d95 9319->9320 9364 405da8 9320->9364 9821 40453e 9320->9821 9323 40643a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9321->9323 9329 40243b lstrcmpW 9321->9329 9325 406461 9323->9325 9326 406467 ??3@YAXPAX 9323->9326 9327 4063a4 9324->9327 9325->9326 9328 403e70 ctype 4 API calls 9326->9328 9327->9321 9848 403f48 9327->9848 9330 406478 ??3@YAXPAX ??3@YAXPAX 9328->9330 9332 406416 9329->9332 9330->9132 9331 401411 ??2@YAPAXI ??3@YAXPAX 9331->9364 9332->9323 9336 406423 9332->9336 9335 405dd8 9338 405de5 9335->9338 9339 4061fa ??3@YAXPAX ??3@YAXPAX 9335->9339 9341 4012f7 2 API calls 9336->9341 9337 4073d1 21 API calls 9342 4063e0 ??3@YAXPAX 9337->9342 9830 4043c6 9338->9830 9343 406312 9339->9343 9340 40243b lstrcmpW 9340->9364 9345 406432 9341->9345 9342->9321 9349 40636a ??3@YAXPAX 9343->9349 9350 404034 21 API calls 9343->9350 9853 404aff 9345->9853 9348 405e45 9352 401329 2 API calls 9348->9352 9349->9318 9354 406321 9350->9354 9355 405e4e 9352->9355 9353 4043c6 2 API calls 9356 405e0e 9353->9356 9838 4048ab 9354->9838 9360 403b7f 19 API calls 9355->9360 9361 401362 2 API calls 9356->9361 9358 40626b ??3@YAXPAX ??3@YAXPAX 9358->9343 9359 401329 2 API calls 9359->9364 9378 405e57 9360->9378 9362 405e1a ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9361->9362 9365 406211 9362->9365 9366 405e41 9362->9366 9363 40633a SetCurrentDirectoryW 9367 4048ab 4 API calls 9363->9367 9364->9331 9364->9335 9364->9340 9364->9348 9364->9358 9364->9359 9368 401429 2 API calls 9364->9368 9371 403e0d 16 API calls 9365->9371 9366->9348 9369 406362 9367->9369 9370 405ee5 ??3@YAXPAX ??3@YAXPAX 9368->9370 9372 403e0d 16 API calls 9369->9372 9370->9364 9373 406216 9371->9373 9372->9349 9374 407776 55 API calls 9373->9374 9375 40621f 7 API calls 9374->9375 9376 40625e 9375->9376 9376->9358 9377 403bce lstrlenW lstrlenW _wcsnicmp 9377->9378 9378->9377 9379 405f61 _wtol 9378->9379 9380 406025 9378->9380 9379->9378 9381 406080 9380->9381 9382 40602e 9380->9382 9383 401362 2 API calls 9381->9383 9384 406053 9382->9384 9385 406034 9382->9385 9386 40607e 9383->9386 9388 401329 2 API calls 9384->9388 9387 401329 2 API calls 9385->9387 9389 40254d 2 API calls 9386->9389 9390 40603f 9387->9390 9391 406051 9388->9391 9392 406092 9389->9392 9393 40254d 2 API calls 9390->9393 9394 40243b lstrcmpW 9391->9394 9395 401411 2 API calls 9392->9395 9396 406048 9393->9396 9397 406068 9394->9397 9398 40609a 9395->9398 9399 40254d 2 API calls 9396->9399 9397->9392 9401 40254d 2 API calls 9397->9401 9400 401411 2 API calls 9398->9400 9399->9391 9402 4060a2 memset 9400->9402 9401->9386 9403 4060e1 9402->9403 9404 404594 2 API calls 9403->9404 9405 4060fe 9404->9405 9406 401329 2 API calls 9405->9406 9407 406109 9406->9407 9408 403b7f 19 API calls 9407->9408 9409 406112 9408->9409 9410 4061b1 9409->9410 9614 4021ed 9409->9614 9412 4062ee ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9410->9412 9414 4061c5 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9410->9414 9412->9343 9414->9339 9415 406150 9417 403b7f 19 API calls 9415->9417 9416 401429 2 API calls 9418 406147 9416->9418 9419 406168 ShellExecuteExW 9417->9419 9420 40254d 2 API calls 9418->9420 9422 406282 9419->9422 9423 40618c 9419->9423 9420->9415 9426 407776 55 API calls 9422->9426 9424 4061a0 CloseHandle 9423->9424 9425 406192 WaitForSingleObject 9423->9425 9835 402185 9424->9835 9425->9424 9428 40628c 9426->9428 9429 403e0d 16 API calls 9428->9429 9430 406291 9 API calls 9429->9430 9431 4062e1 9430->9431 9431->9412 9433 401b6c SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9432->9433 9434 401b9f GetVersionExW 9432->9434 9433->9434 9434->9130 9434->9131 9436 40112b 2 API calls 9435->9436 9437 403e38 GetCommandLineW 9436->9437 9438 404594 9437->9438 9439 4045ce 9438->9439 9441 4045a2 9438->9441 9440 4045c6 9439->9440 9443 401429 2 API calls 9439->9443 9440->9142 9441->9440 9442 401429 2 API calls 9441->9442 9442->9441 9443->9439 9445 401411 2 API calls 9444->9445 9453 402a79 9445->9453 9446 401362 2 API calls 9447 402b6c ??3@YAXPAX 9446->9447 9447->9145 9448 402b5f 9448->9446 9450 401411 2 API calls 9450->9453 9451 401429 ??2@YAPAXI ??3@YAXPAX 9451->9453 9453->9448 9453->9450 9453->9451 9454 401362 2 API calls 9453->9454 9892 4025c6 9453->9892 9895 40272e 9453->9895 9455 402ad9 ??3@YAXPAX 9454->9455 9456 4013e2 2 API calls 9455->9456 9457 402aee ??3@YAXPAX ??3@YAXPAX 9456->9457 9457->9453 9459 403d80 9458->9459 9460 403dbd 9459->9460 9461 403d9a lstrlenW lstrlenW 9459->9461 9460->9149 9460->9151 9906 401a85 9461->9906 9464 401f47 3 API calls 9463->9464 9465 404416 9464->9465 9466 401f9d 19 API calls 9465->9466 9467 40441d 9466->9467 9468 401f9d 19 API calls 9467->9468 9469 404429 9468->9469 9470 401f9d 19 API calls 9469->9470 9471 404435 9470->9471 9472 401f9d 19 API calls 9471->9472 9473 404441 9472->9473 9474 401f9d 19 API calls 9473->9474 9475 40444d 9474->9475 9476 401f9d 19 API calls 9475->9476 9477 404459 9476->9477 9478 401f9d 19 API calls 9477->9478 9479 404465 9478->9479 9480 404480 SHGetSpecialFolderPathW 9479->9480 9483 404533 #17 9479->9483 9484 401411 2 API calls 9479->9484 9485 401329 ??2@YAPAXI ??3@YAXPAX 9479->9485 9487 402f6c 7 API calls 9479->9487 9911 402425 ??3@YAXPAX ??3@YAXPAX 9479->9911 9480->9479 9481 40449a wsprintfW 9480->9481 9482 401411 2 API calls 9481->9482 9482->9479 9483->9150 9484->9479 9485->9479 9487->9479 9489 4022b0 2 API calls 9488->9489 9490 4025c2 9489->9490 9490->9194 9912 403e86 9491->9912 9493 404e56 9494 403e86 2 API calls 9493->9494 9495 404e65 9494->9495 9916 404343 9495->9916 9499 404e82 ??3@YAXPAX 9500 404343 3 API calls 9499->9500 9501 404e9d 9500->9501 9502 403ec1 2 API calls 9501->9502 9503 404ea8 ??3@YAXPAX wsprintfA 9502->9503 9932 403ef6 9503->9932 9505 404ed0 9506 403ef6 2 API calls 9505->9506 9507 404edb 9506->9507 9508 402844 9507->9508 9509 402851 9508->9509 9517 40dcfb 3 API calls 9509->9517 9510 402863 lstrlenA lstrlenA 9515 402890 9510->9515 9511 40296e 9511->9206 9511->9208 9512 40293b memmove 9512->9511 9512->9515 9513 4028db memcmp 9513->9511 9513->9515 9514 402918 memcmp 9514->9515 9515->9511 9515->9512 9515->9513 9515->9514 9518 40dcc7 GetLastError 9515->9518 9943 402640 9515->9943 9517->9510 9518->9515 9520 40243b lstrcmpW 9519->9520 9521 40461c 9520->9521 9522 40466c 9521->9522 9524 401329 2 API calls 9521->9524 9523 40243b lstrcmpW 9522->9523 9525 40468a 9523->9525 9526 404633 9524->9526 9528 40243b lstrcmpW 9525->9528 9527 401f9d 19 API calls 9526->9527 9529 40463a 9527->9529 9531 4046a2 9528->9531 9530 40254d 2 API calls 9529->9530 9532 404643 9530->9532 9533 40243b lstrcmpW 9531->9533 9534 401329 2 API calls 9532->9534 9535 4046ba 9533->9535 9536 40465c 9534->9536 9538 40243b lstrcmpW 9535->9538 9537 401f9d 19 API calls 9536->9537 9539 404663 9537->9539 9540 4046d2 9538->9540 9541 40254d 2 API calls 9539->9541 9542 4046e9 9540->9542 9543 4046d9 lstrcmpiW 9540->9543 9541->9522 9544 40243b lstrcmpW 9542->9544 9543->9542 9545 4046ff 9544->9545 9546 40243b lstrcmpW 9545->9546 9547 40472c 9546->9547 9550 404739 9547->9550 9946 403d1f 9547->9946 9549 40243b lstrcmpW 9554 40474d 9549->9554 9550->9549 9551 40476d 9553 40243b lstrcmpW 9551->9553 9559 404780 9553->9559 9554->9551 9555 40243b lstrcmpW 9554->9555 9950 403cc6 9554->9950 9555->9554 9556 4047a0 9558 40243b lstrcmpW 9556->9558 9560 4047ac 9558->9560 9559->9556 9561 40243b lstrcmpW 9559->9561 9954 403cf7 9559->9954 9562 40243b lstrcmpW 9560->9562 9561->9559 9563 4047bd 9562->9563 9564 40243b lstrcmpW 9563->9564 9565 4047ce 9564->9565 9566 4047e4 9565->9566 9567 4047db _wtol 9565->9567 9568 40243b lstrcmpW 9566->9568 9567->9566 9569 4047f0 9568->9569 9570 404800 9569->9570 9571 4047f7 _wtol 9569->9571 9572 40243b lstrcmpW 9570->9572 9571->9570 9573 40480c 9572->9573 9574 40243b lstrcmpW 9573->9574 9575 404824 9574->9575 9576 40243b lstrcmpW 9575->9576 9577 40483c 9576->9577 9577->9265 9962 4023dd 9578->9962 9582 404045 9581->9582 9583 404088 9581->9583 9584 4012f7 2 API calls 9582->9584 9585 403b7f 19 API calls 9582->9585 9583->9245 9583->9246 9584->9582 9586 404062 SetEnvironmentVariableW ??3@YAXPAX 9585->9586 9586->9582 9586->9583 9588 40393b 7 API calls 9587->9588 9589 403b69 9588->9589 9590 4039f6 7 API calls 9589->9590 9591 403b74 9590->9591 9592 4027c7 6 API calls 9591->9592 9593 403b7a 9592->9593 9593->9266 9739 4083b6 9593->9739 9966 408676 9594->9966 9596 404a55 ??2@YAPAXI 9597 404a64 9596->9597 9611 40dcfb 3 API calls 9597->9611 9598 404a85 9968 40a7de _EH_prolog 9598->9968 9984 40b2fc 9598->9984 9599 404a95 9600 404ab3 9599->9600 9601 404a99 9599->9601 9603 404ada ??2@YAPAXI 9600->9603 9607 403354 86 API calls 9600->9607 9602 407776 55 API calls 9601->9602 9606 404aa1 9602->9606 9604 404ae6 9603->9604 9605 404aed 9603->9605 10009 404292 9604->10009 9990 40150b 9605->9990 9606->9312 9609 404ac6 9607->9609 9609->9603 9609->9606 9611->9598 9615 402200 LoadLibraryA GetProcAddress 9614->9615 9616 4021fb 9614->9616 9617 40221b 9615->9617 9618 402223 9615->9618 9616->9410 9616->9415 9616->9416 9617->9616 9618->9617 10472 4021b9 LoadLibraryA GetProcAddress 9618->10472 9621 40661a 2 API calls 9620->9621 9622 4049af 9621->9622 9623 401f9d 19 API calls 9622->9623 9624 4049bd 9623->9624 9625 4024fc 2 API calls 9624->9625 9626 4049c7 9625->9626 9627 4049fd 9626->9627 9629 40254d ??2@YAPAXI ??3@YAXPAX 9626->9629 9628 40254d 2 API calls 9627->9628 9630 404a0a 9628->9630 9629->9626 9631 401f9d 19 API calls 9630->9631 9632 404a11 9631->9632 9633 40254d 2 API calls 9632->9633 9634 404a1b 9633->9634 9635 4073d1 21 API calls 9634->9635 9636 404a30 ??3@YAXPAX 9635->9636 9637 404a41 ctype 9636->9637 9637->9170 9639 40e8da ctype 3 API calls 9638->9639 9640 403e7e 9639->9640 9641 40e8da ctype 3 API calls 9640->9641 9642 40e943 ??3@YAXPAX 9641->9642 9642->9164 9644 40db53 2 API calls 9643->9644 9645 404ce8 9644->9645 9646 404d44 9645->9646 9648 4024fc 2 API calls 9645->9648 9647 4025ae 2 API calls 9646->9647 9649 404d4c 9647->9649 9650 404cf7 9648->9650 9651 403e86 2 API calls 9649->9651 9654 404db5 ??3@YAXPAX 9650->9654 9656 403354 86 API calls 9650->9656 9652 404d59 9651->9652 9653 403ef6 2 API calls 9652->9653 9655 404d66 9653->9655 9668 404db1 9654->9668 9657 403ef6 2 API calls 9655->9657 9658 404d1b 9656->9658 9659 404d73 9657->9659 9658->9654 9661 40db53 2 API calls 9658->9661 9660 403ef6 2 API calls 9659->9660 9662 404d80 9660->9662 9663 404d37 9661->9663 9664 40dd5f 2 API calls 9662->9664 9663->9654 9665 404d3b ??3@YAXPAX 9663->9665 9666 404d94 9664->9666 9665->9646 9666->9654 9667 404d9d ??3@YAXPAX 9666->9667 9667->9668 9668->9229 9670 4025ae 2 API calls 9669->9670 9686 4030a8 9670->9686 9671 403301 9672 403344 ??3@YAXPAX 9671->9672 9673 40334e 9672->9673 9673->9215 9673->9221 9674 401411 ??2@YAPAXI ??3@YAXPAX 9674->9686 9676 40272e ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 9676->9686 9677 401362 2 API calls 9678 4030f3 ??3@YAXPAX ??3@YAXPAX 9677->9678 9679 403303 9678->9679 9678->9686 10480 4029c3 9679->10480 9683 40331c ??3@YAXPAX 9683->9673 9684 4031e5 strncmp 9685 4031d0 strncmp 9684->9685 9684->9686 9685->9684 9685->9686 9686->9671 9686->9674 9686->9676 9686->9677 9686->9679 9686->9684 9687 401362 2 API calls 9686->9687 9688 402640 2 API calls 9686->9688 9691 402640 ??2@YAPAXI ??3@YAXPAX 9686->9691 9693 4023dd lstrcmpW 9686->9693 9694 402f6c 7 API calls 9686->9694 9696 403330 9686->9696 9697 4032b2 lstrcmpW 9686->9697 9701 401329 2 API calls 9686->9701 10474 402986 9686->10474 10479 402425 ??3@YAXPAX ??3@YAXPAX 9686->10479 9689 403252 ??3@YAXPAX 9687->9689 9688->9685 9690 402a69 9 API calls 9689->9690 9692 403263 lstrcmpW 9690->9692 9691->9686 9692->9686 9693->9686 9694->9686 9699 402f6c 7 API calls 9696->9699 9697->9686 9698 4032c0 lstrcmpW 9697->9698 9698->9686 9700 40333c 9699->9700 10498 402425 ??3@YAXPAX ??3@YAXPAX 9700->10498 9701->9686 9704 402f86 9703->9704 9705 402f7b 9703->9705 9707 408761 4 API calls 9704->9707 10500 402668 9705->10500 9708 402f92 9707->9708 9708->9219 9709->9219 9711 4024fc 2 API calls 9710->9711 9712 40485f 9711->9712 9713 40254d 2 API calls 9712->9713 9714 40486c 9713->9714 9715 404888 9714->9715 9716 401429 2 API calls 9714->9716 9717 40254d 2 API calls 9715->9717 9716->9714 9718 404892 9717->9718 9719 40408b 94 API calls 9718->9719 9720 40489d ??3@YAXPAX 9719->9720 9720->9265 9722 4040a2 lstrlenW 9721->9722 9723 4040ce 9721->9723 9724 401a85 4 API calls 9722->9724 9723->9265 9725 4040b8 9724->9725 9725->9722 9725->9723 9726 4040d5 9725->9726 9727 4024fc 2 API calls 9726->9727 9730 4040de 9727->9730 10505 402776 9730->10505 9731 403093 84 API calls 9732 40414c 9731->9732 9733 404156 ??3@YAXPAX ??3@YAXPAX 9732->9733 9734 40416d ??3@YAXPAX ??3@YAXPAX 9732->9734 9733->9723 9734->9723 9735->9276 9737 40661a 2 API calls 9736->9737 9738 403b48 9737->9738 9738->9263 9740 408646 9739->9740 9752 4083d5 ctype 9739->9752 9740->9272 9741 40661a 2 API calls 9741->9752 9742 40243b lstrcmpW 9742->9752 9743 40786b 23 API calls 9743->9752 9745 407674 23 API calls 9745->9752 9746 407613 23 API calls 9746->9752 9747 403b40 2 API calls 9747->9752 9748 401f9d 19 API calls 9748->9752 9749 403f48 4 API calls 9749->9752 9750 4073d1 21 API calls 9750->9752 9751 407776 55 API calls 9751->9752 9752->9740 9752->9741 9752->9742 9752->9743 9752->9745 9752->9746 9752->9747 9752->9748 9752->9749 9752->9750 9752->9751 9753 407717 25 API calls 9752->9753 9754 4073d1 21 API calls 9752->9754 10515 40744b 9752->10515 9753->9752 9755 408476 ??3@YAXPAX 9754->9755 9755->9752 9757 40243b lstrcmpW 9756->9757 9758 4082fd 9757->9758 9759 40830b 9758->9759 10519 4019f0 GetStdHandle WriteFile 9758->10519 9761 40831e 9759->9761 10520 4019f0 GetStdHandle WriteFile 9759->10520 9763 408333 9761->9763 10521 4019f0 GetStdHandle WriteFile 9761->10521 9767 408344 9763->9767 10522 4019f0 GetStdHandle WriteFile 9763->10522 9765 40243b lstrcmpW 9769 408351 9765->9769 9767->9765 9768 40835f 9771 40243b lstrcmpW 9768->9771 9769->9768 10523 4019f0 GetStdHandle WriteFile 9769->10523 9772 40836c 9771->9772 9773 40837a 9772->9773 10524 4019f0 GetStdHandle WriteFile 9772->10524 9775 40243b lstrcmpW 9773->9775 9776 408387 9775->9776 9777 408395 9776->9777 10525 4019f0 GetStdHandle WriteFile 9776->10525 9779 40243b lstrcmpW 9777->9779 9780 4083a2 9779->9780 9781 4083b2 9780->9781 10526 4019f0 GetStdHandle WriteFile 9780->10526 9781->9266 9784 407636 9783->9784 9785 407658 9784->9785 9786 40764b 9784->9786 10530 407186 9785->10530 10527 407154 9786->10527 9789 407653 9790 4073d1 21 API calls 9789->9790 9791 407671 9790->9791 9791->9308 9793 407689 9792->9793 9794 40716d 2 API calls 9793->9794 9795 407694 9794->9795 9796 4073d1 21 API calls 9795->9796 9797 4076a5 9796->9797 9797->9308 9799 401411 2 API calls 9798->9799 9800 403f96 9799->9800 9801 402535 2 API calls 9800->9801 9802 403f9f GetTempPathW 9801->9802 9803 403fb8 9802->9803 9808 403fcf 9802->9808 9804 402535 2 API calls 9803->9804 9805 403fc3 GetTempPathW 9804->9805 9805->9808 9806 402535 2 API calls 9807 403ff2 wsprintfW 9806->9807 9807->9808 9808->9806 9809 404009 GetFileAttributesW 9808->9809 9810 40402d 9808->9810 9809->9808 9809->9810 9810->9293 9812 40787e 9811->9812 10536 40719f 9812->10536 9815 4073d1 21 API calls 9816 4078b3 9815->9816 9816->9312 9818 403e21 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9817->9818 9819 403e16 9817->9819 9818->9313 9820 402c86 16 API calls 9819->9820 9820->9818 9822 40243b lstrcmpW 9821->9822 9823 40455d 9822->9823 9824 404592 9823->9824 9825 401329 2 API calls 9823->9825 9824->9364 9826 40456c 9825->9826 9827 403b7f 19 API calls 9826->9827 9828 404572 9827->9828 9828->9824 9829 401429 2 API calls 9828->9829 9829->9824 9831 4012f7 2 API calls 9830->9831 9832 4043d4 9831->9832 9833 40254d 2 API calls 9832->9833 9834 4043df 9833->9834 9834->9353 9836 4021a9 9835->9836 9837 40218e LoadLibraryA GetProcAddress 9835->9837 9836->9410 9837->9836 9839 401411 2 API calls 9838->9839 9846 4048bc 9839->9846 9840 401329 2 API calls 9840->9846 9841 40494e 9842 404988 ??3@YAXPAX 9841->9842 9844 4048ab 3 API calls 9841->9844 9842->9363 9843 401429 2 API calls 9843->9846 9845 404985 9844->9845 9845->9842 9846->9840 9846->9841 9846->9843 9847 40243b lstrcmpW 9846->9847 9847->9846 9849 40661a 2 API calls 9848->9849 9850 403f50 9849->9850 9851 401411 2 API calls 9850->9851 9852 403f5e 9851->9852 9852->9337 9854 404cb1 ??3@YAXPAX 9853->9854 9855 404b15 9853->9855 9857 404cb7 9854->9857 9855->9854 9856 404b29 GetDriveTypeW 9855->9856 9856->9854 9858 404b55 9856->9858 9857->9323 9859 403f85 6 API calls 9858->9859 9860 404b63 CreateFileW 9859->9860 9861 404b89 9860->9861 9862 404c7b ??3@YAXPAX ??3@YAXPAX 9860->9862 9863 401411 2 API calls 9861->9863 9862->9857 9864 404b92 9863->9864 9865 401329 2 API calls 9864->9865 9866 404b9f 9865->9866 9867 40254d 2 API calls 9866->9867 9868 404bad 9867->9868 9869 4013e2 2 API calls 9868->9869 9870 404bb9 9869->9870 9871 40254d 2 API calls 9870->9871 9872 404bc7 9871->9872 9873 40254d 2 API calls 9872->9873 9874 404bd4 9873->9874 9875 4013e2 2 API calls 9874->9875 9876 404be0 9875->9876 9877 40254d 2 API calls 9876->9877 9878 404bed 9877->9878 9879 40254d 2 API calls 9878->9879 9880 404bf6 9879->9880 9881 4013e2 2 API calls 9880->9881 9882 404c02 9881->9882 9883 40254d 2 API calls 9882->9883 9884 404c0b 9883->9884 9885 402776 3 API calls 9884->9885 9886 404c1d WriteFile ??3@YAXPAX CloseHandle 9885->9886 9887 404c4b 9886->9887 9888 404c8c 9886->9888 9887->9888 9889 404c53 SetFileAttributesW ShellExecuteW ??3@YAXPAX 9887->9889 9890 402c86 16 API calls 9888->9890 9889->9862 9891 404c94 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9890->9891 9891->9857 9901 4022b0 9892->9901 9896 401411 2 API calls 9895->9896 9897 40273a 9896->9897 9898 402772 9897->9898 9899 402535 2 API calls 9897->9899 9898->9453 9900 402757 MultiByteToWideChar 9899->9900 9900->9898 9902 4022be ??2@YAPAXI 9901->9902 9903 4022ea 9901->9903 9902->9903 9904 4022cf ??3@YAXPAX 9902->9904 9903->9453 9904->9903 9907 401ae3 9906->9907 9910 401a97 9906->9910 9907->9460 9908 401abc CharUpperW CharUpperW 9909 401af3 CharUpperW CharUpperW 9908->9909 9908->9910 9909->9907 9910->9907 9910->9908 9911->9479 9913 403e9e 9912->9913 9914 4022b0 2 API calls 9913->9914 9915 403eac 9914->9915 9915->9493 9917 40435e 9916->9917 9918 404375 9917->9918 9919 40436a 9917->9919 9920 4025ae 2 API calls 9918->9920 9936 4025f6 9919->9936 9922 40437e 9920->9922 9923 4022b0 2 API calls 9922->9923 9924 404387 9923->9924 9926 4025f6 2 API calls 9924->9926 9925 404373 9928 403ec1 9925->9928 9927 4043b5 ??3@YAXPAX 9926->9927 9927->9925 9929 403ecd 9928->9929 9931 403ede 9928->9931 9930 4022b0 2 API calls 9929->9930 9930->9931 9931->9499 9933 403f06 9932->9933 9933->9933 9939 4022fc 9933->9939 9935 403f13 9935->9505 9937 4022b0 2 API calls 9936->9937 9938 402610 9937->9938 9938->9925 9940 402340 9939->9940 9941 402310 9939->9941 9940->9935 9942 4022b0 2 API calls 9941->9942 9942->9940 9944 4022fc 2 API calls 9943->9944 9945 40264a 9944->9945 9945->9515 9947 403d3d 9946->9947 9958 403c63 9947->9958 9951 403cd3 9950->9951 9952 403c63 _wtol 9951->9952 9953 403cf4 9952->9953 9953->9554 9955 403d04 9954->9955 9956 403c63 _wtol 9955->9956 9957 403d1c 9956->9957 9957->9559 9959 403c6d 9958->9959 9960 403c88 _wtol 9959->9960 9961 403cc1 9959->9961 9960->9959 9961->9550 9963 4023e8 9962->9963 9964 4023f4 lstrcmpW 9963->9964 9965 402411 9963->9965 9964->9963 9964->9965 9965->9268 9967 408679 9966->9967 9967->9596 9969 40a7fe 9968->9969 9970 40b2fc 11 API calls 9969->9970 9971 40a823 9970->9971 9972 40a845 9971->9972 9973 40a82c 9971->9973 10014 40cc59 _EH_prolog 9972->10014 10017 40a3fe 9973->10017 9985 40b30d 9984->9985 9989 40dcfb 3 API calls 9985->9989 9986 40b321 9987 40b331 9986->9987 10453 40b163 9986->10453 9987->9599 9989->9986 9991 40151e 9990->9991 9992 401329 2 API calls 9991->9992 9993 40152b 9992->9993 9994 401429 2 API calls 9993->9994 9995 401534 CreateThread 9994->9995 9996 401563 9995->9996 9997 401568 WaitForSingleObject 9995->9997 10466 40129c 9995->10466 9998 40786b 23 API calls 9996->9998 9999 401585 9997->9999 10000 4015b7 9997->10000 9998->9997 10003 4015a3 9999->10003 10006 401594 9999->10006 10001 4015b3 10000->10001 10002 4015bf GetExitCodeThread 10000->10002 10001->9606 10004 4015d6 10002->10004 10005 407776 55 API calls 10003->10005 10004->10001 10004->10006 10007 401605 SetLastError 10004->10007 10005->10001 10006->10001 10008 407776 55 API calls 10006->10008 10007->10006 10008->10001 10010 401411 2 API calls 10009->10010 10011 4042ab 10010->10011 10012 401411 2 API calls 10011->10012 10013 4042b7 10012->10013 10013->9605 10025 40c9fc 10014->10025 10436 40a28e 10017->10436 10047 40a0bf 10025->10047 10181 40a030 10047->10181 10182 40e8da ctype 3 API calls 10181->10182 10183 40a039 10182->10183 10184 40e8da ctype 3 API calls 10183->10184 10185 40a041 10184->10185 10186 40e8da ctype 3 API calls 10185->10186 10187 40a049 10186->10187 10188 40e8da ctype 3 API calls 10187->10188 10189 40a051 10188->10189 10190 40e8da ctype 3 API calls 10189->10190 10191 40a059 10190->10191 10192 40e8da ctype 3 API calls 10191->10192 10193 40a061 10192->10193 10194 40e8da ctype 3 API calls 10193->10194 10195 40a06b 10194->10195 10196 40e8da ctype 3 API calls 10195->10196 10197 40a073 10196->10197 10198 40e8da ctype 3 API calls 10197->10198 10199 40a080 10198->10199 10200 40e8da ctype 3 API calls 10199->10200 10201 40a088 10200->10201 10202 40e8da ctype 3 API calls 10201->10202 10203 40a095 10202->10203 10204 40e8da ctype 3 API calls 10203->10204 10205 40a09d 10204->10205 10206 40e8da ctype 3 API calls 10205->10206 10207 40a0aa 10206->10207 10208 40e8da ctype 3 API calls 10207->10208 10209 40a0b2 10208->10209 10437 40e8da ctype 3 API calls 10436->10437 10438 40a29c 10437->10438 10454 40f0b6 GetLastError 10453->10454 10456 40b17e 10454->10456 10455 40b192 10455->9987 10456->10455 10457 40adc3 3 API calls 10456->10457 10458 40b1b6 memcpy 10457->10458 10463 40b1d9 10458->10463 10459 40b297 ??3@YAXPAX 10459->10455 10460 40b2a2 ??3@YAXPAX 10460->10455 10462 40b27a memmove 10462->10463 10463->10459 10463->10460 10463->10462 10464 40b2ac memcpy 10463->10464 10465 40dcfb 3 API calls 10464->10465 10465->10460 10467 4012a5 10466->10467 10468 4012b8 10466->10468 10467->10468 10469 4012a7 Sleep 10467->10469 10470 4012f1 10468->10470 10471 4012e3 EndDialog 10468->10471 10469->10467 10471->10470 10473 4021db 10472->10473 10473->9617 10475 4025ae 2 API calls 10474->10475 10476 402992 10475->10476 10477 4029be 10476->10477 10478 402640 2 API calls 10476->10478 10477->9686 10478->10476 10479->9686 10481 4029d2 10480->10481 10482 4029de 10480->10482 10499 4019f0 GetStdHandle WriteFile 10481->10499 10484 4025ae 2 API calls 10482->10484 10488 4029e8 10484->10488 10485 4029d9 10497 402425 ??3@YAXPAX ??3@YAXPAX 10485->10497 10486 402a13 10487 40272e 3 API calls 10486->10487 10489 402a25 10487->10489 10488->10486 10492 402640 2 API calls 10488->10492 10490 402a33 10489->10490 10491 402a47 10489->10491 10493 407776 55 API calls 10490->10493 10494 407776 55 API calls 10491->10494 10492->10488 10495 402a42 ??3@YAXPAX ??3@YAXPAX 10493->10495 10494->10495 10495->10485 10497->9683 10498->9672 10499->10485 10501 4012f7 2 API calls 10500->10501 10502 402676 10501->10502 10503 4012f7 2 API calls 10502->10503 10504 402682 10503->10504 10504->9704 10506 4025ae 2 API calls 10505->10506 10507 402785 10506->10507 10508 4027c1 10507->10508 10511 402628 10507->10511 10508->9731 10512 402634 10511->10512 10513 40263a WideCharToMultiByte 10511->10513 10514 4022b0 2 API calls 10512->10514 10513->10508 10514->10513 10516 407456 10515->10516 10517 40745b 10515->10517 10516->9752 10517->10516 10518 4073d1 21 API calls 10517->10518 10518->10516 10519->9759 10520->9761 10521->9763 10522->9767 10523->9768 10524->9773 10525->9777 10526->9781 10528 40661a 2 API calls 10527->10528 10529 40715c 10528->10529 10529->9789 10533 40716d 10530->10533 10534 40661a 2 API calls 10533->10534 10535 407175 10534->10535 10535->9789 10537 40661a 2 API calls 10536->10537 10538 4071a7 10537->10538 10538->9815 8035 40f3f1 8038 4024e7 8035->8038 8043 40245a 8038->8043 8041 4024f5 8042 4024f6 malloc 8044 40246a 8043->8044 8050 402466 8043->8050 8045 40247a GlobalMemoryStatusEx 8044->8045 8044->8050 8046 402488 8045->8046 8045->8050 8046->8050 8051 401f9d 8046->8051 8050->8041 8050->8042 8052 401fb4 8051->8052 8053 401fe5 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8052->8053 8057 401fdb 8052->8057 8054 402095 SetLastError 8053->8054 8055 40201d ??2@YAPAXI GetEnvironmentVariableW 8053->8055 8054->8057 8058 4020ac 8054->8058 8056 40204c GetLastError 8055->8056 8069 40207e ??3@YAXPAX 8055->8069 8059 402052 8056->8059 8056->8069 8071 407717 8057->8071 8061 4020cb lstrlenA ??2@YAPAXI 8058->8061 8078 401f47 8058->8078 8064 402081 8059->8064 8065 40205c lstrcmpiW 8059->8065 8062 402136 MultiByteToWideChar 8061->8062 8063 4020fc GetLocaleInfoW 8061->8063 8062->8057 8063->8062 8067 402123 _wtol 8063->8067 8064->8054 8068 40206b ??3@YAXPAX 8065->8068 8065->8069 8067->8062 8068->8064 8069->8064 8070 4020c1 8070->8061 8085 40661a 8071->8085 8074 40774e 8089 4073d1 8074->8089 8075 40773c IsBadReadPtr 8075->8074 8079 401f51 GetUserDefaultUILanguage 8078->8079 8080 401f95 8078->8080 8081 401f72 GetSystemDefaultUILanguage 8079->8081 8082 401f6e 8079->8082 8080->8070 8081->8080 8083 401f7e GetSystemDefaultLCID 8081->8083 8082->8070 8083->8080 8084 401f8e 8083->8084 8084->8080 8086 406643 8085->8086 8087 40666f IsWindow 8085->8087 8086->8087 8088 40664b GetSystemMetrics GetSystemMetrics 8086->8088 8087->8074 8087->8075 8088->8087 8090 407444 8089->8090 8091 4073e0 8089->8091 8090->8050 8091->8090 8101 4024fc 8091->8101 8093 4073f1 8094 4024fc 2 API calls 8093->8094 8095 4073fc 8094->8095 8105 403b7f 8095->8105 8098 403b7f 19 API calls 8099 40740e ??3@YAXPAX ??3@YAXPAX 8098->8099 8099->8090 8102 402513 8101->8102 8114 40112b 8102->8114 8104 40251e 8104->8093 8178 403880 8105->8178 8107 403b59 8119 40393b 8107->8119 8109 403b69 8142 4039f6 8109->8142 8111 403b74 8165 4027c7 8111->8165 8115 401177 8114->8115 8116 401139 ??2@YAPAXI 8114->8116 8115->8104 8116->8115 8118 40115a 8116->8118 8117 40116f ??3@YAXPAX 8117->8115 8118->8117 8118->8118 8201 401411 8119->8201 8123 403954 8208 40254d 8123->8208 8125 403961 8126 4024fc 2 API calls 8125->8126 8127 40396e 8126->8127 8212 403805 8127->8212 8130 401362 2 API calls 8131 403992 8130->8131 8132 40254d 2 API calls 8131->8132 8133 40399f 8132->8133 8134 4024fc 2 API calls 8133->8134 8135 4039ac 8134->8135 8136 403805 3 API calls 8135->8136 8137 4039bc ??3@YAXPAX 8136->8137 8138 4024fc 2 API calls 8137->8138 8139 4039d3 8138->8139 8140 403805 3 API calls 8139->8140 8141 4039e2 ??3@YAXPAX ??3@YAXPAX 8140->8141 8141->8109 8143 401411 2 API calls 8142->8143 8144 403a04 8143->8144 8145 401362 2 API calls 8144->8145 8146 403a0f 8145->8146 8147 40254d 2 API calls 8146->8147 8148 403a1c 8147->8148 8149 4024fc 2 API calls 8148->8149 8150 403a29 8149->8150 8151 403805 3 API calls 8150->8151 8152 403a39 ??3@YAXPAX 8151->8152 8153 401362 2 API calls 8152->8153 8154 403a4d 8153->8154 8155 40254d 2 API calls 8154->8155 8156 403a5a 8155->8156 8157 4024fc 2 API calls 8156->8157 8158 403a67 8157->8158 8159 403805 3 API calls 8158->8159 8160 403a77 ??3@YAXPAX 8159->8160 8161 4024fc 2 API calls 8160->8161 8162 403a8e 8161->8162 8163 403805 3 API calls 8162->8163 8164 403a9d ??3@YAXPAX ??3@YAXPAX 8163->8164 8164->8111 8166 401411 2 API calls 8165->8166 8167 4027d5 8166->8167 8168 4027e5 ExpandEnvironmentStringsW 8167->8168 8171 40112b 2 API calls 8167->8171 8169 402809 8168->8169 8170 4027fe ??3@YAXPAX 8168->8170 8237 402535 8169->8237 8172 402840 8170->8172 8171->8168 8172->8098 8175 402824 8176 401362 2 API calls 8175->8176 8177 402838 ??3@YAXPAX 8176->8177 8177->8172 8179 401411 2 API calls 8178->8179 8180 40388e 8179->8180 8181 401362 2 API calls 8180->8181 8182 403899 8181->8182 8183 40254d 2 API calls 8182->8183 8184 4038a6 8183->8184 8185 4024fc 2 API calls 8184->8185 8186 4038b3 8185->8186 8187 403805 3 API calls 8186->8187 8188 4038c3 ??3@YAXPAX 8187->8188 8189 401362 2 API calls 8188->8189 8190 4038d7 8189->8190 8191 40254d 2 API calls 8190->8191 8192 4038e4 8191->8192 8193 4024fc 2 API calls 8192->8193 8194 4038f1 8193->8194 8195 403805 3 API calls 8194->8195 8196 403901 ??3@YAXPAX 8195->8196 8197 4024fc 2 API calls 8196->8197 8198 403918 8197->8198 8199 403805 3 API calls 8198->8199 8200 403927 ??3@YAXPAX ??3@YAXPAX 8199->8200 8200->8107 8202 40112b 2 API calls 8201->8202 8203 401425 8202->8203 8204 401362 8203->8204 8205 40136e 8204->8205 8207 401380 8204->8207 8206 40112b 2 API calls 8205->8206 8206->8207 8207->8123 8209 40255a 8208->8209 8217 401398 8209->8217 8211 402565 8211->8125 8213 40381b 8212->8213 8214 403817 ??3@YAXPAX 8212->8214 8213->8214 8221 4026b1 8213->8221 8225 402f96 8213->8225 8214->8130 8218 4013dc 8217->8218 8219 4013ac 8217->8219 8218->8211 8220 40112b 2 API calls 8219->8220 8220->8218 8222 4026c7 8221->8222 8223 4026db 8222->8223 8229 402346 memmove 8222->8229 8223->8213 8226 402fa5 8225->8226 8228 402fbe 8226->8228 8230 4026e6 8226->8230 8228->8213 8229->8223 8231 4026f6 8230->8231 8232 401398 2 API calls 8231->8232 8233 402702 8232->8233 8236 402346 memmove 8233->8236 8235 40270f 8235->8228 8236->8235 8238 402541 8237->8238 8239 402547 ExpandEnvironmentStringsW 8237->8239 8240 40112b 2 API calls 8238->8240 8239->8175 8240->8239 11204 40e4f9 11205 40e516 11204->11205 11206 40e506 11204->11206 11209 40de46 11206->11209 11212 401b1f VirtualFree 11209->11212 11211 40de81 ??3@YAXPAX 11211->11205 11212->11211 9087 411388 ??2@YAPAXI 9088 411397 9087->9088
                        APIs
                          • Part of subcall function 00401B37: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                          • Part of subcall function 00401B37: CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                          • Part of subcall function 00401B37: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                          • Part of subcall function 00401B37: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                          • Part of subcall function 00401B37: DispatchMessageW.USER32(?), ref: 00401B89
                          • Part of subcall function 00401B37: KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                          • Part of subcall function 00401B37: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                        • GetVersionExW.KERNEL32(?,?,?,00000000), ref: 00404FCE
                        • GetCommandLineW.KERNEL32(?,00000020,?,?,00000000), ref: 0040505C
                          • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                          • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                          • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                          • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                          • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,00000000,00000020,?,0040508F,?,?,00000000,?,00000000), ref: 00403DA5
                          • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,?,00000000), ref: 00403DAD
                        • _wtol.MSVCRT ref: 0040509F
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004050F1
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405102
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040510A
                        • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,?,00000000), ref: 00405138
                        • _wtol.MSVCRT ref: 00405217
                        • ??2@YAPAXI@Z.MSVCRT(00000010,004177C4,004177C4,?,00000000), ref: 0040538F
                          • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                          • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                          • Part of subcall function 00404E3F: wsprintfA.USER32 ref: 00404EBC
                          • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                          • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                          • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?), ref: 004028E4
                          • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                          • Part of subcall function 00402844: memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405453
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040545B
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405463
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054DD
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054E5
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054ED
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405509
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405511
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405519
                          • Part of subcall function 00403093: ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405559
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405561
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405569
                          • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,00000020,?,?,00405650,?,00414668,?,00000000,?), ref: 00403BA1
                          • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00403BAA
                          • Part of subcall function 00403B94: _wcsnicmp.MSVCRT ref: 00403BB6
                        • wsprintfW.USER32 ref: 00405595
                        • _wtol.MSVCRT ref: 004057DE
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040587B
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00405883
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040588B
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0000003D,00000000,00000000,?,?,00000000,?), ref: 00405913
                        • ??3@YAXPAX@Z.MSVCRT(?,0000003D,00000000,00000000,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4), ref: 00405938
                        • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059AA
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059B2
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059BA
                        • CoInitialize.OLE32(00000000), ref: 004059E9
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405A30
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405A38
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405A40
                        • GetKeyState.USER32(00000010), ref: 00405AA1
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405BCD
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BDB
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BE3
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C16
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C1E
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C26
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C2E
                        • memset.MSVCRT ref: 004060AE
                        • ShellExecuteExW.SHELL32(?), ref: 0040617E
                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?), ref: 0040619A
                        • CloseHandle.KERNEL32(?,?,?,?), ref: 004061A6
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004061D4
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004061DC
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 004061E4
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 004061EA
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 004061FD
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00406205
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406222
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040622A
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406232
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040623A
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406242
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 0040624A
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 00406252
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 0040626E
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00406276
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BEB
                          • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                          • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                          • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                          • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                          • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                          • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                          • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                          • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                          • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                          • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                          • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405C4A
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405C52
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C5A
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C62
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C94
                        • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405CD4
                        • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D41
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D49
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D51
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D59
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E20
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E28
                        • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E32
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405EEC
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00405EF4
                        • _wtol.MSVCRT ref: 00405F65
                        • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?,?,?,?), ref: 00406294
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?,?,?,?), ref: 0040629C
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?,?,?,?), ref: 004062A4
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062AA
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062B2
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062BA
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062C2
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062CA
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062D2
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004062F1
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004062F9
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 00406301
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 00406307
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406343
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040636D
                        • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,?,?,00000000,?,?,?), ref: 004063E6
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040643D
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,?,?,?), ref: 00406445
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,?,?), ref: 0040644D
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406455
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040646A
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040647B
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406483
                        • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 0040649C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@$lstrlen$Message$_wtol$??2@FileFormatHandleModuleTimerlstrcpymemcmpwsprintf$AttributesCallbackCloseCommandCreateCurrentDirectoryDispatchDispatcherErrorExecuteFreeInitializeKillLastLineLocalNameObjectShellSingleStateUserVersionWaitWindow_wcsnicmpmemmovememsetwvsprintf
                        • String ID: 4AA$4DA$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$;!@Install@!UTF-8!$;!@InstallEnd@!$@DA$AutoInstall$BeginPrompt$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$XmN$XpA$amd64$del$forcenowait$hidcon$i386$nowait$pvN$setup.exe$sfxconfig$sfxversion$shc$x64$x86$IA
                        • API String ID: 154539431-938678446
                        • Opcode ID: cabb4e2e52945036c720e1880f7d789d9992fedd99c9f327f88584105f760328
                        • Instruction ID: bd55e9a5e2f2b8c77b34d16bce6880ff8bafa7c96c93ceffa7f521d25999041e
                        • Opcode Fuzzy Hash: cabb4e2e52945036c720e1880f7d789d9992fedd99c9f327f88584105f760328
                        • Instruction Fuzzy Hash: 65C2E231904619AADF21AF61DC45AEF3769EF00708F54403BF906B61E2EB7C9981CB5D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 651 401626-401636 652 401642-40166d call 40874d call 40a62f 651->652 653 401638-40163d 651->653 658 401680-40168c call 401411 652->658 659 40166f 652->659 654 401980-401983 653->654 665 401962-40197d ??3@YAXPAX@Z call 40eca9 658->665 666 401692-401697 658->666 660 401671-40167b call 40eca9 659->660 667 40197f 660->667 665->667 666->665 668 40169d-4016d3 call 401329 call 401454 call 401362 ??3@YAXPAX@Z 666->668 667->654 678 401948-40194b 668->678 679 4016d9-4016f8 668->679 680 40194d-401960 ??3@YAXPAX@Z call 40eca9 678->680 683 401713-401717 679->683 684 4016fa-40170e call 40eca9 ??3@YAXPAX@Z 679->684 680->667 687 401719-40171c 683->687 688 40171e-401723 683->688 684->660 690 40174b-401762 687->690 691 401745-401748 688->691 692 401725 688->692 690->684 695 401764-401787 690->695 691->690 693 401727-40172d 692->693 697 40172f-401740 call 40eca9 ??3@YAXPAX@Z 693->697 700 4017a2-4017a8 695->700 701 401789-40179d call 40eca9 ??3@YAXPAX@Z 695->701 697->660 704 4017c4-4017d6 GetLocalTime SystemTimeToFileTime 700->704 705 4017aa-4017ad 700->705 701->660 709 4017dc-4017df 704->709 707 4017b6-4017c2 705->707 708 4017af-4017b1 705->708 707->709 708->693 710 4017e1-4017e3 call 403354 709->710 711 4017f8-4017ff call 40301a 709->711 714 4017e8-4017eb 710->714 715 401804-401809 711->715 714->697 716 4017f1-4017f3 714->716 717 401934-401943 GetLastError 715->717 718 40180f-401812 715->718 716->693 717->678 719 401818-401822 ??2@YAPAXI@Z 718->719 720 40192a-40192d 718->720 722 401833 719->722 723 401824-401831 719->723 720->717 724 401835-401859 call 4010e2 call 40db53 722->724 723->724 729 40190f-401928 call 408726 call 40eca9 724->729 730 40185f-40187d GetLastError call 4012f7 call 402d5a 724->730 729->680 739 4018ba-4018cf call 403354 730->739 740 40187f-401886 730->740 746 4018d1-4018d9 739->746 747 4018db-4018f3 call 40db53 739->747 742 40188a-40189a ??3@YAXPAX@Z 740->742 744 4018a2-4018b5 call 40eca9 ??3@YAXPAX@Z 742->744 745 40189c-40189e 742->745 744->660 745->744 746->742 753 4018f5-401904 GetLastError 747->753 754 401906-40190e ??3@YAXPAX@Z 747->754 753->742 754->729
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f637a799f1653e3b63fa741730d3cbaf64608c0369243d42a1217ae41316ed6c
                        • Instruction ID: 8ae67fe93764504dd4472983a8ee98937692ca3eac7777145cc28303e79798ac
                        • Opcode Fuzzy Hash: f637a799f1653e3b63fa741730d3cbaf64608c0369243d42a1217ae41316ed6c
                        • Instruction Fuzzy Hash: 8DB17C71900205EFCB14EFA5D8849AEB7B5FF44304B24842BF512BB2F1EB39A945CB58

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1082 40301a-403031 GetFileAttributesW 1083 403033-403035 1082->1083 1084 403037-403039 1082->1084 1085 403090-403092 1083->1085 1086 403048-40304f 1084->1086 1087 40303b-403046 SetLastError 1084->1087 1088 403051-403058 call 402fed 1086->1088 1089 40305a-40305d 1086->1089 1087->1085 1088->1085 1091 40308d-40308f 1089->1091 1092 40305f-403070 FindFirstFileW 1089->1092 1091->1085 1092->1088 1094 403072-40308b FindClose CompareFileTime 1092->1094 1094->1088 1094->1091
                        APIs
                        • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403028
                        • SetLastError.KERNEL32(00000010), ref: 0040303D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: AttributesErrorFileLast
                        • String ID:
                        • API String ID: 1799206407-0
                        • Opcode ID: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                        • Instruction ID: 32a2c072cbeca167af0ba40feded167abd8377b8b15159977275e4e23b0806bf
                        • Opcode Fuzzy Hash: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                        • Instruction Fuzzy Hash: 42018B30102004AADF206F749C4CAAB3BACAB0136BF108632F621F11D8D738DB46965E
                        APIs
                        • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011A6
                        • SendMessageW.USER32(00008001,00000000,?), ref: 004011FF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: DiskFreeMessageSendSpace
                        • String ID:
                        • API String ID: 696007252-0
                        • Opcode ID: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                        • Instruction ID: 9edb1a80411cac00ba33afe52a6c86c35bfa08927eae57e7515b94cd88b359ae
                        • Opcode Fuzzy Hash: 3a86173e64e6b0f12d7b84feb59694df1deaa45c142369f31f6b7a0286f107e3
                        • Instruction Fuzzy Hash: 1C014B30654209ABEB18EB90DD85F9A3BE9EB05704F108436F611F91F0CB79BA408B1D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 757 411def-411e64 __set_app_type __p__fmode __p__commode call 411f7b 760 411e72-411ec9 call 411f66 _initterm __getmainargs _initterm 757->760 761 411e66-411e71 __setusermatherr 757->761 764 411f05-411f08 760->764 765 411ecb-411ed3 760->765 761->760 766 411ee2-411ee6 764->766 767 411f0a-411f0e 764->767 768 411ed5-411ed7 765->768 769 411ed9-411edc 765->769 770 411ee8-411eea 766->770 771 411eec-411efd GetStartupInfoA 766->771 767->764 768->765 768->769 769->766 772 411ede-411edf 769->772 770->771 770->772 773 411f10-411f12 771->773 774 411eff-411f03 771->774 772->766 775 411f13-411f40 GetModuleHandleA call 4064af exit _XcptFilter 773->775 774->775
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                        • String ID: HpA
                        • API String ID: 801014965-2938899866
                        • Opcode ID: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                        • Instruction ID: 158ffaedae0d42993a529c42e252781da09b2560f8e529a8c548a3e081932a5e
                        • Opcode Fuzzy Hash: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                        • Instruction Fuzzy Hash: 254192B0944344AFDB20DFA4DC45AEA7BB8FB09711F20452FFA51973A1D7784981CB58

                        Control-flow Graph

                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                        • CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                        • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                        • DispatchMessageW.USER32(?), ref: 00401B89
                        • KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                        • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                        • String ID: Static
                        • API String ID: 2479445380-2272013587
                        • Opcode ID: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                        • Instruction ID: f02a6d563a0a994406544e3b77250aae51f77c8b940714b819f60fd1d37dc764
                        • Opcode Fuzzy Hash: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                        • Instruction Fuzzy Hash: 10F03C3250212476CA203FA69C4DEEF7E6CDB86BA2F008160B615A10D1DAB88241C6B9

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 781 40b163-40b183 call 40f0b6 784 40b2f6-40b2f9 781->784 785 40b189-40b190 call 40ac2d 781->785 788 40b192-40b194 785->788 789 40b199-40b1d6 call 40adc3 memcpy 785->789 788->784 792 40b1d9-40b1dd 789->792 793 40b202-40b221 792->793 794 40b1df-40b1f2 792->794 800 40b2a2 793->800 801 40b223-40b22b 793->801 795 40b297-40b2a0 ??3@YAXPAX@Z 794->795 796 40b1f8 794->796 799 40b2f4-40b2f5 795->799 796->793 797 40b1fa-40b1fc 796->797 797->793 797->795 799->784 802 40b2a4-40b2a5 800->802 803 40b2a7-40b2aa 801->803 804 40b22d-40b231 801->804 805 40b2ed-40b2f2 ??3@YAXPAX@Z 802->805 803->802 804->793 806 40b233-40b243 804->806 805->799 807 40b245 806->807 808 40b27a-40b292 memmove 806->808 809 40b254-40b258 807->809 808->792 810 40b25a 809->810 811 40b24c-40b24e 809->811 812 40b25c 810->812 811->812 813 40b250-40b251 811->813 812->808 814 40b25e-40b267 call 40ac2d 812->814 813->809 817 40b269-40b278 814->817 818 40b2ac-40b2e5 memcpy call 40dcfb 814->818 817->808 819 40b247-40b24a 817->819 820 40b2e8-40b2eb 818->820 819->809 820->805
                        APIs
                        • memcpy.MSVCRT(00000000,?,0000001F,00010000), ref: 0040B1C5
                        • memmove.MSVCRT(00000000,-000000C1,00000020,?,00010000), ref: 0040B289
                        • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040B298
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@memcpymemmove
                        • String ID:
                        • API String ID: 3549172513-3916222277
                        • Opcode ID: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                        • Instruction ID: 201babb0cc669d9fea5df8a163075e687156198648327345136f7fe875bf0058
                        • Opcode Fuzzy Hash: 5bad17cc77e2d39d7f6897ae69eb46f7fe1422127806d73b42e5b41d987a673b
                        • Instruction Fuzzy Hash: 495181B1A00205ABDF14DB95C889AAE7BB4EF49354F1441BAE905B7381D338DD81CB9D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 822 403354-40337a lstrlenW call 4024fc 825 403385-403391 822->825 826 40337c-403380 call 40112b 822->826 828 403393-403397 825->828 829 403399-40339f 825->829 826->825 828->829 830 4033a2-4033a4 828->830 829->830 831 4033c8-4033d1 call 401986 830->831 834 4033d3-4033e6 GetSystemTimeAsFileTime GetFileAttributesW 831->834 835 4033b7-4033b9 831->835 838 4033e8-4033f6 call 40301a 834->838 839 4033ff-403408 call 401986 834->839 836 4033a6-4033ae 835->836 837 4033bb-4033bd 835->837 836->837 844 4033b0-4033b4 836->844 840 4033c3 837->840 841 403477-40347d 837->841 838->839 851 4033f8-4033fa 838->851 852 403419-40341b 839->852 853 40340a-403417 call 407776 839->853 840->831 847 4034a7-4034ba call 407776 ??3@YAXPAX@Z 841->847 848 40347f-40348a 841->848 844->837 849 4033b6 844->849 864 4034bc-4034c0 847->864 848->847 854 40348c-403490 848->854 849->835 858 40349c-4034a5 ??3@YAXPAX@Z 851->858 855 40346b-403475 ??3@YAXPAX@Z 852->855 856 40341d-40343c memcpy 852->856 853->851 854->847 860 403492-403497 854->860 855->864 862 403451-403455 856->862 863 40343e 856->863 858->864 860->847 861 403499-40349b 860->861 861->858 867 403440-403448 862->867 868 403457-403464 call 401986 862->868 866 403450 863->866 866->862 867->868 869 40344a-40344e 867->869 868->853 872 403466-403469 868->872 869->866 869->868 872->855 872->856
                        APIs
                        • lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                        • GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                        • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                        • ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                          • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                          • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                        • memcpy.MSVCRT(-00000001,00404AC6,?,?,?,?,?,00404AC6,?), ref: 0040342F
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 0040346C
                        • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,00404AC6,00404AC6,?,?,?,?,00404AC6,?), ref: 004034B2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                        • String ID:
                        • API String ID: 846840743-0
                        • Opcode ID: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                        • Instruction ID: c1b9adc2f16cc45d244a7c0b75b8b4a4f89234fa72cd4c12ee41ca3d86f3c48f
                        • Opcode Fuzzy Hash: 59d4a2ad1293f13bca9fbc2cc36a10c810479fd21a5ed498f46fbcb1fa619914
                        • Instruction Fuzzy Hash: 8F41C836904611AADB216F998881ABF7F6CEF40716F80403BED01B61D5DB3C9B4282DD

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00401F47: GetUserDefaultUILanguage.KERNEL32(00404416,00000000,00000020,?), ref: 00401F51
                          • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                          • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                          • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                          • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                          • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                          • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                          • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                          • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                          • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                          • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                          • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                          • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                          • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                          • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                          • Part of subcall function 00401F9D: _wtol.MSVCRT ref: 0040212A
                          • Part of subcall function 00401F9D: MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,00000000,00000020,?), ref: 0040448C
                        • wsprintfW.USER32 ref: 004044A7
                          • Part of subcall function 00402F6C: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                        • #17.COMCTL32(?,?,?,?,00000000,00000020,?), ref: 00404533
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                        • String ID: 7zSfxFolder%02d$IA
                        • API String ID: 3387708999-1317665167
                        • Opcode ID: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                        • Instruction ID: c443879f351b6d6d2b07c84fde6f3777072453d7374e8d7fc75fcfd2f507d9dd
                        • Opcode Fuzzy Hash: 205a0074c49e5804c32477661e2015f4351efd6e14d5df67bf5bfd9f1882f569
                        • Instruction Fuzzy Hash: E03140B19042199BDB10FFA2DC86AEE7B78EB44308F40407FF619B21E1EB785644DB58

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 913 408ea4-408ebf call 40aef3 916 408ec1-408ecb 913->916 917 408ece-408f07 call 4065ea call 408726 913->917 922 408fd5-408ffb call 408d21 call 408b7c 917->922 923 408f0d-408f17 ??2@YAPAXI@Z 917->923 935 408ffd-409013 call 408858 922->935 936 40901e 922->936 925 408f26 923->925 926 408f19-408f24 923->926 927 408f28-408f61 call 4010e2 ??2@YAPAXI@Z 925->927 926->927 933 408f73 927->933 934 408f63-408f71 927->934 937 408f75-408fae call 4010e2 call 408726 call 40cdb8 933->937 934->937 944 409199-4091b0 935->944 945 409019-40901c 935->945 939 409020-409035 call 40e8da call 40874d 936->939 965 408fb0-408fb2 937->965 966 408fb6-408fbb 937->966 954 409037-409044 ??2@YAPAXI@Z 939->954 955 40906d-40907d 939->955 952 4091b6 944->952 953 40934c-409367 call 4087ea 944->953 945->939 957 4091b9-4091e9 952->957 975 409372-409375 953->975 976 409369-40936f 953->976 958 409046-40904d call 408c96 954->958 959 40904f 954->959 970 4090ad-4090b3 955->970 971 40907f 955->971 978 409219-40925f call 40e811 * 2 957->978 979 4091eb-4091f1 957->979 963 409051-409061 call 408726 958->963 959->963 987 409063-409066 963->987 988 409068 963->988 965->966 968 408fc3-408fcf 966->968 969 408fbd-408fbf 966->969 968->922 968->923 969->968 981 409187-409196 call 408e83 970->981 982 4090b9-4090d9 call 40d94b 970->982 977 409081-4090a7 call 40e959 call 408835 call 408931 call 408963 971->977 975->977 983 40937b-4093a2 call 40e811 975->983 976->975 977->970 1016 409261-409264 978->1016 1017 4092c9 978->1017 985 4091f7-409209 979->985 986 4092b9-4092bb 979->986 981->944 997 4090de-4090e6 982->997 999 4093a4-4093b8 call 408761 983->999 1000 4093ba-4093d6 983->1000 1013 409293-409295 985->1013 1014 40920f-409211 985->1014 1001 4092bf-4092c4 986->1001 994 40906a 987->994 988->994 994->955 1005 409283-409288 997->1005 1006 4090ec-4090f3 997->1006 999->1000 1080 4093d7 call 40ce70 1000->1080 1081 4093d7 call 40f160 1000->1081 1001->977 1011 409290 1005->1011 1012 40928a-40928c 1005->1012 1007 409121-409124 1006->1007 1008 4090f5-4090f9 1006->1008 1022 4092b2-4092b7 1007->1022 1023 40912a-409138 call 408726 1007->1023 1008->1007 1018 4090fb-4090fe 1008->1018 1011->1013 1012->1011 1025 409297-409299 1013->1025 1026 40929d-4092a0 1013->1026 1014->978 1024 409213-409215 1014->1024 1027 409267-40927f call 408761 1016->1027 1030 4092cc-4092d2 1017->1030 1028 409104-409112 call 408726 1018->1028 1029 4092a5-4092aa 1018->1029 1020 4093da-4093e4 call 40e959 1020->977 1022->986 1022->1001 1046 409145-409156 call 40cdb8 1023->1046 1047 40913a-409140 call 40d6f0 1023->1047 1024->978 1025->1026 1026->977 1049 409281 1027->1049 1028->1046 1050 409114-40911f call 40d6cb 1028->1050 1029->1001 1041 4092ac-4092ae 1029->1041 1036 4092d4-4092e0 call 408a55 1030->1036 1037 40931d-409346 call 40e959 * 2 1030->1037 1057 4092e2-4092ec 1036->1057 1058 4092ee-4092fa call 408aa0 1036->1058 1037->953 1037->957 1041->1022 1059 409158-40915a 1046->1059 1060 40915e-409163 1046->1060 1047->1046 1049->1030 1050->1046 1063 409303-40931b call 408761 1057->1063 1074 409300 1058->1074 1075 4093e9-4093fe call 40e959 * 2 1058->1075 1059->1060 1065 409165-409167 1060->1065 1066 40916b-409170 1060->1066 1063->1036 1063->1037 1065->1066 1071 409172-409174 1066->1071 1072 409178-409181 1066->1072 1071->1072 1072->981 1072->982 1074->1063 1075->977 1080->1020 1081->1020
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT(00000018,?,?,00000000,?), ref: 00408F0F
                        • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,?,?,00000000,?), ref: 00408F59
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??2@
                        • String ID: IA$IA
                        • API String ID: 1033339047-1400641299
                        • Opcode ID: 6a22e71803ea0f4d69e2f58a84b042c4ce0c016d1f42beed39b79896576e25f5
                        • Instruction ID: ddcf9de22f7a46eeefc4975c1fab543939f34ce9f972055b0c78c556d294e1f5
                        • Opcode Fuzzy Hash: 6a22e71803ea0f4d69e2f58a84b042c4ce0c016d1f42beed39b79896576e25f5
                        • Instruction Fuzzy Hash: EF123671A00209DFCB14EFA5C98489ABBB5FF48304B10456EF95AA7392DB39ED85CF44

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1095 410cd0-410d1a call 410b9a free 1098 410d22-410d23 1095->1098 1099 410d1c-410d1e 1095->1099 1099->1098
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: free
                        • String ID: $KA$4KA$HKA$\KA
                        • API String ID: 1294909896-3316857779
                        • Opcode ID: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                        • Instruction ID: 889df95fe732b3a4b2d84b4ab476e7a54c7f97cead7299b76f73e2708a1c6c0a
                        • Opcode Fuzzy Hash: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                        • Instruction Fuzzy Hash: C5F09271409B109FC7319F55E405AC6B7F4AE447183058A2EA89A5BA11D3B8F989CB9C

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1100 4096c7-40970f _EH_prolog call 4010e2 1103 409711-409714 1100->1103 1104 409717-40971a 1100->1104 1103->1104 1105 409730-409755 1104->1105 1106 40971c-409721 1104->1106 1109 409757-40975d 1105->1109 1107 409723-409725 1106->1107 1108 409729-40972b 1106->1108 1107->1108 1110 409b93-409ba4 1108->1110 1111 409763-409767 1109->1111 1112 409827-40983a call 40118a 1109->1112 1113 409769-40976c 1111->1113 1114 40976f-40977e 1111->1114 1120 409851-409876 call 408e4e ??2@YAPAXI@Z 1112->1120 1121 40983c-409846 call 409425 1112->1121 1113->1114 1116 409780-409796 call 4094e0 call 40969d call 40e959 1114->1116 1117 4097a3-4097a8 1114->1117 1137 40979b-4097a1 1116->1137 1118 4097b6-4097f0 call 4094e0 call 40969d call 40e959 call 4095b7 1117->1118 1119 4097aa-4097b4 1117->1119 1124 4097f3-409809 1118->1124 1119->1118 1119->1124 1133 409881-40989a call 4010e2 call 40eb24 1120->1133 1134 409878-40987f call 40ebf7 1120->1134 1144 40984a-40984c 1121->1144 1129 40980c-409814 1124->1129 1136 409816-409825 call 409403 1129->1136 1129->1137 1153 40989d-4098c0 call 40eb19 1133->1153 1134->1133 1136->1129 1137->1109 1144->1110 1157 4098c2-4098c7 1153->1157 1158 4098f6-4098f9 1153->1158 1161 4098c9-4098cb 1157->1161 1162 4098cf-4098e7 call 409530 call 409425 1157->1162 1159 409925-409949 ??2@YAPAXI@Z 1158->1159 1160 4098fb-409900 1158->1160 1163 409954 1159->1163 1164 40994b-409952 call 409c13 1159->1164 1165 409902-409904 1160->1165 1166 409908-40991e call 409530 call 409425 1160->1166 1161->1162 1179 4098e9-4098eb 1162->1179 1180 4098ef-4098f1 1162->1180 1170 409956-40996d call 4010e2 1163->1170 1164->1170 1165->1166 1166->1159 1181 40997b-4099a0 call 409fb4 1170->1181 1182 40996f-409978 1170->1182 1179->1180 1180->1110 1186 4099a2-4099a7 1181->1186 1187 4099e3-4099e6 1181->1187 1182->1181 1190 4099a9-4099ab 1186->1190 1191 4099af-4099b4 1186->1191 1188 4099ec-409a49 call 409603 call 4094b1 call 408ea4 1187->1188 1189 409b4e-409b53 1187->1189 1205 409a4e-409a53 1188->1205 1194 409b55-409b56 1189->1194 1195 409b5b-409b7f 1189->1195 1190->1191 1192 4099b6-4099b8 1191->1192 1193 4099bc-4099d4 call 409530 call 409425 1191->1193 1192->1193 1206 4099d6-4099d8 1193->1206 1207 4099dc-4099de 1193->1207 1194->1195 1195->1153 1208 409ab5-409abb 1205->1208 1209 409a55 1205->1209 1206->1207 1207->1110 1211 409ac1-409ac3 1208->1211 1212 409abd-409abf 1208->1212 1210 409a57 1209->1210 1213 409a5a-409a63 call 409f49 1210->1213 1214 409a65-409a67 1211->1214 1215 409ac5-409ad1 1211->1215 1212->1210 1213->1214 1225 409aa2-409aa4 1213->1225 1217 409a69-409a6a 1214->1217 1218 409a6f-409a71 1214->1218 1219 409ad3-409ad5 1215->1219 1220 409ad7-409add 1215->1220 1217->1218 1222 409a73-409a75 1218->1222 1223 409a79-409a91 call 409530 call 409425 1218->1223 1219->1213 1220->1195 1224 409adf-409ae5 1220->1224 1222->1223 1223->1144 1233 409a97-409a9d 1223->1233 1224->1195 1228 409aa6-409aa8 1225->1228 1229 409aac-409ab0 1225->1229 1228->1229 1229->1195 1233->1144
                        APIs
                        • _EH_prolog.MSVCRT ref: 004096D0
                        • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040986E
                        • ??2@YAPAXI@Z.MSVCRT(00000038,?,00000000,00000000,00000001), ref: 00409941
                          • Part of subcall function 00409C13: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,00409952,?,00000000,00000000,00000001), ref: 00409C3B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??2@$H_prolog
                        • String ID: HIA
                        • API String ID: 3431946709-2712174624
                        • Opcode ID: 3a91edc2a80342029bdf13785710b8021a7be55c7c109f54d8d38dfd795fbdbc
                        • Instruction ID: da3614a8b55b1d80bdf53177d95d0cff5abf3d9c279f99a440b99522f39c568d
                        • Opcode Fuzzy Hash: 3a91edc2a80342029bdf13785710b8021a7be55c7c109f54d8d38dfd795fbdbc
                        • Instruction Fuzzy Hash: 53F13971610249DFCB24DF69C884AAA77F4BF48314F24416AF829AB392DB39ED41CF54

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1236 402844-40288e call 411c20 call 40dcfb lstrlenA * 2 1240 402893-4028af call 40dcc7 1236->1240 1242 4028b5-4028ba 1240->1242 1243 40297f 1240->1243 1242->1243 1244 4028c0-4028ca 1242->1244 1245 402981-402985 1243->1245 1246 4028cd-4028d2 1244->1246 1247 402911-402916 1246->1247 1248 4028d4-4028d9 1246->1248 1249 40293b-40295f memmove 1247->1249 1251 402918-40292b memcmp 1247->1251 1248->1249 1250 4028db-4028ee memcmp 1248->1250 1256 402961-402968 1249->1256 1257 40296e-402979 1249->1257 1252 4028f4-4028fe 1250->1252 1253 40297b-40297d 1250->1253 1254 40290b-40290f 1251->1254 1255 40292d-402939 1251->1255 1252->1243 1258 402900-402906 call 402640 1252->1258 1253->1245 1254->1246 1255->1246 1256->1257 1259 402890 1256->1259 1257->1245 1258->1254 1259->1240
                        APIs
                        • lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                        • lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                        • memcmp.MSVCRT(?,?,?), ref: 004028E4
                        • memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                        • memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: lstrlenmemcmp$memmove
                        • String ID:
                        • API String ID: 3251180759-0
                        • Opcode ID: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                        • Instruction ID: d4955105e7b234ce255a009ef61331e6eb412850de833d0a73495bfba1f32545
                        • Opcode Fuzzy Hash: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                        • Instruction Fuzzy Hash: 4A417F72E00209AFCF01DFA4C9889EEBBB5EF08344F04447AE945B3291D3B49E55CB55

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1263 40150b-401561 call 408726 call 401329 call 401429 CreateThread 1270 401563 call 40786b 1263->1270 1271 401568-401583 WaitForSingleObject 1263->1271 1270->1271 1273 401585-401588 1271->1273 1274 4015b7-4015bd 1271->1274 1277 40158a-40158d 1273->1277 1278 4015ab 1273->1278 1275 40161b 1274->1275 1276 4015bf-4015d4 GetExitCodeThread 1274->1276 1280 401620-401623 1275->1280 1281 4015d6-4015d8 1276->1281 1282 4015de-4015e9 1276->1282 1283 4015a7-4015a9 1277->1283 1284 40158f-401592 1277->1284 1279 4015ad-4015b5 call 407776 1278->1279 1279->1275 1281->1282 1286 4015da-4015dc 1281->1286 1287 4015f1-4015fa 1282->1287 1288 4015eb-4015ec 1282->1288 1283->1279 1289 4015a3-4015a5 1284->1289 1290 401594-401597 1284->1290 1286->1280 1293 401605-401611 SetLastError 1287->1293 1294 4015fc-401603 1287->1294 1292 4015ee-4015ef 1288->1292 1289->1279 1295 401599-40159c 1290->1295 1296 40159e-4015a1 1290->1296 1297 401613-401618 call 407776 1292->1297 1293->1297 1294->1275 1294->1293 1295->1275 1295->1296 1296->1292 1297->1275
                        APIs
                        • CreateThread.KERNELBASE(00000000,00000000,0040129C,00000000,00000000,?), ref: 0040154F
                        • WaitForSingleObject.KERNEL32(000000FF,?,00404AFB,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401570
                          • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                          • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                          • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                          • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                          • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                          • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                          • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                          • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                          • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                          • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                          • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                        • String ID:
                        • API String ID: 359084233-0
                        • Opcode ID: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                        • Instruction ID: 87277f5b9ffc23463226fd0df2644328d4cfb3d5af9d6e9341eee715f5e270ad
                        • Opcode Fuzzy Hash: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                        • Instruction Fuzzy Hash: 8231F171644200BBDA305B15DC86EBB37B9EBC5350F24843BF522F92F0CA79A941DA5E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1300 401986-401995 CreateDirectoryW 1301 4019c7-4019cb 1300->1301 1302 401997-4019a4 GetLastError 1300->1302 1303 4019b1-4019be GetFileAttributesW 1302->1303 1304 4019a6 1302->1304 1303->1301 1306 4019c0-4019c2 1303->1306 1305 4019a7-4019b0 SetLastError 1304->1305 1306->1301 1307 4019c4-4019c5 1306->1307 1307->1305
                        APIs
                        • CreateDirectoryW.KERNELBASE(004033CE,00000000,-00000001,004033CE,?,00404AC6,?,?,?,?,00404AC6,?), ref: 0040198D
                        • GetLastError.KERNEL32(?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401997
                        • SetLastError.KERNEL32(000000B7,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019A7
                        • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019B5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ErrorLast$AttributesCreateDirectoryFile
                        • String ID:
                        • API String ID: 635176117-0
                        • Opcode ID: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                        • Instruction ID: 5ae0be16486f509c6b40768ba71a6c1c2cea9be4331c5fc90c1b41dbeb0419e3
                        • Opcode Fuzzy Hash: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                        • Instruction Fuzzy Hash: D5E09AB0518250AFDE142BB4BD187DB3AA5AF46362F508932F495E02F0C33888428A89

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1308 404a44-404a62 call 408676 ??2@YAPAXI@Z 1311 404a64-404a6b call 40a9f8 1308->1311 1312 404a6d 1308->1312 1314 404a6f-404a91 call 408726 call 40dcfb 1311->1314 1312->1314 1341 404a92 call 40b2fc 1314->1341 1342 404a92 call 40a7de 1314->1342 1319 404a95-404a97 1320 404ab3-404abd 1319->1320 1321 404a99-404aa9 call 407776 1319->1321 1323 404ada-404ae4 ??2@YAPAXI@Z 1320->1323 1324 404abf-404ac1 call 403354 1320->1324 1337 404aae-404ab2 1321->1337 1325 404ae6-404aed call 404292 1323->1325 1326 404aef 1323->1326 1331 404ac6-404ac9 1324->1331 1330 404af1-404af6 call 40150b 1325->1330 1326->1330 1336 404afb-404afd 1330->1336 1331->1323 1335 404acb 1331->1335 1338 404ad0-404ad8 1335->1338 1336->1338 1338->1337 1341->1319 1342->1319
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,?,ExecuteFile,00000015,?,00405D20,?,00417788,00417788), ref: 00404A5A
                        • ??2@YAPAXI@Z.MSVCRT(00000040,?,?,?,?,?,?,?,?,00000000,?), ref: 00404ADC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??2@
                        • String ID: ExecuteFile
                        • API String ID: 1033339047-323923146
                        • Opcode ID: 612dc6f8e3fe8df0745ed42aa02adea807ab2e0a0b71f5bf8dc2b3d1454147a6
                        • Instruction ID: 446d0bd8c70a379003bbf02419fa435b46014474c8a02eb0da5acec479ce97d7
                        • Opcode Fuzzy Hash: 612dc6f8e3fe8df0745ed42aa02adea807ab2e0a0b71f5bf8dc2b3d1454147a6
                        • Instruction Fuzzy Hash: EA1184B5340104BFD710AB659C85D6B73A8EF80355724443FF602B72D1DA789D418A6D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1343 40adc3-40adce 1344 40add0-40add3 1343->1344 1345 40ae0d-40ae0f 1343->1345 1346 40add5-40ade3 ??2@YAPAXI@Z 1344->1346 1347 40adfb 1344->1347 1348 40adfd-40ae0c ??3@YAXPAX@Z 1346->1348 1349 40ade5-40ade7 1346->1349 1347->1348 1348->1345 1350 40ade9 1349->1350 1351 40adeb-40adf9 memmove 1349->1351 1350->1351 1351->1348
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                        • memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??2@??3@memmove
                        • String ID:
                        • API String ID: 3828600508-0
                        • Opcode ID: 2c1e852e3357fe345785b0ad8426fcfe448c8ec3a37487201466d82e595bf6a2
                        • Instruction ID: a8ce0a3cb4653ecb547b1a3698f229d81d6147035ad3680bc60947505803a3f4
                        • Opcode Fuzzy Hash: 2c1e852e3357fe345785b0ad8426fcfe448c8ec3a37487201466d82e595bf6a2
                        • Instruction Fuzzy Hash: 74F089763047016FC3205B1ADC80857BBABDFC4715311883FE55E93A50D634F891965A
                        APIs
                        • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 0040247E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: GlobalMemoryStatus
                        • String ID: @
                        • API String ID: 1890195054-2766056989
                        • Opcode ID: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                        • Instruction ID: 9ce3ff159218229c34eda893c3d8d64f83397f3f2cddac743d7c565554413103
                        • Opcode Fuzzy Hash: e165e649a9da5613d175048000a137ea24de4513e4899c41680211bbe6bcf060
                        • Instruction Fuzzy Hash: AAF0AF30A042048ADF15AB719E8DA5A37A4BB00348F10853AF516F52D4D7BCE9048B5D
                        APIs
                          • Part of subcall function 0040AAAB: _CxxThrowException.MSVCRT(?,00414EF8), ref: 0040AAC5
                          • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                          • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                          • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,004149F0,?,004149B0), ref: 0040CAF2
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,004149F0,?,004149B0), ref: 0040CC4A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@$??2@ExceptionThrowmemmove
                        • String ID:
                        • API String ID: 4269121280-0
                        • Opcode ID: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                        • Instruction ID: 88480e7f7e551c391a26326ce122d220a9eefc885560dc6ed21150e7f5ba8ef6
                        • Opcode Fuzzy Hash: 55a34ad2a1bb823cdc9ec8962d94a78352b48210c79ef81d7d99dd1713e8f51f
                        • Instruction Fuzzy Hash: 00712571A00209EFCB24DFA5C8D1AAEBBB1FF08314F10463AE545A3291D739A945CF99
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@H_prolog
                        • String ID:
                        • API String ID: 1329742358-0
                        • Opcode ID: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                        • Instruction ID: 956102545b91a7c0cba0a64d671320761176ea25dc816e9057e3d4af94f09eda
                        • Opcode Fuzzy Hash: 6656e43d2981dee3a96cb881ff7527404ad10ce0abe68b4cdaafc38c009261e5
                        • Instruction Fuzzy Hash: 0D411F32800204AFCB09DB65CD45EBE7B35EF50304B18883BF402B72E2D63E9E21965B
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??2@??3@
                        • String ID:
                        • API String ID: 1936579350-0
                        • Opcode ID: ebac23084a16b944365a47061f6b21e986bd860b63916dd214b45b095081060c
                        • Instruction ID: 063e94d8e06ff9613a5b681c15dc067c338ae4066a9753272274ce5f9f11bd0f
                        • Opcode Fuzzy Hash: ebac23084a16b944365a47061f6b21e986bd860b63916dd214b45b095081060c
                        • Instruction Fuzzy Hash: 71F0A476210612ABC334DF2DC581867B3E4EF88711710893FE6C7C72B1DA31A881C754
                        APIs
                        • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040DA0B
                        • GetLastError.KERNEL32(?,?,?,?), ref: 0040DA19
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ErrorFileLastPointer
                        • String ID:
                        • API String ID: 2976181284-0
                        • Opcode ID: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                        • Instruction ID: d86f9e507f4e039952bd1031b0dc001be1b0661bb6f0ed5f18f0f7cd7a7605a3
                        • Opcode Fuzzy Hash: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                        • Instruction Fuzzy Hash: FCF0B2B8A04208FFCB04CFA8D8448AE7BB9EB49314B2085A9F815A7390D735DA04DF64
                        APIs
                        • SysAllocString.OLEAUT32(?), ref: 0040ED05
                        • _CxxThrowException.MSVCRT(?,00415010), ref: 0040ED28
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: AllocExceptionStringThrow
                        • String ID:
                        • API String ID: 3773818493-0
                        • Opcode ID: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                        • Instruction ID: 896a1b371a95ab63a3f889c911e7bff8eb1facf706b7c8fcc1dab20228dace7a
                        • Opcode Fuzzy Hash: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                        • Instruction Fuzzy Hash: CDE06D71600309ABDB10AF66D8419D67BE8EF00380B00C83FF948CA250E779E590C7D9
                        APIs
                        • EnterCriticalSection.KERNEL32(?), ref: 0040E745
                        • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040E764
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterLeave
                        • String ID:
                        • API String ID: 3168844106-0
                        • Opcode ID: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                        • Instruction ID: 086d926b78662e0ab04275255430a857868cdabe8091615e808f779c17768b54
                        • Opcode Fuzzy Hash: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                        • Instruction Fuzzy Hash: 76F05436200214FBCB119F95DC08E9BBBB9FF49761F14842AF945E7260C771E821DBA4
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: H_prolog
                        • String ID:
                        • API String ID: 3519838083-0
                        • Opcode ID: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                        • Instruction ID: 39d544f4fee3d18347c8ea8d59cce7c7d4ef222c74644271f89bd24cd9d44c54
                        • Opcode Fuzzy Hash: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                        • Instruction Fuzzy Hash: 4B2180316003099BCB14EFA5C945AAE73B5EF40344F14843EF806BB291DB38DD16CB1A
                        APIs
                        • SetFileAttributesW.KERNELBASE(?,?), ref: 0040124F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                        • Instruction ID: 5817d5120c2da98d16edaa91ace5ca285f5b3ff1e58b2ffd557e42fef7bfdc6e
                        • Opcode Fuzzy Hash: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                        • Instruction Fuzzy Hash: 66F05E72100201DBC720AF98C840BA777F5BB84314F04483EE583F2AA0D778B885CB59
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: H_prolog
                        • String ID:
                        • API String ID: 3519838083-0
                        • Opcode ID: 05aa82fd4493c2954843b58147a6e12e638aaadf2772ca9641b0bace8f10624d
                        • Instruction ID: 375caa893e42e0daca7b158ffe4b4b415bc54d3572d418f3e5e61c8e5be1c541
                        • Opcode Fuzzy Hash: 05aa82fd4493c2954843b58147a6e12e638aaadf2772ca9641b0bace8f10624d
                        • Instruction Fuzzy Hash: 30F0F272500109BBCF029F85D901AEEBB36EB48354F00811ABA1161160D33A9961AB99
                        APIs
                          • Part of subcall function 0040D985: CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                        • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50), ref: 0040DA78
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: CloseCreateFileHandle
                        • String ID:
                        • API String ID: 3498533004-0
                        • Opcode ID: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                        • Instruction ID: 040011ad7fb3de3f437c6c7e3ebc1dcda5640d8293b7e84d035d3e38099293ab
                        • Opcode Fuzzy Hash: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                        • Instruction Fuzzy Hash: A1E04F32140219ABCF215FA49C01BCA7B96AF09760F144526BE11A61E0C672D465AF94
                        APIs
                        • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040DD78,00000001,00000000,00000000,00413330,?,00404D94,?,?), ref: 0040DBBA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: FileWrite
                        • String ID:
                        • API String ID: 3934441357-0
                        • Opcode ID: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                        • Instruction ID: ec3d056ad33d5175d1bee219b94afd5900c8108b90431a53c6143dcb1d381838
                        • Opcode Fuzzy Hash: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                        • Instruction Fuzzy Hash: D7E0C275600208FBCB00CF95C801B9E7BBABB49755F10C069F918AA2A0D739AA10DF54
                        APIs
                        • _beginthreadex.MSVCRT ref: 00406552
                          • Part of subcall function 00406501: GetLastError.KERNEL32(00406563,00000000), ref: 004064F5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ErrorLast_beginthreadex
                        • String ID:
                        • API String ID: 4034172046-0
                        • Opcode ID: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                        • Instruction ID: fe95790bd269afcad05a26a3721163fc0b830ac61c9b3c5b6bbddf8a66cf2d64
                        • Opcode Fuzzy Hash: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                        • Instruction Fuzzy Hash: 12D05EF6400208BFDF01DFE0DC05CAB3BADEB08204B004464FD05C2150E632DA108B60
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: H_prolog
                        • String ID:
                        • API String ID: 3519838083-0
                        • Opcode ID: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                        • Instruction ID: 312fbe8762c42e8d4a239ae194adb86e93363bc1e5443e54fb58aca6058f63a2
                        • Opcode Fuzzy Hash: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                        • Instruction Fuzzy Hash: 70D05EB2A04108FBE7109F85D946BEEFB78EB80399F10823FB506B1150D7BC5A0196AD
                        APIs
                        • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040DAF2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: FileRead
                        • String ID:
                        • API String ID: 2738559852-0
                        • Opcode ID: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                        • Instruction ID: c05821c64f4412cbb188b0f884d423eaa3d686fb1c941f6ac6705c8b1bb703da
                        • Opcode Fuzzy Hash: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                        • Instruction Fuzzy Hash: 58E0EC75211208FFDB01CF90CD01FDE7BBDFB49755F208058E90596160C7759A10EB54
                        APIs
                        • SetFileTime.KERNELBASE(?,?,?,?,0040DB94,00000000,00000000,?,0040123C,?), ref: 0040DB78
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: FileTime
                        • String ID:
                        • API String ID: 1425588814-0
                        • Opcode ID: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                        • Instruction ID: c6000770aa4fb4c72b4925fc402daec6625791e8065b7518697746b49206ca3e
                        • Opcode Fuzzy Hash: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                        • Instruction Fuzzy Hash: 40C04C3A199105FF8F020F70CD04C1ABBA2AB95722F10C918B199C4070CB328424EB02
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: 97bd8de7a7fe9ad43a3345e9333d2138b4beb196f0434672ce39f7d09e0e15cd
                        • Instruction ID: f56dbf57367ec124b55c1fed62106b1dafce564086f6503587e0b0fbfa293862
                        • Opcode Fuzzy Hash: 97bd8de7a7fe9ad43a3345e9333d2138b4beb196f0434672ce39f7d09e0e15cd
                        • Instruction Fuzzy Hash: EA21A271A00B009FC724CFAAC88485BF7F9FF88724764896EE49A93A40E774B945CB54
                        APIs
                        • _CxxThrowException.MSVCRT(?,00414F84), ref: 0040E616
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ExceptionThrow
                        • String ID:
                        • API String ID: 432778473-0
                        • Opcode ID: 85c4e5dde0f8cee934fbe77132b2d5831568e55a053817787dcfc8e06ea2b7f6
                        • Instruction ID: f2b552c6dcb6979234feea5fe890f572eb9d388e9264680fa6f26452196acfb0
                        • Opcode Fuzzy Hash: 85c4e5dde0f8cee934fbe77132b2d5831568e55a053817787dcfc8e06ea2b7f6
                        • Instruction Fuzzy Hash: 20017171600701AFDB28CFBAD805997BBF8EF85314704496EE482D3651E374F946CB50
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: free
                        • String ID:
                        • API String ID: 1294909896-0
                        • Opcode ID: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                        • Instruction ID: 8ccd5c106adaedd21fdabd868c2a091acccb285e2c6396e7c66228af9079aab7
                        • Opcode Fuzzy Hash: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                        • Instruction Fuzzy Hash: 68E0ED311087008BEB74DA38A941F97B3DAAB14314F15893FE89AE7690EB74FC448A59
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??2@
                        • String ID:
                        • API String ID: 1033339047-0
                        • Opcode ID: 76c2607c9262a084594b8968e60506e1095ba5b3921c342d3f15f01c827a8030
                        • Instruction ID: 194059228ff5733793a196764ebf5a0b63d959e09992ce12dff2d54d27d13516
                        • Opcode Fuzzy Hash: 76c2607c9262a084594b8968e60506e1095ba5b3921c342d3f15f01c827a8030
                        • Instruction Fuzzy Hash: 67D0A9313083121ADA5432320A09AAF84848B503A0F10083FB800A32D1DCBE8C81A299
                        APIs
                        • CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                        • Instruction ID: 71cfb53d0268b44c797f7400575dcc0518408263689e7c465582b3111ebcfb94
                        • Opcode Fuzzy Hash: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                        • Instruction Fuzzy Hash: 95D0127251422156CF646E7CB8849C277D85A06334335176AF0B4E32E4D3749DCB5698
                        APIs
                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040E4D6,00020000,00000000,?,00000000,?,0040D92B,?,?,00000000,?,0040D96E), ref: 004024E0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                        • Instruction ID: 23ad038ad5ccaf642d49e1102795c1c714580f299e31bec6e074b0e2bc220d86
                        • Opcode Fuzzy Hash: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                        • Instruction Fuzzy Hash: D3C080301443007DED115F505E06B463A916B44717F508065F344540D0C7F484009509
                        APIs
                        • ??2@YAPAXI@Z.MSVCRT(000000D0), ref: 0041138D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??2@
                        • String ID:
                        • API String ID: 1033339047-0
                        • Opcode ID: 08d588780a3caab37cf70573278ad1822b03e6a84bf609910ea5ba04e31b1b9c
                        • Instruction ID: d5b8b2b556814232dc2945b8f7e5995fed121ff751d048b21687cc00dda573f5
                        • Opcode Fuzzy Hash: 08d588780a3caab37cf70573278ad1822b03e6a84bf609910ea5ba04e31b1b9c
                        • Instruction Fuzzy Hash: B4B0123438914504FE5413B208013FB01800F40303F10087B5B02E4DF9FD0884805139
                        APIs
                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,0040E561,?,00000004,0040E5B0,?,?,004117E5,?), ref: 00401B2A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: FreeVirtual
                        • String ID:
                        • API String ID: 1263568516-0
                        • Opcode ID: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                        • Instruction ID: 5381ed20748db0b7fd93371e38984c83fa4171db9cf80dc6a42123bab5888d64
                        • Opcode Fuzzy Hash: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                        • Instruction Fuzzy Hash: 45A002305446007ADE515B10DD05F457F516744B11F20C5547155540E586755654DA09
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: free
                        • String ID:
                        • API String ID: 1294909896-0
                        • Opcode ID: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                        • Instruction ID: 7baee4be7330d58fba6a4d3e6254b3dabd4481adb37f3967e502ba2394f26960
                        • Opcode Fuzzy Hash: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                        • Instruction Fuzzy Hash:
                        APIs
                        • _wtol.MSVCRT ref: 004034E5
                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,CC5BE863,00000000,004177A0,00000000,00417794), ref: 00403588
                        • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 004035F9
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 00403601
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00403609
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00403611
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00403619
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00403621
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403629
                        • _wtol.MSVCRT ref: 0040367F
                        • CoCreateInstance.OLE32(00414BF4,00000000,00000001,00414BE4,00404F9B,.lnk,?,0000005C), ref: 00403720
                        • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 004037B8
                        • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 004037C0
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 004037C8
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 004037D0
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 004037D8
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 004037E0
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 004037E8
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 004037EE
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 004037F6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                        • String ID: .lnk
                        • API String ID: 408529070-24824748
                        • Opcode ID: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                        • Instruction ID: c4a1d47ac56633071a1bd2db01059e5edb54ffe0bccc65637149caefe5d2277b
                        • Opcode Fuzzy Hash: cb1a116a375c0276f3cc47ebae34f017b071fc5c88c5a353f484599fe5934efa
                        • Instruction Fuzzy Hash: 8EA18A71910219ABDF04EFA1CC46DEEBB79EF44705F50442AF502B71A1EB79AA81CB18
                        APIs
                        • GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                        • wsprintfW.USER32 ref: 00401FFD
                        • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                        • GetLastError.KERNEL32 ref: 00402017
                        • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                        • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                        • GetLastError.KERNEL32 ref: 0040204C
                        • lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                        • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                        • ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                        • SetLastError.KERNEL32(00000000), ref: 00402098
                        • lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                        • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                        • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                        • _wtol.MSVCRT ref: 0040212A
                        • MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                        • String ID: 7zSfxString%d$XpA$\3A
                        • API String ID: 2117570002-3108448011
                        • Opcode ID: 332d11925e247980b34bd098e8b038dc96ba1155979fc83484f9ac8f636b93aa
                        • Instruction ID: 5c0681f152172bce6659d4e02be164ba9bb36eab7c70e8d4f1a0ed4420d73572
                        • Opcode Fuzzy Hash: 332d11925e247980b34bd098e8b038dc96ba1155979fc83484f9ac8f636b93aa
                        • Instruction Fuzzy Hash: 11518471604305AFDB209F74DD899DBBBB9EB08345B11407AF646E62E0E774AA44CB18
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                        • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                        • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                        • SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                        • LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                        • LockResource.KERNEL32(00000000), ref: 00401C41
                        • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401C6D
                        • GetProcAddress.KERNEL32(00000000), ref: 00401C76
                        • wsprintfW.USER32 ref: 00401C95
                        • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401CAA
                        • GetProcAddress.KERNEL32(00000000), ref: 00401CAD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                        • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                        • API String ID: 2639302590-365843014
                        • Opcode ID: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                        • Instruction ID: 1b367ad183524107b1556f539f271e2bfa11f4d2ebd4ebc35158efee647c5c94
                        • Opcode Fuzzy Hash: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                        • Instruction Fuzzy Hash: 002153B1944318BBDB109FA59D48F9B7FBCEB48751F118036FA05B72D1D678DA008BA8
                        APIs
                        • wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                        • GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                        • FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                        • FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                        • lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                        • lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                        • ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                        • lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                        • lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                        • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                        • LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                        • String ID:
                        • API String ID: 829399097-0
                        • Opcode ID: bf60f95a6a1f59c2bb6c04e2e113b9a1b5cd8de0030c6a868400c9436056581d
                        • Instruction ID: 98041b7e574f1f1c61a73cce3db0a13ad597614178cae5aaf21d0c5f67190c53
                        • Opcode Fuzzy Hash: bf60f95a6a1f59c2bb6c04e2e113b9a1b5cd8de0030c6a868400c9436056581d
                        • Instruction Fuzzy Hash: 85218172804209BEDF14AFA0DC85CEB7BACEB04355B10847BF506A7150EB34EE848BA4
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,00413454,?,?,?,00000000), ref: 00402BA8
                        • lstrcmpW.KERNEL32(?,00413450,?,0000005C,?,?,?,00000000), ref: 00402BFB
                        • lstrcmpW.KERNEL32(?,00413448,?,?,00000000), ref: 00402C11
                        • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402C27
                        • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402C2E
                        • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402C40
                        • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402C4F
                        • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402C5A
                        • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402C63
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C6E
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C79
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                        • String ID:
                        • API String ID: 1862581289-0
                        • Opcode ID: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                        • Instruction ID: 7ffcf375551190f92b7aba4ef5ef3cd4ed0286f9dec59b0789af02bc25bdcc12
                        • Opcode Fuzzy Hash: 3adc14f40e23b1cdad4e4199877390cf68653eec517b691feb080405b1435fa2
                        • Instruction Fuzzy Hash: A321A230500209BAEB10AF61DE4CFBF7B7C9B0470AF14417AB505B11E0EB78DB459A6C
                        APIs
                        • LoadLibraryA.KERNEL32(uxtheme,?,00407F57,000004B1,00000000,?,?,?,?,?,0040803E), ref: 00406D65
                        • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00406D76
                        • GetWindow.USER32(?,00000005), ref: 00406D8F
                        • GetWindow.USER32(00000000,00000002), ref: 00406DA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: Window$AddressLibraryLoadProc
                        • String ID: SetWindowTheme$\EA$uxtheme
                        • API String ID: 324724604-1613512829
                        • Opcode ID: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                        • Instruction ID: f2e0bdee1e376373ef12be0a37c87caa708c4cf78f5ebad58458586032015049
                        • Opcode Fuzzy Hash: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                        • Instruction Fuzzy Hash: 47F0A73274172537C6312A6A6C4CF9B6B9C9FC6B51B070176B905F7280DA6CCD0045BC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                        • Instruction ID: 2cf66fefa79674a345482580870fbecf2b771b639b37e27eb1fc897e4fc9b441
                        • Opcode Fuzzy Hash: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                        • Instruction Fuzzy Hash: 44126E31E00129DFDF08CF68C6945ECBBB2EF85345F2585AAD856AB280D6749EC1DF84
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                        • Instruction ID: 8743f1180a29be23716da9caa70fae7f7856ace610ba4dfa2102d12747f13ae8
                        • Opcode Fuzzy Hash: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                        • Instruction Fuzzy Hash: D12129725104255BC711DF1DE8887B7B3E1FFC4319F678A36DA81CB281C629D894C6A0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                        • Instruction ID: 7cc7f0f00d3fdf34bc0739e2af2c3edfb6ca911da6c9eaecf720caf4c907201e
                        • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                        • Instruction Fuzzy Hash: 0621F53290062587CB12CE6EE4845A7F392FBC436AF134727EE84A3291C62CA855C6A0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                        • Instruction ID: 0032c0c3dd355d3b1328166acc4be040b7821e5e83bc1fe28c274bced218c28f
                        • Opcode Fuzzy Hash: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                        • Instruction Fuzzy Hash: 4EF074B5A05209EFCB09CFA9C49199EFBF5FF48304B1084A9E819E7350E731AA11CF50
                        APIs
                        • lstrcmpiW.KERNEL32(00000000,0041442C,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004046DF
                          • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                          • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                          • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                          • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                          • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                          • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                          • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                          • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                          • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                          • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                          • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                          • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                          • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                        • _wtol.MSVCRT ref: 004047DC
                        • _wtol.MSVCRT ref: 004047F8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                        • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle$XmN$|wA
                        • API String ID: 2725485552-2407502197
                        • Opcode ID: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                        • Instruction ID: a5d789275b7dd46d140941e9fd319bf554fc7ea6ad5da08365fcb0f0a182a74d
                        • Opcode Fuzzy Hash: 7a70c90a09e6339ceb99db9b5511794fba0efbdd365b8bdd8dc3dc4b6a1705ac
                        • Instruction Fuzzy Hash: 4251B5F1A402047EDB10BB619D86EFF36ACDA85308B64443BF904F32C1E6BC5E854A6D
                        APIs
                        • GetDriveTypeW.KERNEL32(?,?,?), ref: 00404B46
                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00404B77
                        • WriteFile.KERNEL32(004177C4,?,?,00406437,00000000,del ",:Repeat,00000000), ref: 00404C2C
                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C37
                        • CloseHandle.KERNEL32(004177C4), ref: 00404C40
                        • SetFileAttributesW.KERNEL32(00406437,00000000), ref: 00404C57
                        • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00404C69
                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C72
                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C7E
                        • ??3@YAXPAX@Z.MSVCRT(00406437,?), ref: 00404C84
                        • ??3@YAXPAX@Z.MSVCRT(00406437,?,?,?,?,?,?,?,?,?,?,?,?,?,00406437,004177C4), ref: 00404CB2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                        • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                        • API String ID: 3007203151-3467708659
                        • Opcode ID: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                        • Instruction ID: 7a4c4b622d76ac6c1822c64a370ea4e05d699ec4102568342bfcf68b8c9639ad
                        • Opcode Fuzzy Hash: 867eebb51e1b750364ee620a5f1ec15cba4384e9a655442323ea2c3f34152715
                        • Instruction Fuzzy Hash: DE416171D01119BADB00EBA5ED85DEEBB78EF44358F50803AF511720E1EB78AE85CB58
                        APIs
                        • GetClassNameA.USER32(?,?,00000040), ref: 00402DD3
                        • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402DE6
                        • GetWindowLongW.USER32(?,000000F0), ref: 00402DF3
                          • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                          • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                          • Part of subcall function 00401A85: CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                          • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402E20
                        • GetParent.USER32(?), ref: 00402E2E
                        • LoadLibraryA.KERNEL32(riched20), ref: 00402E42
                        • GetMenu.USER32(?), ref: 00402E55
                        • SetThreadLocale.KERNEL32(00000419), ref: 00402E62
                        • CreateWindowExW.USER32(00000000,RichEdit20W,0041335C,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 00402E92
                        • DestroyWindow.USER32(?), ref: 00402EA3
                        • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00402EB8
                        • GetSysColor.USER32(0000000F), ref: 00402EBC
                        • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00402ECA
                        • SendMessageW.USER32(00000000,00000461,?,?), ref: 00402EF5
                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402EFA
                        • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402F02
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: Window$??3@MessageSend$CharTextUpper$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                        • String ID: RichEdit20W$STATIC$riched20${\rtf
                        • API String ID: 1731037045-2281146334
                        • Opcode ID: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                        • Instruction ID: c7c9ca1f65d7473fe19c29f8272bdbb18bb8b251efb89c9ee4785ec66c96c850
                        • Opcode Fuzzy Hash: 2b38b22499d69b5ca28c01525db5cb238b78fd2564d1ef548c56061806c72a13
                        • Instruction Fuzzy Hash: FE316072A40119BFDB01AFA5DD49DEF7BBCEF08745F104036F601B21D1DA789A008B68
                        APIs
                        • GetWindowDC.USER32(00000000), ref: 00401CD4
                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                        • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                        • GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                        • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                        • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                        • CreateCompatibleDC.GDI32(?), ref: 00401D4B
                        • CreateCompatibleDC.GDI32(?), ref: 00401D52
                        • SelectObject.GDI32(00000000,?), ref: 00401D60
                        • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                        • SelectObject.GDI32(00000000,00000000), ref: 00401D76
                        • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                        • GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                        • SelectObject.GDI32(00000000,?), ref: 00401DB3
                        • SelectObject.GDI32(00000000,?), ref: 00401DB9
                        • DeleteDC.GDI32(00000000), ref: 00401DC2
                        • DeleteDC.GDI32(00000000), ref: 00401DC5
                        • ReleaseDC.USER32(00000000,?), ref: 00401DCC
                        • ReleaseDC.USER32(00000000,?), ref: 00401DDB
                        • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401DE8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                        • String ID:
                        • API String ID: 3462224810-0
                        • Opcode ID: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                        • Instruction ID: 24730f8ff9b6a3f8d7f0600a39c6f646a54ca28d21b12e05547a6914d757f366
                        • Opcode Fuzzy Hash: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                        • Instruction Fuzzy Hash: 00313976D00208BBDF215FA19C48EEFBFBDEB48752F108066F604B21A0C6758A50EB64
                        APIs
                        • GetClassNameA.USER32(?,?,00000040), ref: 00401E05
                        • lstrcmpiA.KERNEL32(?,STATIC), ref: 00401E1C
                        • GetWindowLongW.USER32(?,000000F0), ref: 00401E2F
                        • GetMenu.USER32(?), ref: 00401E44
                          • Part of subcall function 00401BDF: GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                          • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                          • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                          • Part of subcall function 00401BDF: SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                          • Part of subcall function 00401BDF: LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                          • Part of subcall function 00401BDF: LockResource.KERNEL32(00000000), ref: 00401C41
                        • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00401E76
                        • memcpy.MSVCRT(00000000,00000000,00000010), ref: 00401E83
                        • CoInitialize.OLE32(00000000), ref: 00401E8C
                        • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00401E98
                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00414C14,?), ref: 00401EBD
                        • GlobalFree.KERNEL32(00000000), ref: 00401ECD
                          • Part of subcall function 00401CC8: GetWindowDC.USER32(00000000), ref: 00401CD4
                          • Part of subcall function 00401CC8: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                          • Part of subcall function 00401CC8: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                          • Part of subcall function 00401CC8: GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                          • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                          • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                          • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D4B
                          • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D52
                          • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401D60
                          • Part of subcall function 00401CC8: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                          • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,00000000), ref: 00401D76
                          • Part of subcall function 00401CC8: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                          • Part of subcall function 00401CC8: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                          • Part of subcall function 00401CC8: GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                          • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB3
                          • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB9
                          • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC2
                          • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC5
                          • Part of subcall function 00401CC8: ReleaseDC.USER32(00000000,?), ref: 00401DCC
                        • GetObjectW.GDI32(00000000,00000018,?), ref: 00401EFF
                        • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 00401F13
                        • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 00401F25
                        • GlobalFree.KERNEL32(00000000), ref: 00401F3A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                        • String ID: IMAGES$STATIC
                        • API String ID: 4202116410-1168396491
                        • Opcode ID: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                        • Instruction ID: 08c73d75f8249df6a552952f3d33af28cabbedea74541c6d0cfd8ce2793c0c4e
                        • Opcode Fuzzy Hash: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                        • Instruction Fuzzy Hash: C7417C71A00218BFCB11DFA1DC49DEEBF7DEF08742B008076FA05A61A0DB758A41DB68
                        APIs
                          • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                          • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                        • GetDlgItem.USER32(?,000004B8), ref: 0040816A
                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408179
                        • GetDlgItem.USER32(?,000004B5), ref: 004081C0
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 004081C5
                        • GetDlgItem.USER32(?,000004B5), ref: 004081D5
                        • SetWindowLongW.USER32(00000000), ref: 004081D8
                        • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 004081FE
                        • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408210
                        • GetDlgItem.USER32(?,000004B4), ref: 0040821A
                        • SetFocus.USER32(00000000), ref: 0040821D
                        • SetTimer.USER32(?,00000001,00000000,00000000), ref: 0040824C
                        • CoCreateInstance.OLE32(00414C34,00000000,00000001,00414808,00000000), ref: 00408277
                        • GetDlgItem.USER32(?,00000002), ref: 00408294
                        • IsWindow.USER32(00000000), ref: 00408297
                        • GetDlgItem.USER32(?,00000002), ref: 004082A7
                        • EnableWindow.USER32(00000000), ref: 004082AA
                        • GetDlgItem.USER32(?,000004B5), ref: 004082BE
                        • ShowWindow.USER32(00000000), ref: 004082C1
                          • Part of subcall function 00407134: GetDlgItem.USER32(?,000004B6), ref: 00407142
                          • Part of subcall function 00407B33: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                          • Part of subcall function 00407B33: GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                          • Part of subcall function 00407B33: SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                          • Part of subcall function 00407B33: wsprintfW.USER32 ref: 00407BBB
                          • Part of subcall function 00407B33: ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                          • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                          • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                          • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                          • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                          • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                          • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                          • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                          • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                          • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                          • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: Item$Window$MessageSend$System$EnableHandleLoadLongMenuMetricsModuleShow$??3@CreateFocusIconImageInstanceTimerUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                        • String ID:
                        • API String ID: 855516470-0
                        • Opcode ID: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                        • Instruction ID: 3ce0214ef3d03b0ee840dd4ab9c121ae631e901bc0d6870238ad5b6e85178a64
                        • Opcode Fuzzy Hash: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                        • Instruction Fuzzy Hash: 014174B0644748ABDA206F65DD49F5B7BADEB40B05F00847DF552A62E1CB79B800CA1C
                        APIs
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,hAA,00000000), ref: 004030F6
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,hAA,00000000), ref: 004030FE
                        • strncmp.MSVCRT ref: 004031F1
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00403255
                        • lstrcmpW.KERNEL32(?,SetEnvironment,00000000), ref: 00403273
                        • ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@$lstrcmpstrncmp
                        • String ID: GUIFlags$MiscFlags$SetEnvironment$hAA${\rtf
                        • API String ID: 2881732429-172299233
                        • Opcode ID: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                        • Instruction ID: da55d09168dcf28f6e950782b6654b171f18f9ca5632fa18d2c46afc5d57570a
                        • Opcode Fuzzy Hash: 436b0b5fdcd0fc7850317bda0c1040a654aafe726af0558e82b6743448b11ef5
                        • Instruction Fuzzy Hash: 23819D31900218ABDF11DFA1CD55BEE7B78AF14305F1040ABE8017B2E6DB78AB05DB59
                        APIs
                        • GetDlgItem.USER32(?,000004B3), ref: 00406A69
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00406A6E
                        • GetDlgItem.USER32(?,000004B4), ref: 00406AA5
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00406AAA
                        • GetSystemMetrics.USER32(00000010), ref: 00406B0B
                        • GetSystemMetrics.USER32(00000011), ref: 00406B11
                        • GetSystemMetrics.USER32(00000008), ref: 00406B18
                        • GetSystemMetrics.USER32(00000007), ref: 00406B1F
                        • GetParent.USER32(?), ref: 00406B43
                        • GetClientRect.USER32(00000000,?), ref: 00406B55
                        • ClientToScreen.USER32(?,?), ref: 00406B68
                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00406BCE
                        • GetClientRect.USER32(?,?), ref: 00406C55
                        • ClientToScreen.USER32(?,?), ref: 00406B71
                          • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                        • GetSystemMetrics.USER32(00000008), ref: 00406CD6
                        • GetSystemMetrics.USER32(00000007), ref: 00406CDD
                          • Part of subcall function 00406A18: GetDlgItem.USER32(?,?), ref: 00406A36
                          • Part of subcall function 00406A18: SetWindowPos.USER32(00000000), ref: 00406A3D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                        • String ID:
                        • API String ID: 747815384-0
                        • Opcode ID: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                        • Instruction ID: 701d8c843d4ec3579feae24e97f284edc15b0bac0439a5efdbaa5111af673c9b
                        • Opcode Fuzzy Hash: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                        • Instruction Fuzzy Hash: 7B912D71A00209AFDB14DFB9CD85AEEB7F9EF48704F148529E642F6290D778E9008B64
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                        • LoadIconW.USER32(00000000), ref: 00407D33
                        • GetSystemMetrics.USER32(00000032), ref: 00407D43
                        • GetSystemMetrics.USER32(00000031), ref: 00407D48
                        • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                        • LoadImageW.USER32(00000000), ref: 00407D54
                        • SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                        • SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                        • GetWindow.USER32(?,00000005), ref: 00407E76
                        • GetWindow.USER32(?,00000005), ref: 00407E92
                        • GetWindow.USER32(?,00000005), ref: 00407EAA
                        • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,0040803E), ref: 00407F0A
                        • LoadIconW.USER32(00000000), ref: 00407F0D
                        • GetDlgItem.USER32(?,000004B1), ref: 00407F28
                        • SendMessageW.USER32(00000000), ref: 00407F2F
                          • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                          • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                          • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                          • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: Window$HandleItemLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                        • String ID:
                        • API String ID: 1889686859-0
                        • Opcode ID: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                        • Instruction ID: b6a50195b8a608de49edc5b96f3e83ee8a9b90890169e94b1220211b89b9884f
                        • Opcode Fuzzy Hash: 54e99e0b53345dbf389ae49fdb6e6d7c6227533794aadf34278c182137d853b4
                        • Instruction Fuzzy Hash: E861D47064C7096AE9257B61DC4AF3B3699AB40B05F10447FF642B92D2DBBCBC0056AF
                        APIs
                        • GetParent.USER32(?), ref: 00406F45
                        • GetWindowLongW.USER32(00000000), ref: 00406F4C
                        • DefWindowProcW.USER32(?,?,?,?), ref: 00406F62
                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 00406F7F
                        • GetSystemMetrics.USER32(00000031), ref: 00406F91
                        • GetSystemMetrics.USER32(00000032), ref: 00406F98
                        • GetWindowDC.USER32(?), ref: 00406FAA
                        • GetWindowRect.USER32(?,?), ref: 00406FB7
                        • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 00406FEB
                        • ReleaseDC.USER32(?,00000000), ref: 00406FF3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                        • String ID:
                        • API String ID: 2586545124-0
                        • Opcode ID: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                        • Instruction ID: b1ff7c23223d170b9333fa97acec74f2c9230ee3eabfe87d0be763292bfdf634
                        • Opcode Fuzzy Hash: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                        • Instruction Fuzzy Hash: 8E210C7650021ABFCF01AFA8DD48DDF7F69FB08351F008565FA15E21A0C775EA209B64
                        APIs
                        • GetDlgItem.USER32(?,000004B3), ref: 0040678E
                        • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067A1
                        • GetDlgItem.USER32(?,000004B4), ref: 004067AB
                        • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067B3
                        • SendMessageW.USER32(?,00000401,?,00000000), ref: 004067C3
                        • GetDlgItem.USER32(?,?), ref: 004067CC
                        • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004067D4
                        • GetDlgItem.USER32(?,?), ref: 004067DD
                        • SetFocus.USER32(00000000,?,000004B4,74DF0E50,00407E06,000004B4,000004B3,00000000,000004B4,00000000,000004B2,?,000004B7), ref: 004067E0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ItemMessageSend$Focus
                        • String ID:
                        • API String ID: 3946207451-0
                        • Opcode ID: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                        • Instruction ID: e7a8c5b21de344c7c4c5496bf688f1d5cc3ba414acf11b32f4788b893cc62525
                        • Opcode Fuzzy Hash: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                        • Instruction Fuzzy Hash: 6FF04F712403087BEA212B61DD86F5BBA6EEF81B45F018425F340650F0CBF7EC109A28
                        APIs
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0040C603
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@
                        • String ID: IA$IA$IA$IA$IA$IA
                        • API String ID: 613200358-3743982587
                        • Opcode ID: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                        • Instruction ID: 4cebfcab61734def35128a955d6a3e34031d8899c11ca8f9bd2aeb72941b6852
                        • Opcode Fuzzy Hash: 6e54149e8c3d77333b16b378dc95c38791a09178c73359331ff936fd258cd747
                        • Instruction Fuzzy Hash: D2221671900248DFCB24EF65C8D09EEBBB5FF48304F50852EE91AA7291DB38A945CF58
                        APIs
                        • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,00417788,00000000,SetEnvironment), ref: 00408479
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@
                        • String ID: BeginPrompt$ErrorTitle$FinishMessage$HelpText$SetEnvironment$WarningTitle
                        • API String ID: 613200358-994561823
                        • Opcode ID: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                        • Instruction ID: 5566f9f9667118f06bc812855c9affabb63102f3a10b3971892d5eca1131561f
                        • Opcode Fuzzy Hash: 971dcdd12a827a4034ed94f9ba1d623efd1f14b2bcca4d73e06b44b648e667ed
                        • Instruction Fuzzy Hash: CA51D47080420AAACF24AB559E85AFB7774EB20348F54443FF881722E1EF7D5D82D64E
                        APIs
                        • memcpy.MSVCRT(?,00417410,00000160), ref: 00406DD1
                        • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00406DF0
                        • GetDC.USER32(00000000), ref: 00406DFB
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00406E07
                        • MulDiv.KERNEL32(?,00000048,00000000), ref: 00406E16
                        • ReleaseDC.USER32(00000000,?), ref: 00406E24
                        • GetModuleHandleW.KERNEL32(00000000), ref: 00406E4C
                        • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_0000667A), ref: 00406E81
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                        • String ID:
                        • API String ID: 2693764856-0
                        • Opcode ID: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                        • Instruction ID: b2c1943609947f3a034a1f42a4fd453b3666a2b5c4d4ccfd9a1c2059c5c1cb6f
                        • Opcode Fuzzy Hash: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                        • Instruction Fuzzy Hash: C32184B5500218BFDB215F61DC45EEB7B7CFB08746F0040B6F609A1190D7748E948B65
                        APIs
                        • GetDC.USER32(?), ref: 0040696E
                        • GetSystemMetrics.USER32(0000000B), ref: 0040698A
                        • GetSystemMetrics.USER32(0000003D), ref: 00406993
                        • GetSystemMetrics.USER32(0000003E), ref: 0040699B
                        • SelectObject.GDI32(?,?), ref: 004069B8
                        • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004069D3
                        • SelectObject.GDI32(?,?), ref: 004069F9
                        • ReleaseDC.USER32(?,?), ref: 00406A08
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                        • String ID:
                        • API String ID: 2466489532-0
                        • Opcode ID: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                        • Instruction ID: 7c755332e1b278278a0584394201b19561512224090c74d51841a9ad660c27ee
                        • Opcode Fuzzy Hash: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                        • Instruction Fuzzy Hash: 6B216871900209EFCB119F65DD84A8EBFF4EF08321F10C46AE559A72A0C7359A50DF40
                        APIs
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                        • GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                        • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                        • wsprintfW.USER32 ref: 00407BBB
                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                        • String ID: %d%%
                        • API String ID: 3753976982-1518462796
                        • Opcode ID: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                        • Instruction ID: b955b8041d8a67620c3180d4911c799512bd6939d195f5b55c3092177650065a
                        • Opcode Fuzzy Hash: 0b792d7adb6174ba2d50e5ca9cf87896ffea0db59519718aa7dbff65f529ef39
                        • Instruction Fuzzy Hash: 1D31D371904208BBDB11AFA0CC45EDA7BB9EF48708F10847AFA42B61E1D779B904CB59
                        APIs
                        • lstrlenW.KERNEL32(hAA,00000020,?,?,00405838,?,?,?,00000000,?), ref: 004040A4
                          • Part of subcall function 00401A85: CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                          • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404156
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040415E
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040416D
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404175
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@$CharUpper$lstrlen
                        • String ID: hAA
                        • API String ID: 2587799592-1362906312
                        • Opcode ID: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                        • Instruction ID: 7f7e13310b21401de90169bcc26cd057e2afddf23eedd5de54135d69024cf91c
                        • Opcode Fuzzy Hash: f1afb06a12cfea52e195ddd9e8ddb158cdff932f9735d488ba252034b153affa
                        • Instruction Fuzzy Hash: D7212772D40215AACF20ABA4CC46AEB77B9DF90354F10407BEB41BB2E1E7789D848658
                        APIs
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000001,00000000,00000000,00000001,?,00000000), ref: 00404D3E
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DA0
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DB8
                          • Part of subcall function 00403354: lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                          • Part of subcall function 00403354: GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                          • Part of subcall function 00403354: GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                          • Part of subcall function 00403354: ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@$FileTime$AttributesSystemlstrlen
                        • String ID: 03A$;!@Install@!UTF-8!$;!@InstallEnd@!
                        • API String ID: 4038993085-2279431206
                        • Opcode ID: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                        • Instruction ID: 637b7b13a9bcd1d52ea1019587bfa2fb4435f6835f564ae220b3123002230846
                        • Opcode Fuzzy Hash: 1e5f1ef11ab3d9e84330ff60a8d60345b5fdf25d940142a54a900a3d947b53ea
                        • Instruction Fuzzy Hash: CE312D71D0021EEACF05EF92CD429EEBBB4BF44318F10042BE911762E1DB785649DB98
                        APIs
                        • EndDialog.USER32(?,00000000), ref: 00407579
                        • KillTimer.USER32(?,00000001), ref: 0040758A
                        • SetTimer.USER32(?,00000001,00000000,00000000), ref: 004075B4
                        • SuspendThread.KERNEL32(00000290), ref: 004075CD
                        • ResumeThread.KERNEL32(00000290), ref: 004075EA
                        • EndDialog.USER32(?,00000000), ref: 0040760C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: DialogThreadTimer$KillResumeSuspend
                        • String ID:
                        • API String ID: 4151135813-0
                        • Opcode ID: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                        • Instruction ID: ebb94c5c4675b2e6542c2b2cb7d5652cccd5624f9a00d71f737e39ca63bd9789
                        • Opcode Fuzzy Hash: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                        • Instruction Fuzzy Hash: 9811BF70A08618BBD7212F15EE849E77BBDFB00756B00843AF523A05A0CB39BD00DA1D
                        APIs
                        • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                          • Part of subcall function 00404343: ??3@YAXPAX@Z.MSVCRT(?,?,?,004177C4,004177C4,?,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 004043B6
                        • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000024,004177C4,004177C4,00000000,00000024,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                        • wsprintfA.USER32 ref: 00404EBC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@$wsprintf
                        • String ID: :Language:%u!$;!@Install@!UTF-8!$;!@InstallEnd@!
                        • API String ID: 2704270482-1550708412
                        • Opcode ID: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                        • Instruction ID: afe26c372a183c0ca4a1b7edc16cb7be903c3e4040aad79e05e22cec791dc9d0
                        • Opcode Fuzzy Hash: b3a647dc230e6375ba5304378dede3f86871d19815b7720c308d82744c7d9f3d
                        • Instruction Fuzzy Hash: D8115E71B00018BBCF00FB95CC42EFE77ADAB84705B10402EBA15E3182DB78AB028799
                        APIs
                        • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000,00000000), ref: 004038C6
                        • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000), ref: 00403904
                        • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405), ref: 0040392A
                        • ??3@YAXPAX@Z.MSVCRT(00000000,00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788), ref: 00403932
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@
                        • String ID: %%T/$%%T\
                        • API String ID: 613200358-2679640699
                        • Opcode ID: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                        • Instruction ID: 53c9ca64f2466311d4136dbbff57d229d1af9e29f5fa76e56e45344ae10c91f3
                        • Opcode Fuzzy Hash: 9eec194740abc4bee078c15c8dc217b66edb47652cee4dab90ed516c3b80c8f9
                        • Instruction Fuzzy Hash: 5011DD3190410EBACF05FFA1D857CEDBB79AE00708F50806AB511760E1EF79A785DB98
                        APIs
                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403981
                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 004039BF
                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405), ref: 004039E5
                        • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784), ref: 004039ED
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@
                        • String ID: %%S/$%%S\
                        • API String ID: 613200358-358529586
                        • Opcode ID: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                        • Instruction ID: c240205f9e12946546b7747d8fd44f392230bc1153c6614d6b8016afa5fd7689
                        • Opcode Fuzzy Hash: c94d4b60668bfb9eedf3143ce332dc4c41685f87d495a97f985edcc2faf71bca
                        • Instruction Fuzzy Hash: 1D11AD3190410EBACF05FFA1D856CEDBB79AE00708F51806AB511760E1EF78A789DB98
                        APIs
                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403A3C
                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 00403A7A
                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405), ref: 00403AA0
                        • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784), ref: 00403AA8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@
                        • String ID: %%M/$%%M\
                        • API String ID: 613200358-4143866494
                        • Opcode ID: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                        • Instruction ID: 5f6947e2f47a7d655e02fb84317d9747a35bc7200d49f7273ebe403b31479b31
                        • Opcode Fuzzy Hash: 3eb134fca1680c0093703720a533bafa1d2fd801437f3d80c27f205d784cf8f2
                        • Instruction Fuzzy Hash: C911AD3190410EBACF05FFA1D956CEDBB79AE00708F51806AB511760E1EF78A789DB58
                        APIs
                        • _CxxThrowException.MSVCRT(00000000,00414CFC), ref: 0040E4EE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ExceptionThrow
                        • String ID: $JA$4JA$DJA$TJA$hJA$xJA
                        • API String ID: 432778473-803145960
                        • Opcode ID: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                        • Instruction ID: 5492ea6659e041f1bcf420c4685f7038b08242b420f8f2c51a6428b2159ddc92
                        • Opcode Fuzzy Hash: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                        • Instruction Fuzzy Hash: 7211A5F0541B419BC7308F16E544587FBF8AF907587218A1FD0AA9BA51D3F8A1888B9C
                        APIs
                          • Part of subcall function 0040BA46: ??2@YAPAXI@Z.MSVCRT(0000000C,?,0040C20C,004149B0,00000001,?,?,00000000), ref: 0040BA4B
                        • ??3@YAXPAX@Z.MSVCRT(00000000,004149B0,00000001,?,?,00000000), ref: 0040C20D
                          • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                          • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                          • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                        • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,004149B0,00000001,?,?,00000000), ref: 0040C245
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??2@$??3@$memmove
                        • String ID: IA$IA$IA
                        • API String ID: 4294387087-924693538
                        • Opcode ID: 3ef1446a3f9eae3cfdc2853b922aca3bc2f9cc2cd28dfb990552d7283ffc15f1
                        • Instruction ID: 38d37476858cbe2739f158cf8086d9562841ccd83740beefedbf55b6536d6dac
                        • Opcode Fuzzy Hash: 3ef1446a3f9eae3cfdc2853b922aca3bc2f9cc2cd28dfb990552d7283ffc15f1
                        • Instruction Fuzzy Hash: 20B1C1B1900209DFCB54EFAAC8819DEBBB5BF48304F50852EF919A7291DB38A945CF54
                        APIs
                        • _CxxThrowException.MSVCRT(00100EC3,00414CFC), ref: 0040E83C
                        • ??2@YAPAXI@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E864
                        • memcpy.MSVCRT(00000000,?,?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?), ref: 0040E88D
                        • ??3@YAXPAX@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E898
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??2@??3@ExceptionThrowmemcpy
                        • String ID: IA
                        • API String ID: 3462485524-3293647318
                        • Opcode ID: 6b78721643db57d5e00a8af36ebe01533f1ba9cf87e040577b2ff72779c9c95d
                        • Instruction ID: e9362666a157510f6fc1816af10740f0f0ab3f4ff6eb75305f8b2a096945a613
                        • Opcode Fuzzy Hash: 6b78721643db57d5e00a8af36ebe01533f1ba9cf87e040577b2ff72779c9c95d
                        • Instruction Fuzzy Hash: 6811E5736003009BCB28AF57D880D6BFBE9AB84354714C83FEA59A7290D779E8954794
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: wsprintf$ExitProcesslstrcat
                        • String ID: 0x%p
                        • API String ID: 2530384128-1745605757
                        • Opcode ID: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                        • Instruction ID: 6c9eba3c29ae2a0cc7ccd16f79f39b6d6218d418ab2b897ff95ca6c62132cda7
                        • Opcode Fuzzy Hash: beb3389330693802dd4b40a551927b7f0c9c9e0999a7fc1e7fc7f64098bb755c
                        • Instruction Fuzzy Hash: CF019E7580020CAFDB20AFA0DC45FDA777CBF44305F04486AF945A2081D738F6948FAA
                        APIs
                          • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000B), ref: 004071E0
                          • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000C), ref: 004071E9
                        • GetSystemMetrics.USER32(00000007), ref: 00407A51
                        • GetSystemMetrics.USER32(00000007), ref: 00407A62
                        • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 00407B29
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: MetricsSystem$??3@
                        • String ID: 100%%
                        • API String ID: 2562992111-568723177
                        • Opcode ID: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                        • Instruction ID: d2e8aa6d75c6757367bbc63d1236441fd7733528c0e5853e38aed7656a5d7d9b
                        • Opcode Fuzzy Hash: 8625fd62ee8a1587f51b59dec5492359d41c9a7e7955315cbfbb4a3169dab2fe
                        • Instruction Fuzzy Hash: 0D31D771A047059FCB24DFA9C9419AEB7F4EF40308B00012EE542A26E1DB78FE44CF99
                        APIs
                        • wsprintfW.USER32 ref: 00407A12
                          • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                          • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                        • GetDlgItem.USER32(?,000004B3), ref: 004079C6
                          • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                          • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 004079E4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: TextWindow$ItemLength$??3@wsprintf
                        • String ID: (%u%s)
                        • API String ID: 3595513934-2496177969
                        • Opcode ID: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                        • Instruction ID: 1b031bef2a273fddd3247fbc9e57f9590cc69a100d620b238320e5a3a24b3f72
                        • Opcode Fuzzy Hash: 81108d5736a162b6d9564d3eb7a2e93f5e39dd0108d0485d36b03b99dec63073
                        • Instruction Fuzzy Hash: 1401C8B15042147FDB107B65DC46EAF777CAF44708F10807FF516A21E2DB7CA9448A68
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,0000003C,?,?,?,?,?,?,00406130,?,00000000,?,?,?), ref: 0040220A
                        • GetProcAddress.KERNEL32(00000000), ref: 00402211
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetNativeSystemInfo$kernel32
                        • API String ID: 2574300362-3846845290
                        • Opcode ID: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                        • Instruction ID: b757a3d5c4c17e34abb063926c294d8abaed4bc4edbc3347b9308a3de004b423
                        • Opcode Fuzzy Hash: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                        • Instruction Fuzzy Hash: 88F0B432E1521495CF20BBF48B0D6EF66E89A19349B1004BBD852F31D0E5FCCE8141EE
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,004061B1,?,?,?), ref: 00402198
                        • GetProcAddress.KERNEL32(00000000), ref: 0040219F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: Wow64RevertWow64FsRedirection$kernel32
                        • API String ID: 2574300362-3900151262
                        • Opcode ID: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                        • Instruction ID: b94e249185ae4a70534d65e1a66e6cdcdba3a47a1e4784fabdbc91f5644b18b3
                        • Opcode Fuzzy Hash: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                        • Instruction Fuzzy Hash: AFD0C934294201DBDB125FA0EE0E7EA3AB9FB04B0BF458035A920A00F0CBBC9644CA5C
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040223A), ref: 004021CA
                        • GetProcAddress.KERNEL32(00000000), ref: 004021D1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: Wow64DisableWow64FsRedirection$kernel32
                        • API String ID: 2574300362-736604160
                        • Opcode ID: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                        • Instruction ID: 817513c890d082da38b6284c2862a66e2f32a8da2897575df7e5c1eb8648f331
                        • Opcode Fuzzy Hash: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                        • Instruction Fuzzy Hash: 0DD012342443009BDB515FA09E0D7DA3EB4B705B07F508076A520E11D1CBFCA244C7AC
                        APIs
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                          • Part of subcall function 0040272E: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402ACD,?,?,00000000,00000000,00000000), ref: 00402760
                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@$ByteCharMultiWide
                        • String ID:
                        • API String ID: 1731127917-0
                        • Opcode ID: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                        • Instruction ID: 3903ebf3ba6088976d83fc344d3b185d6a20d7f45533e28e7dbc13297377a7b4
                        • Opcode Fuzzy Hash: ae4930b9035af11edc18eb83865398ea889af843cb2bb96c85f7d9ecca2ecb95
                        • Instruction Fuzzy Hash: 2831B3729041156ACB14FFA6DD81DEFB3BCEF00714B51403FF952B31E1EA38AA458658
                        APIs
                        • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406437,00000000,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FA8
                        • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FC5
                        • wsprintfW.USER32 ref: 00403FFB
                        • GetFileAttributesW.KERNEL32(?), ref: 00404016
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: PathTemp$AttributesFilewsprintf
                        • String ID:
                        • API String ID: 1746483863-0
                        • Opcode ID: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                        • Instruction ID: 4b01c17e8612d334da970e7aef70975a1f373095b445c13461924cc76c43a46f
                        • Opcode Fuzzy Hash: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                        • Instruction Fuzzy Hash: 1B113672100204BFCB01AF59CC85AADB7F8FF88755F50802EF905972E1DB78AA008B88
                        APIs
                        • CharUpperW.USER32(?,74DEE0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                        • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                        • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B03
                        • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B13
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: CharUpper
                        • String ID:
                        • API String ID: 9403516-0
                        • Opcode ID: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                        • Instruction ID: 0ba0c8867aa888139ba8faa8f8ff432121b60ad667f2455bf366b55ac651d143
                        • Opcode Fuzzy Hash: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                        • Instruction Fuzzy Hash: 02112E34A11269ABCF108F99C8446BAB7E8FF44356B504467F881E3290D77CDE51EB64
                        APIs
                          • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                          • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                          • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                        • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00407FED
                        • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040800D
                        • GetDlgItem.USER32(?,000004B7), ref: 00408020
                        • SetWindowLongW.USER32(00000000,000000FC,Function_00006F37), ref: 0040802E
                          • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                          • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                          • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                          • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                          • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                          • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                          • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                          • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                          • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                          • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                          • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                          • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ItemWindow$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoLongShow
                        • String ID:
                        • API String ID: 2538916108-0
                        • Opcode ID: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                        • Instruction ID: 9218ed989044434557cb474aaa53437228351995edfdd36a91d94446a14b3a18
                        • Opcode Fuzzy Hash: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                        • Instruction Fuzzy Hash: 7D1186B1A402146BCB10BBB99D09F9EB7FDEB84B04F00446EB652E31C0D6B8DA008B54
                        APIs
                        • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00406814
                        • GetSystemMetrics.USER32(00000031), ref: 0040683A
                        • CreateFontIndirectW.GDI32(?), ref: 00406849
                        • DeleteObject.GDI32(00000000), ref: 00406878
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                        • String ID:
                        • API String ID: 1900162674-0
                        • Opcode ID: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                        • Instruction ID: e152b01862f646c7a4819b14062263d5307cf72e2961abd6127bac75ebed32e6
                        • Opcode Fuzzy Hash: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                        • Instruction Fuzzy Hash: A9116376A00205AFDB10DF94DC88FEAB7B8EB08300F0180AAED06A7291DB74DE54CF54
                        APIs
                        • memset.MSVCRT ref: 0040749F
                        • SHBrowseForFolderW.SHELL32(?), ref: 004074B8
                        • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 004074D4
                        • SHGetMalloc.SHELL32(00000000), ref: 004074FE
                          • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                          • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                        • String ID:
                        • API String ID: 1557639607-0
                        • Opcode ID: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                        • Instruction ID: 30b51fec80d89fd3ac1614d0428bedaa433d1aa4d1a510c8e8bcd0531de43efe
                        • Opcode Fuzzy Hash: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                        • Instruction Fuzzy Hash: 43112171A00114ABDB10EBA5DD48BDE77FCAB84715F1040A9E505E7280DB78EF05CB75
                        APIs
                        • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 004027F8
                        • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00402801
                          • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                          • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                        • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,00000001,00000000,?,00000000,00000000,00000000), ref: 00402819
                        • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,00000000,00000000), ref: 00402839
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@$EnvironmentExpandStrings$??2@
                        • String ID:
                        • API String ID: 612612615-0
                        • Opcode ID: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                        • Instruction ID: 71972da321696c7643696fa2d61077c4bfdb6251f9c85b9dd911fab2e4c9aeed
                        • Opcode Fuzzy Hash: 1bf054f2ccdc3be335b048ff77a64ac4bdb67295ffe3aca3d2c9ccbf2cc91127
                        • Instruction Fuzzy Hash: EF017976D00118BADB04AB55DD41DDEB7BCEF48714B10417BF901B31D1EB746A4086A8
                        APIs
                          • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                          • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00413550,00413558), ref: 00403AFD
                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00413550,00413558), ref: 00403B05
                        • SetWindowTextW.USER32(?,?), ref: 00403B12
                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403B1D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ??3@TextWindow$Length
                        • String ID:
                        • API String ID: 2308334395-0
                        • Opcode ID: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                        • Instruction ID: 2cc122b1f520d7f8021a056a959bf32eecafdcf33a956e59961b1277582e5a57
                        • Opcode Fuzzy Hash: 8119ca7b33955cbac21e87e4fe12ba773d40effc5d925a3b7e480b00d6a2293b
                        • Instruction Fuzzy Hash: 2EF0FF32D0410DBACF01FBA5DD46CDE7B79EF04705B10406BF501720A1EA79AB559B98
                        APIs
                        • GetObjectW.GDI32(?,0000005C,?), ref: 00407045
                        • CreateFontIndirectW.GDI32(?), ref: 0040705B
                        • GetDlgItem.USER32(?,000004B5), ref: 0040706F
                        • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 0040707B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: CreateFontIndirectItemMessageObjectSend
                        • String ID:
                        • API String ID: 2001801573-0
                        • Opcode ID: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                        • Instruction ID: 5c236ef126686a3da9008926c30106754acf3bfa0ff8e01310dffb34f405da6a
                        • Opcode Fuzzy Hash: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                        • Instruction Fuzzy Hash: 35F05475900704ABDB209BA4DC09F8B7BFCAB48B01F048139BD51E11D4D7B4E5018B19
                        APIs
                        • GetParent.USER32(?), ref: 00401BA8
                        • GetWindowRect.USER32(?,?), ref: 00401BC1
                        • ScreenToClient.USER32(00000000,?), ref: 00401BCF
                        • ScreenToClient.USER32(00000000,?), ref: 00401BD6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: ClientScreen$ParentRectWindow
                        • String ID:
                        • API String ID: 2099118873-0
                        • Opcode ID: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                        • Instruction ID: 3a6f634f9500a9f0e676680e31990ed58166cb62974d534a535afb1fb6b8d00a
                        • Opcode Fuzzy Hash: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                        • Instruction Fuzzy Hash: 09E04F722052116BCB10AFA5AC88C8BBF6DDFC5723700447AF941A2220D7709D109A61
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: _wtol
                        • String ID: GUIFlags$[G@
                        • API String ID: 2131799477-2126219683
                        • Opcode ID: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                        • Instruction ID: b6302b9691b8fcfec91ee3c39af82f4337802e9cb3a6f407b943601295de961a
                        • Opcode Fuzzy Hash: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                        • Instruction Fuzzy Hash: 6DF03C3611C1635AFB342E0994187B6AA9CEB05793FE4443BE9C3F12D0C37C8E82825D
                        APIs
                        • GetEnvironmentVariableW.KERNEL32(?O@,?,00000001,004177A0,00000000,00417794,?,?,00404F3F,?,?,?,?,?), ref: 00402F26
                        • GetEnvironmentVariableW.KERNEL32(?,00000000,?,00000001,00000002,?,?,00404F3F,?,?,?,?,?), ref: 00402F52
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1692499106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1692485885.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692514425.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692533394.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000424000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1692545873.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_zPJUOck9wt.jbxd
                        Similarity
                        • API ID: EnvironmentVariable
                        • String ID: ?O@
                        • API String ID: 1431749950-3511380453
                        • Opcode ID: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                        • Instruction ID: 315e17eccb05daff3adc91fa9074d23558c2207180d60d9b2b56ce26dbf77fcb
                        • Opcode Fuzzy Hash: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                        • Instruction Fuzzy Hash: 24F06272200118BFDB00AFA9DC458AEB7EDEF88764B51402BF904D72A1D7B4AD008B98

                        Execution Graph

                        Execution Coverage:4.7%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:6.2%
                        Total number of Nodes:1600
                        Total number of Limit Nodes:24
                        execution_graph 62097 6c9b960a GetLastError 62098 6c9b9626 62097->62098 62099 6c9b9620 62097->62099 62103 6c9b962a SetLastError 62098->62103 62120 6c9bc8cf 62098->62120 62132 6c9bc890 6 API calls std::_Lockit::_Lockit 62099->62132 62107 6c9b965f 62109 6c9bc8cf __Getctype 6 API calls 62107->62109 62108 6c9b9670 62110 6c9bc8cf __Getctype 6 API calls 62108->62110 62111 6c9b966d 62109->62111 62112 6c9b967c 62110->62112 62133 6c9b90b8 62111->62133 62113 6c9b9680 62112->62113 62114 6c9b9697 62112->62114 62115 6c9bc8cf __Getctype 6 API calls 62113->62115 62139 6c9b92bb 14 API calls __Getctype 62114->62139 62115->62111 62118 6c9b96a2 62119 6c9b90b8 ___free_lconv_mon 12 API calls 62118->62119 62119->62103 62140 6c9bc63d 62120->62140 62123 6c9bc909 TlsSetValue 62124 6c9b9642 62124->62103 62125 6c9b90f2 62124->62125 62131 6c9b90ff __Getctype 62125->62131 62126 6c9b913f 62149 6c9aedf3 14 API calls __dosmaperr 62126->62149 62127 6c9b912a RtlAllocateHeap 62129 6c9b913d 62127->62129 62127->62131 62129->62107 62129->62108 62131->62126 62131->62127 62148 6c9c2bfb EnterCriticalSection LeaveCriticalSection __Getctype 62131->62148 62132->62098 62134 6c9b90c3 RtlFreeHeap 62133->62134 62138 6c9b90ed 62133->62138 62135 6c9b90d8 GetLastError 62134->62135 62134->62138 62136 6c9b90e5 __dosmaperr 62135->62136 62150 6c9aedf3 14 API calls __dosmaperr 62136->62150 62138->62103 62139->62118 62141 6c9bc66d 62140->62141 62145 6c9bc669 62140->62145 62141->62145 62147 6c9bc572 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 62141->62147 62143 6c9bc681 62144 6c9bc687 GetProcAddress 62143->62144 62143->62145 62144->62145 62146 6c9bc697 std::_Lockit::_Lockit 62144->62146 62145->62123 62145->62124 62146->62145 62147->62143 62148->62131 62149->62129 62150->62138 62151 6c99fa2b 62152 6c99fa39 62151->62152 62153 6c99fa34 62151->62153 62157 6c99f8f5 62152->62157 62168 6c9a0777 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 62153->62168 62160 6c99f901 ___scrt_is_nonwritable_in_current_image 62157->62160 62158 6c99f910 62159 6c99f92a dllmain_raw 62159->62158 62162 6c99f944 dllmain_crt_dispatch 62159->62162 62160->62158 62160->62159 62161 6c99f925 __DllMainCRTStartup@12 62160->62161 62163 6c99f996 62161->62163 62169 6c99f847 150 API calls 4 library calls 62161->62169 62162->62158 62162->62161 62163->62158 62164 6c99f99f dllmain_crt_dispatch 62163->62164 62164->62158 62165 6c99f9b2 dllmain_raw 62164->62165 62165->62158 62167 6c99f98b dllmain_raw 62167->62163 62168->62152 62169->62167 62170 6c841347 62175 6c8e6b20 62170->62175 62174 6c841356 62179 6c8e0b9e 62175->62179 62177 6c84134c 62178 6c99f6a7 96 API calls _Error_objects 62177->62178 62178->62174 62180 6c8e0baa __EH_prolog3 62179->62180 62189 6c871165 62180->62189 62184 6c8e0be2 62185 6c8e0beb GetProfileIntW GetProfileIntW 62184->62185 62186 6c8e0c23 62184->62186 62185->62186 62203 6c87f6f6 58 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 62186->62203 62188 6c8e0c2a Concurrency::details::ExternalContextBase::~ExternalContextBase 62188->62177 62204 6c87b778 62189->62204 62192 6c87f682 62193 6c87f6f0 62192->62193 62194 6c87f68e 62192->62194 62263 6c86dc83 58 API calls Concurrency::cancel_current_task 62193->62263 62195 6c87f69c 62194->62195 62262 6c87f65e InitializeCriticalSection 62194->62262 62198 6c87f6de EnterCriticalSection 62195->62198 62199 6c87f6ac EnterCriticalSection 62195->62199 62198->62184 62201 6c87f6d6 LeaveCriticalSection 62199->62201 62202 6c87f6c3 InitializeCriticalSection 62199->62202 62200 6c87f6f5 62201->62198 62202->62201 62203->62188 62209 6c87cdf8 62204->62209 62206 6c87b787 62207 6c87116d 62206->62207 62224 6c87cd9c 58 API calls 4 library calls 62206->62224 62207->62192 62212 6c87ce04 __EH_prolog3 62209->62212 62210 6c87ce7d 62254 6c86dc83 58 API calls Concurrency::cancel_current_task 62210->62254 62211 6c87ce45 62245 6c87ce9d EnterCriticalSection 62211->62245 62212->62210 62212->62211 62214 6c87ce2b 62212->62214 62252 6c87cac8 TlsAlloc InitializeCriticalSection RaiseException _DebugHeapAllocator 62212->62252 62214->62210 62225 6c87cbd5 EnterCriticalSection 62214->62225 62215 6c87ce82 62220 6c87ce3f 62220->62210 62220->62211 62221 6c87ce57 62253 6c87cf43 32 API calls 5 library calls 62221->62253 62222 6c87ce73 Concurrency::details::ExternalContextBase::~ExternalContextBase 62222->62206 62224->62207 62229 6c87cbf9 62225->62229 62226 6c87cd0c LeaveCriticalSection 62260 6c86dc9d RaiseException Concurrency::cancel_current_task 62226->62260 62228 6c87cca9 char_traits 62230 6c87ccd9 LeaveCriticalSection 62228->62230 62229->62226 62229->62228 62231 6c87cc60 GlobalHandle 62229->62231 62232 6c87cc4b 62229->62232 62230->62220 62235 6c87ccf4 62231->62235 62236 6c87cc73 GlobalUnlock 62231->62236 62255 6c87a95f 62232->62255 62235->62226 62238 6c87ccf9 GlobalHandle 62235->62238 62240 6c87a95f _Error_objects 24 API calls 62236->62240 62238->62226 62241 6c87cd05 GlobalLock 62238->62241 62243 6c87cc89 GlobalReAlloc 62240->62243 62241->62226 62242 6c87cc95 62242->62235 62244 6c87cc99 GlobalLock 62242->62244 62243->62242 62244->62226 62244->62228 62246 6c87ceb6 62245->62246 62247 6c87cee1 LeaveCriticalSection 62245->62247 62246->62247 62248 6c87cebb TlsGetValue 62246->62248 62249 6c87ce51 62247->62249 62248->62247 62250 6c87cec7 62248->62250 62249->62221 62249->62222 62250->62247 62251 6c87ced3 LeaveCriticalSection 62250->62251 62251->62249 62252->62214 62253->62222 62254->62215 62256 6c87a972 _Error_objects 62255->62256 62257 6c87a979 GlobalAlloc 62256->62257 62261 6c841e40 24 API calls _DebugHeapAllocator 62256->62261 62257->62242 62259 6c87a984 62261->62259 62262->62195 62263->62200 62264 6c99f6ed 62265 6c99f6f8 62264->62265 62266 6c99f72b 62264->62266 62268 6c99f71d 62265->62268 62269 6c99f6fd 62265->62269 62294 6c99f847 150 API calls 4 library calls 62266->62294 62276 6c99f740 62268->62276 62270 6c99f713 62269->62270 62271 6c99f702 62269->62271 62293 6c99f450 23 API calls 62270->62293 62275 6c99f707 62271->62275 62292 6c99f46f 21 API calls 62271->62292 62277 6c99f74c ___scrt_is_nonwritable_in_current_image 62276->62277 62295 6c99f4e0 62277->62295 62279 6c99f753 __DllMainCRTStartup@12 62280 6c99f77a 62279->62280 62281 6c99f83f 62279->62281 62287 6c99f7c9 ___scrt_is_nonwritable_in_current_image 62279->62287 62303 6c99f442 62280->62303 62315 6c9a060d 4 API calls 2 library calls 62281->62315 62284 6c99f846 62285 6c99f789 __RTC_Initialize 62285->62287 62306 6c9a07c2 InitializeSListHead 62285->62306 62287->62275 62288 6c99f797 62288->62287 62307 6c99f417 62288->62307 62290 6c99f7b6 62290->62287 62311 6c9b7c6a 62290->62311 62292->62275 62293->62275 62294->62275 62296 6c99f4e9 62295->62296 62316 6c9a02d4 IsProcessorFeaturePresent 62296->62316 62298 6c99f4f5 62317 6c9a44bd 10 API calls 2 library calls 62298->62317 62300 6c99f4fa 62301 6c99f4fe 62300->62301 62318 6c9a44ef 7 API calls 2 library calls 62300->62318 62301->62279 62319 6c99f519 62303->62319 62305 6c99f449 62305->62285 62306->62288 62308 6c99f41c ___scrt_release_startup_lock 62307->62308 62310 6c99f425 62308->62310 62326 6c9a02d4 IsProcessorFeaturePresent 62308->62326 62310->62290 62312 6c9b7c78 62311->62312 62313 6c9b7c91 62311->62313 62312->62313 62327 6c841140 62312->62327 62313->62287 62315->62284 62316->62298 62317->62300 62318->62301 62320 6c99f529 62319->62320 62321 6c99f525 62319->62321 62322 6c99f536 ___scrt_release_startup_lock 62320->62322 62325 6c9a060d 4 API calls 2 library calls 62320->62325 62321->62305 62322->62305 62324 6c99f59f 62325->62324 62326->62310 62332 6c85f270 62327->62332 62331 6c841157 62331->62312 62338 6c877473 62332->62338 62334 6c85f296 62356 6c878ce3 GetModuleHandleW 62334->62356 62336 6c84114d 62337 6c99f6a7 96 API calls _Error_objects 62336->62337 62337->62331 62339 6c877482 __EH_prolog3_GS 62338->62339 62359 6c876cd0 60 API calls 4 library calls 62339->62359 62341 6c877498 62342 6c8774ad 62341->62342 62360 6c9b05b8 96 API calls 3 library calls 62341->62360 62344 6c87b778 _Error_objects 58 API calls 62342->62344 62345 6c8774ba 62344->62345 62346 6c8774c4 62345->62346 62347 6c8775cd 62345->62347 62349 6c87cdf8 _Error_objects 58 API calls 62346->62349 62364 6c86dc83 58 API calls Concurrency::cancel_current_task 62347->62364 62351 6c8774d1 62349->62351 62350 6c8775d2 SysFreeString 62350->62334 62351->62347 62352 6c8774d9 GetCurrentThread GetCurrentThreadId GetVersionExW 62351->62352 62353 6c877590 62352->62353 62361 6c99fa70 62353->62361 62357 6c878cf8 GetProcAddress 62356->62357 62358 6c878d0b 62356->62358 62357->62358 62358->62336 62359->62341 62360->62342 62365 6c99fa4e 62361->62365 62363 6c99fa7a 62363->62363 62364->62350 62366 6c99fa57 IsProcessorFeaturePresent 62365->62366 62367 6c99fa56 62365->62367 62369 6c99fe92 62366->62369 62367->62363 62372 6c99fe55 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 62369->62372 62371 6c99ff75 62371->62363 62372->62371 62373 8510e0 62374 8510ec ___scrt_is_nonwritable_in_current_image 62373->62374 62397 8512dc 62374->62397 62376 8510f3 62377 851246 62376->62377 62380 85111d 62376->62380 62415 8515d0 6 API calls 62377->62415 62379 85124d exit 62381 851253 _exit 62379->62381 62382 851121 _initterm_e 62380->62382 62383 85116a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 62380->62383 62384 85114d _initterm 62382->62384 62385 85113c 62382->62385 62386 8511be 62383->62386 62389 8511b6 _register_thread_local_exe_atexit_callback 62383->62389 62384->62383 62401 8516eb memset GetStartupInfoW 62386->62401 62388 8511c3 _get_narrow_winmain_command_line 62402 851c50 GetCommandLineW CommandLineToArgvW 62388->62402 62389->62386 62391 8511d8 62414 851721 GetModuleHandleW 62391->62414 62393 8511df 62393->62379 62394 8511e3 62393->62394 62395 8511e7 _cexit 62394->62395 62396 8511ec ___scrt_uninitialize_crt 62394->62396 62395->62396 62396->62385 62398 8512e5 62397->62398 62416 8518a4 IsProcessorFeaturePresent 62398->62416 62400 8512f1 ___scrt_uninitialize_crt 62400->62376 62401->62388 62403 851c82 62402->62403 62404 851c78 62402->62404 62417 851d6f 62403->62417 62404->62391 62406 851ca0 62407 851d1c LocalFree 62406->62407 62409 851cc1 WideCharToMultiByte 62406->62409 62427 851000 TCGamerUpdateMain 62407->62427 62410 851d6f 4 API calls 62409->62410 62411 851ce1 WideCharToMultiByte 62410->62411 62411->62409 62412 851d14 62411->62412 62412->62407 62413 851d35 62413->62391 62414->62393 62415->62379 62416->62400 62418 851d7d 62417->62418 62419 851d8f malloc 62418->62419 62420 851d82 _callnewh 62419->62420 62421 851d9c 62419->62421 62420->62419 62424 851d9e 62420->62424 62421->62406 62422 851e9f 62423 851ead _CxxThrowException 62422->62423 62426 851ec3 62423->62426 62424->62422 62425 851e90 _CxxThrowException 62424->62425 62425->62422 62426->62406 62427->62413 62428 6c9b98ee CreateFileW 62429 6c85d180 62489 6c844560 62429->62489 62435 6c85d1c6 62524 6c85c530 62435->62524 62439 6c85d1e1 62440 6c844bb0 std::ios_base::failure::failure 96 API calls 62439->62440 62441 6c85d1ec 62440->62441 62445 6c85d256 std::ios_base::failure::failure 62441->62445 62556 6c85c6c0 62441->62556 62444 6c85d294 CreateThread 62449 6c85d2b2 WaitForSingleObject 62444->62449 62450 6c85d2ea 62444->62450 63858 6c85c920 Sleep 62444->63858 62445->62444 62580 6c85cc00 62445->62580 62446 6c85cf30 97 API calls 62448 6c85d221 62446->62448 62453 6c84f820 96 API calls 62448->62453 62449->62450 62454 6c85d2c8 CloseHandle 62449->62454 62624 6c85d000 97 API calls 2 library calls 62450->62624 62452 6c85d272 std::runtime_error::runtime_error 62459 6c85d283 CreateThread 62452->62459 62456 6c85d22e 62453->62456 62457 6c844bb0 std::ios_base::failure::failure 96 API calls 62454->62457 62455 6c85d322 62625 6c8539d0 97 API calls numpunct 62455->62625 62460 6c844bb0 std::ios_base::failure::failure 96 API calls 62456->62460 62461 6c85d2e2 62457->62461 62459->62444 63859 6c85cb40 62459->63859 62463 6c85d23c std::runtime_error::runtime_error 62460->62463 62462 6c85d331 62626 6c844c40 62462->62626 62567 6c9afcbd 62463->62567 62469 6c85d34d 62472 6c844bb0 std::ios_base::failure::failure 96 API calls 62469->62472 62470 6c85d24b 62471 6c844bb0 std::ios_base::failure::failure 96 API calls 62470->62471 62471->62445 62473 6c85d358 62472->62473 62631 6c84c5e0 192 API calls 5 library calls 62473->62631 62475 6c85d370 62632 6c85c780 169 API calls 2 library calls 62475->62632 62477 6c85d37c CreateThread 62633 6c85c030 110 API calls 5 library calls 62477->62633 63873 6c853a20 195 API calls 7 library calls 62477->63873 62479 6c85d399 62634 6c9afb21 96 API calls std::locale::_Setgloballocale 62479->62634 62481 6c85d3a0 62482 6c844bb0 std::ios_base::failure::failure 96 API calls 62481->62482 62483 6c85d3b0 62482->62483 62484 6c844bb0 std::ios_base::failure::failure 96 API calls 62483->62484 62485 6c85d3bb 62484->62485 62486 6c844bb0 std::ios_base::failure::failure 96 API calls 62485->62486 62487 6c85d3c6 62486->62487 62488 6c844bb0 std::ios_base::failure::failure 96 API calls 62487->62488 62488->62461 62635 6c842ca0 62489->62635 62493 6c84458b 62641 6c843f30 62493->62641 62495 6c8445e0 62695 6c847390 62495->62695 62498 6c8445a6 62498->62495 62648 6c843ff0 62498->62648 62682 6c844240 62498->62682 62687 6c844310 62498->62687 62504 6c847390 96 API calls 62506 6c84460c 62504->62506 62505 6c8445d2 Sleep 62505->62498 62712 6c844660 62506->62712 62509 6c85cf30 GetModuleFileNameA 62510 6c844c40 numpunct 96 API calls 62509->62510 62511 6c85cf78 62510->62511 62512 6c85cf94 62511->62512 62513 6c85cfc6 62511->62513 62959 6c85d8f0 96 API calls numpunct 62512->62959 62515 6c844c40 numpunct 96 API calls 62513->62515 62517 6c85cfd3 62515->62517 62516 6c85cfa9 62518 6c844bb0 std::ios_base::failure::failure 96 API calls 62516->62518 62519 6c844bb0 std::ios_base::failure::failure 96 API calls 62517->62519 62520 6c85cfc1 62518->62520 62519->62520 62521 6c84f820 62520->62521 62960 6c844b40 62521->62960 62523 6c84f837 std::ios_base::failure::failure HandleT 62523->62435 62969 6c84cf90 62524->62969 62526 6c85c56a 62527 6c85c5b3 62526->62527 62528 6c85c583 62526->62528 62973 6c85d520 62527->62973 62530 6c844c40 numpunct 96 API calls 62528->62530 62532 6c85c590 62530->62532 62531 6c85c5c5 fpos 62978 6c85d620 62531->62978 63004 6c84cea0 133 API calls 62532->63004 62534 6c85c5ab 62553 6c844bb0 62534->62553 62536 6c85c5e3 62988 6c846ff0 62536->62988 62538 6c85c5f1 62992 6c85d790 62538->62992 62540 6c85c613 62541 6c85c666 62540->62541 62542 6c85c62d 62540->62542 62999 6c84ced0 62541->62999 62543 6c844c40 numpunct 96 API calls 62542->62543 62545 6c85c63a 62543->62545 62547 6c844bb0 std::ios_base::failure::failure 96 API calls 62545->62547 62546 6c85c671 std::ios_base::failure::failure 62550 6c844bb0 std::ios_base::failure::failure 96 API calls 62546->62550 62548 6c85c64f 62547->62548 63005 6c84cea0 133 API calls 62548->63005 62551 6c85c692 62550->62551 63006 6c84cea0 133 API calls 62551->63006 63590 6c845a20 62553->63590 62555 6c844bbf std::ios_base::failure::failure 62555->62439 62557 6c844c40 numpunct 96 API calls 62556->62557 62558 6c85c723 62557->62558 63595 6c849ff0 62558->63595 62562 6c85c74f 62563 6c844bb0 std::ios_base::failure::failure 96 API calls 62562->62563 62564 6c85c757 62563->62564 62565 6c844bb0 std::ios_base::failure::failure 96 API calls 62564->62565 62566 6c85c766 62565->62566 62566->62446 62568 6c9afccb 62567->62568 62569 6c9afcd5 62567->62569 62570 6c9bf207 16 API calls 62568->62570 63800 6c9afc06 62569->63800 62572 6c9afcd2 62570->62572 62572->62470 62576 6c9afd03 62578 6c9afd21 62576->62578 62579 6c9b90b8 ___free_lconv_mon 14 API calls 62576->62579 62578->62470 62579->62578 62581 6c844c40 numpunct 96 API calls 62580->62581 62582 6c85cc8d 62581->62582 63850 6c85ae50 62582->63850 62584 6c85ccae 62585 6c844bb0 std::ios_base::failure::failure 96 API calls 62584->62585 62586 6c85ccc0 std::runtime_error::runtime_error 62585->62586 62587 6c85ccc9 GetFileAttributesA 62586->62587 62588 6c85ccd5 62587->62588 62589 6c85ccea SHGetFolderPathA 62587->62589 62590 6c844bb0 std::ios_base::failure::failure 96 API calls 62588->62590 62591 6c85cd0c 62589->62591 62592 6c85cf09 62589->62592 62593 6c85cce4 62590->62593 62595 6c844c40 numpunct 96 API calls 62591->62595 62594 6c844bb0 std::ios_base::failure::failure 96 API calls 62592->62594 62593->62452 62594->62593 62596 6c85cd1e 62595->62596 62597 6c84f820 96 API calls 62596->62597 62598 6c85cd40 62597->62598 62599 6c85ae50 96 API calls 62598->62599 62600 6c85cd64 62599->62600 62601 6c84f820 96 API calls 62600->62601 62602 6c85cd89 62601->62602 62603 6c844bb0 std::ios_base::failure::failure 96 API calls 62602->62603 62604 6c85cd9b 62603->62604 62605 6c844bb0 std::ios_base::failure::failure 96 API calls 62604->62605 62606 6c85cdaa 62605->62606 62607 6c844bb0 std::ios_base::failure::failure 96 API calls 62606->62607 62608 6c85cdb9 std::runtime_error::runtime_error 62607->62608 62609 6c85cdc5 GetFileAttributesA 62608->62609 62610 6c85cdf5 CoInitialize 62609->62610 62611 6c85cdd1 62609->62611 63853 6c845da0 62610->63853 62612 6c844bb0 std::ios_base::failure::failure 96 API calls 62611->62612 62614 6c85cde0 62612->62614 62616 6c844bb0 std::ios_base::failure::failure 96 API calls 62614->62616 62615 6c85ce06 CoCreateInstance 62617 6c85cef4 CoUninitialize 62615->62617 62618 6c85ce2b std::runtime_error::runtime_error 62615->62618 62616->62593 62619 6c844bb0 std::ios_base::failure::failure 96 API calls 62617->62619 62620 6c85ce41 MultiByteToWideChar 62618->62620 62619->62592 62621 6c85ce65 HandleT std::runtime_error::runtime_error 62620->62621 62622 6c85ced6 62621->62622 62623 6c85ceb0 MultiByteToWideChar 62621->62623 62622->62617 62623->62622 62624->62455 62625->62462 62627 6c844c71 HandleT numpunct 62626->62627 62628 6c847920 numpunct 96 API calls 62627->62628 62629 6c844c9a 62628->62629 62630 6c85d0d0 98 API calls 4 library calls 62629->62630 62630->62469 62631->62475 62632->62477 62633->62479 62634->62481 62715 6c9aa6b1 GetSystemTimeAsFileTime 62635->62715 62637 6c842cac 62638 6c9a5a2a 62637->62638 62717 6c9b94b9 GetLastError 62638->62717 62747 6c9a5a09 62641->62747 62644 6c9a5a09 96 API calls 62645 6c843f89 62644->62645 62750 6c8449d0 62645->62750 62652 6c843fff 62648->62652 62649 6c84402a 62650 6c847390 96 API calls 62649->62650 62653 6c844039 62650->62653 62651 6c847390 96 API calls 62651->62652 62652->62649 62652->62651 62654 6c84407e 62653->62654 62655 6c84419a 62653->62655 62662 6c8441a9 62653->62662 62658 6c844093 62654->62658 62661 6c847390 96 API calls 62654->62661 62657 6c847390 96 API calls 62655->62657 62656 6c8441e5 62660 6c847390 96 API calls 62656->62660 62657->62662 62663 6c8440c3 62658->62663 62665 6c8440ac 62658->62665 62659 6c847390 96 API calls 62659->62662 62664 6c8441f4 62660->62664 62661->62658 62662->62656 62662->62659 62667 6c8440d9 62663->62667 62678 6c8440f0 HandleT 62663->62678 62666 6c847390 96 API calls 62664->62666 62668 6c847390 96 API calls 62665->62668 62669 6c844206 62666->62669 62670 6c847390 96 API calls 62667->62670 62671 6c8440bb 62668->62671 62672 6c844680 129 API calls 62669->62672 62670->62671 62674 6c844192 62671->62674 62676 6c847390 96 API calls 62671->62676 62673 6c844221 62672->62673 62675 6c847390 96 API calls 62673->62675 62674->62498 62677 6c84422c 62675->62677 62676->62674 62677->62498 62679 6c844150 62678->62679 62681 6c847390 96 API calls 62678->62681 62679->62671 62680 6c847390 96 API calls 62679->62680 62680->62671 62681->62679 62759 6c9a5e27 62682->62759 62685 6c844256 62685->62498 62688 6c844321 Mailbox 62687->62688 62689 6c9a5a09 96 API calls 62688->62689 62693 6c8444a3 62688->62693 62690 6c844451 62689->62690 62691 6c9a5a09 96 API calls 62690->62691 62692 6c844463 62691->62692 62694 6c8449d0 96 API calls 62692->62694 62693->62505 62694->62693 62697 6c8473c2 numpunct 62695->62697 62800 6c8457e0 62697->62800 62701 6c8445ef 62703 6c844680 62701->62703 62702 6c84745a numpunct 62804 6c8458e0 62702->62804 62704 6c8457e0 96 API calls 62703->62704 62705 6c8446cd 62704->62705 62711 6c844717 shared_ptr 62705->62711 62829 6c847720 62705->62829 62706 6c8458e0 96 API calls 62707 6c84484c 62706->62707 62708 6c845790 96 API calls 62707->62708 62710 6c844601 62708->62710 62710->62504 62711->62706 62951 6c844a00 62712->62951 62716 6c9aa6ea __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 62715->62716 62716->62637 62718 6c9b94cf 62717->62718 62721 6c9b94d5 62717->62721 62744 6c9bc890 6 API calls std::_Lockit::_Lockit 62718->62744 62720 6c9bc8cf __Getctype 6 API calls 62722 6c9b94f1 62720->62722 62721->62720 62743 6c9b94d9 SetLastError 62721->62743 62723 6c9b90f2 __Getctype 14 API calls 62722->62723 62722->62743 62725 6c9b9506 62723->62725 62728 6c9b951f 62725->62728 62729 6c9b950e 62725->62729 62726 6c9a5a34 62726->62493 62727 6c9b956e 62746 6c9b8f04 96 API calls std::locale::_Setgloballocale 62727->62746 62732 6c9bc8cf __Getctype 6 API calls 62728->62732 62731 6c9bc8cf __Getctype 6 API calls 62729->62731 62734 6c9b951c 62731->62734 62735 6c9b952b 62732->62735 62739 6c9b90b8 ___free_lconv_mon 14 API calls 62734->62739 62736 6c9b952f 62735->62736 62737 6c9b9546 62735->62737 62738 6c9bc8cf __Getctype 6 API calls 62736->62738 62745 6c9b92bb 14 API calls __Getctype 62737->62745 62738->62734 62739->62743 62741 6c9b9551 62742 6c9b90b8 ___free_lconv_mon 14 API calls 62741->62742 62742->62743 62743->62726 62743->62727 62744->62721 62745->62741 62748 6c9b94b9 __Getctype 96 API calls 62747->62748 62749 6c843f77 62748->62749 62749->62644 62751 6c8449e0 HandleT 62750->62751 62754 6c847820 62751->62754 62753 6c843fe1 62753->62498 62755 6c84785c HandleT 62754->62755 62757 6c847845 HandleT 62754->62757 62758 6c848f20 96 API calls 3 library calls 62755->62758 62757->62753 62758->62757 62760 6c9a5e33 ___scrt_is_nonwritable_in_current_image 62759->62760 62768 6c9b84a7 EnterCriticalSection 62760->62768 62762 6c9a5e3a 62769 6c9a5e77 62762->62769 62767 6c9a5bef 29 API calls 2 library calls 62767->62685 62768->62762 62770 6c9a5e95 62769->62770 62780 6c9a5ea4 62770->62780 62786 6c9b9999 CreateFileW ___initconin 62770->62786 62772 6c9a5eb1 62772->62780 62787 6c9b9953 5 API calls ___initconin 62772->62787 62773 6c99fa4e _ValidateLocalCookies 5 API calls 62774 6c9a5e48 62773->62774 62783 6c9a5e6e 62774->62783 62776 6c9a5ec2 62779 6c9a5eef ctype 62776->62779 62776->62780 62782 6c9a5f2c 62776->62782 62788 6c9b97a4 62776->62788 62779->62782 62795 6c9b99b8 5 API calls ___initconin 62779->62795 62780->62773 62796 6c9a1ddd 14 API calls numpunct 62782->62796 62799 6c9b84ef LeaveCriticalSection 62783->62799 62785 6c844249 62785->62685 62785->62767 62786->62772 62787->62776 62789 6c9b97e2 62788->62789 62790 6c9b97b2 __Getctype 62788->62790 62798 6c9aedf3 14 API calls __dosmaperr 62789->62798 62790->62789 62792 6c9b97cd RtlAllocateHeap 62790->62792 62797 6c9c2bfb EnterCriticalSection LeaveCriticalSection __Getctype 62790->62797 62792->62790 62793 6c9b97e0 62792->62793 62793->62779 62795->62782 62796->62780 62797->62790 62798->62793 62799->62785 62801 6c84580a HandleT 62800->62801 62803 6c845828 62801->62803 62812 6c846780 96 API calls 62801->62812 62803->62702 62805 6c8458f4 62804->62805 62813 6c846970 62805->62813 62808 6c845790 62809 6c84579e 62808->62809 62810 6c8457c7 62809->62810 62828 6c846880 96 API calls 62809->62828 62810->62701 62812->62803 62814 6c846988 62813->62814 62817 6c843d00 62814->62817 62818 6c843d8d 62817->62818 62819 6c843d29 62817->62819 62818->62808 62821 6c843d3a std::make_error_code 62819->62821 62825 6c9a2cde RaiseException 62819->62825 62826 6c843cd0 96 API calls std::ios_base::failure::failure 62821->62826 62823 6c843d7f 62827 6c9a2cde RaiseException 62823->62827 62825->62821 62826->62823 62827->62818 62828->62810 62843 6c9a09cd 62829->62843 62833 6c84775e 62834 6c84777c 62833->62834 62855 6c848950 62833->62855 62865 6c9a0a25 62834->62865 62837 6c847808 62837->62711 62839 6c8477a1 62864 6c9a0d1d 16 API calls 2 library calls 62839->62864 62840 6c847799 62863 6c8432d0 RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 62840->62863 62844 6c9a09dc 62843->62844 62845 6c9a09e3 62843->62845 62872 6c9b8506 6 API calls std::_Lockit::_Lockit 62844->62872 62847 6c847745 62845->62847 62873 6c9a1b47 EnterCriticalSection 62845->62873 62849 6c8435a0 62847->62849 62850 6c8435e6 62849->62850 62851 6c8435b1 62849->62851 62850->62833 62852 6c9a09cd std::_Lockit::_Lockit 7 API calls 62851->62852 62853 6c8435bb 62852->62853 62854 6c9a0a25 std::_Lockit::~_Lockit 2 API calls 62853->62854 62854->62850 62856 6c84897c 62855->62856 62857 6c847791 62855->62857 62856->62857 62874 6c861c4d 62856->62874 62857->62839 62857->62840 62859 6c84898f 62862 6c8489b3 62859->62862 62878 6c843380 62859->62878 62862->62857 62886 6c843450 128 API calls 2 library calls 62862->62886 62863->62834 62864->62834 62866 6c9b8514 62865->62866 62868 6c9a0a2f 62865->62868 62950 6c9b84ef LeaveCriticalSection 62866->62950 62867 6c9a0a42 62867->62837 62868->62867 62949 6c9a1b55 LeaveCriticalSection 62868->62949 62871 6c9b851b 62871->62837 62872->62847 62873->62847 62876 6c861c54 62874->62876 62877 6c861c7f 62876->62877 62887 6c9afd32 62876->62887 62877->62859 62879 6c9a09cd std::_Lockit::_Lockit 7 API calls 62878->62879 62880 6c8433ae _Yarn 62879->62880 62881 6c843415 62880->62881 62882 6c843427 62880->62882 62896 6c9a0e4e 62881->62896 62905 6c9a0b86 96 API calls 2 library calls 62882->62905 62885 6c843422 62885->62862 62886->62857 62892 6c9b97a4 __Getctype 62887->62892 62888 6c9b97e2 62895 6c9aedf3 14 API calls __dosmaperr 62888->62895 62890 6c9b97cd RtlAllocateHeap 62891 6c9b97e0 62890->62891 62890->62892 62891->62876 62892->62888 62892->62890 62894 6c9c2bfb EnterCriticalSection LeaveCriticalSection __Getctype 62892->62894 62894->62892 62895->62891 62906 6c9b8772 62896->62906 62900 6c9a0e73 62901 6c9b8772 std::_Locinfo::_Locinfo_dtor 127 API calls 62900->62901 62903 6c9a0e82 62900->62903 62901->62903 62902 6c9a0ca7 _Yarn 15 API calls 62904 6c9a0e97 62902->62904 62903->62902 62904->62885 62905->62885 62917 6c9bcbcb 62906->62917 62908 6c9b877f 62909 6c9b851d std::_Locinfo::_Locinfo_dtor 127 API calls 62908->62909 62910 6c9a0e5b 62909->62910 62911 6c9a0ca7 62910->62911 62912 6c9a0cb5 62911->62912 62916 6c9a0ce0 _Yarn 62911->62916 62914 6c9a0cc1 62912->62914 62948 6c9a59e3 14 API calls ___free_lconv_mon 62912->62948 62915 6c9afd32 _Yarn 15 API calls 62914->62915 62914->62916 62915->62916 62916->62900 62938 6c9bc454 5 API calls std::_Lockit::_Lockit 62917->62938 62919 6c9bcbd0 62939 6c9bc46e 5 API calls std::_Lockit::_Lockit 62919->62939 62921 6c9bcbd5 62940 6c9bc488 5 API calls std::_Lockit::_Lockit 62921->62940 62923 6c9bcbda 62941 6c9bc4a2 5 API calls std::_Lockit::_Lockit 62923->62941 62925 6c9bcbdf 62942 6c9bc4bc 5 API calls std::_Lockit::_Lockit 62925->62942 62927 6c9bcbe4 62943 6c9bc4d6 5 API calls std::_Lockit::_Lockit 62927->62943 62929 6c9bcbe9 62944 6c9bc4f0 5 API calls std::_Lockit::_Lockit 62929->62944 62931 6c9bcbee 62945 6c9bc50a 5 API calls std::_Lockit::_Lockit 62931->62945 62933 6c9bcbf3 62946 6c9bc53e 5 API calls std::_Lockit::_Lockit 62933->62946 62935 6c9bcbf8 62947 6c9bc524 5 API calls std::_Lockit::_Lockit 62935->62947 62937 6c9bcbfd 62937->62937 62938->62919 62939->62921 62940->62923 62941->62925 62942->62927 62943->62929 62944->62931 62945->62933 62946->62935 62947->62937 62948->62914 62949->62867 62950->62871 62954 6c845930 62951->62954 62956 6c845956 shared_ptr ctype shared_ptr 62954->62956 62955 6c844625 62955->62509 62956->62955 62958 6c8469d0 96 API calls allocator 62956->62958 62958->62955 62959->62516 62961 6c844b50 HandleT numpunct 62960->62961 62964 6c845ab0 62961->62964 62963 6c844b69 62963->62523 62965 6c845b1d 62964->62965 62967 6c845ad0 Concurrency::task_continuation_context::task_continuation_context numpunct 62964->62967 62968 6c848240 96 API calls 6 library calls 62965->62968 62967->62963 62968->62967 62970 6c84cfab std::runtime_error::runtime_error 62969->62970 63007 6c84e800 62970->63007 63326 6c850b00 62973->63326 62975 6c85d553 62976 6c85d59c 62975->62976 63330 6c85dbc0 62975->63330 62976->62531 62979 6c85d65e 62978->62979 62980 6c846970 96 API calls 62979->62980 62981 6c85d680 62980->62981 62982 6c850b00 129 API calls 62981->62982 62983 6c85d68e 62982->62983 62984 6c85d6e1 fpos 62983->62984 62987 6c85dbc0 131 API calls 62983->62987 62985 6c8458e0 96 API calls 62984->62985 62986 6c85d755 62985->62986 62986->62536 62987->62984 62989 6c847021 numpunct 62988->62989 63433 6c848670 62989->63433 62991 6c847039 62991->62538 62993 6c850b00 129 API calls 62992->62993 62994 6c85d7d7 62993->62994 62998 6c85d832 62994->62998 63441 6c85db90 62994->63441 62995 6c8458e0 96 API calls 62996 6c85d8bb 62995->62996 62996->62540 62998->62995 63582 6c84ebf0 62999->63582 63002 6c84cf02 63002->62546 63003 6c8458e0 96 API calls 63003->63002 63004->62534 63005->62534 63006->62534 63008 6c84e82b HandleT 63007->63008 63017 6c84f170 63008->63017 63014 6c84e8cd 63015 6c84cfb4 63014->63015 63016 6c8458e0 96 API calls 63014->63016 63015->62526 63016->63015 63018 6c84f19b 63017->63018 63034 6c84f6d0 63018->63034 63021 6c84f2f0 63076 6c84f600 63021->63076 63023 6c84f2ff 63081 6c84eb20 63023->63081 63025 6c84e8a9 63026 6c84f240 63025->63026 63027 6c84f267 shared_ptr 63026->63027 63028 6c84f26b 63026->63028 63027->63014 63087 6c9a191c 63028->63087 63031 6c84eb20 96 API calls 63032 6c84f29a 63031->63032 63095 6c84fa50 129 API calls 2 library calls 63032->63095 63043 6c84c380 63034->63043 63038 6c84f717 63041 6c84e86b 63038->63041 63054 6c9a175d 9 API calls 2 library calls 63038->63054 63039 6c84f6fc 63039->63038 63040 6c8458e0 96 API calls 63039->63040 63040->63038 63041->63021 63055 6c84c290 63043->63055 63046 6c861c4d allocator 15 API calls 63047 6c84c3f3 63046->63047 63048 6c84c407 63047->63048 63058 6c84c100 100 API calls 63047->63058 63050 6c84f770 63048->63050 63051 6c84f79a 63050->63051 63059 6c847250 63051->63059 63053 6c84f7b3 shared_ptr 63053->63039 63054->63041 63056 6c843d00 96 API calls 63055->63056 63057 6c84c2a5 63056->63057 63057->63046 63058->63048 63060 6c9a09cd std::_Lockit::_Lockit 7 API calls 63059->63060 63061 6c847275 63060->63061 63062 6c8435a0 9 API calls 63061->63062 63063 6c84728e 63062->63063 63072 6c8472ac 63063->63072 63073 6c843930 129 API calls allocator 63063->63073 63064 6c9a0a25 std::_Lockit::~_Lockit 2 API calls 63065 6c847338 63064->63065 63065->63053 63067 6c8472c1 63068 6c8472d1 63067->63068 63069 6c8472c9 63067->63069 63075 6c9a0d1d 16 API calls 2 library calls 63068->63075 63074 6c8432d0 RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 63069->63074 63072->63064 63073->63067 63074->63072 63075->63072 63077 6c861c4d allocator 15 API calls 63076->63077 63078 6c84f691 63077->63078 63080 6c84f6a5 63078->63080 63085 6c84c100 100 API calls 63078->63085 63080->63023 63082 6c84eb2f 63081->63082 63084 6c84eb91 63082->63084 63086 6c9ae9e9 96 API calls 2 library calls 63082->63086 63084->63025 63085->63080 63086->63084 63088 6c9a1897 63087->63088 63089 6c84f27c 63088->63089 63096 6c9b8ef9 63088->63096 63089->63027 63089->63031 63095->63027 63097 6c9b8e42 ___scrt_is_nonwritable_in_current_image 63096->63097 63098 6c9b8e55 63097->63098 63100 6c9b8e75 63097->63100 63141 6c9aedf3 14 API calls __dosmaperr 63098->63141 63102 6c9b8e7a 63100->63102 63103 6c9b8e87 63100->63103 63101 6c9b8e5a 63142 6c9aaa38 96 API calls _memcpy_s 63101->63142 63143 6c9aedf3 14 API calls __dosmaperr 63102->63143 63127 6c9be094 63103->63127 63107 6c9a18eb 63107->63089 63115 6c9af7b7 63107->63115 63109 6c9b8e97 63144 6c9aedf3 14 API calls __dosmaperr 63109->63144 63110 6c9b8ea4 63135 6c9c3a96 63110->63135 63116 6c9af7ca __vswprintf_s_l 63115->63116 63218 6c9af50e 63116->63218 63121 6c9ae740 63122 6c9ae753 __vswprintf_s_l 63121->63122 63277 6c9ae61b 63122->63277 63124 6c9ae75f 63125 6c9a8350 __vswprintf_s_l 96 API calls 63124->63125 63126 6c9ae76b 63125->63126 63126->63089 63128 6c9be0a0 ___scrt_is_nonwritable_in_current_image 63127->63128 63146 6c9b84a7 EnterCriticalSection 63128->63146 63130 6c9be0ae 63147 6c9be138 63130->63147 63136 6c9c3a13 63135->63136 63168 6c9b6133 63136->63168 63139 6c9b8eb9 63145 6c9b8ee2 LeaveCriticalSection _Fgetc 63139->63145 63141->63101 63142->63107 63143->63107 63144->63107 63145->63107 63146->63130 63154 6c9be15b 63147->63154 63148 6c9be1b3 63149 6c9b90f2 __Getctype 14 API calls 63148->63149 63150 6c9be1bc 63149->63150 63152 6c9b90b8 ___free_lconv_mon 14 API calls 63150->63152 63153 6c9be1c5 63152->63153 63159 6c9be0bb 63153->63159 63165 6c9bc98c 6 API calls std::_Lockit::_Lockit 63153->63165 63154->63148 63154->63154 63154->63159 63163 6c9aea2f EnterCriticalSection 63154->63163 63164 6c9aea43 LeaveCriticalSection 63154->63164 63156 6c9be1e4 63166 6c9aea2f EnterCriticalSection 63156->63166 63160 6c9be0f4 63159->63160 63167 6c9b84ef LeaveCriticalSection 63160->63167 63162 6c9b8e90 63162->63109 63162->63110 63163->63154 63164->63154 63165->63156 63166->63159 63167->63162 63170 6c9b6152 63168->63170 63169 6c9b617a 63175 6c9b629a 63169->63175 63190 6c9b0617 105 API calls 2 library calls 63169->63190 63170->63169 63171 6c9b6165 63170->63171 63188 6c9aedf3 14 API calls __dosmaperr 63171->63188 63173 6c9b616a 63189 6c9aaa38 96 API calls _memcpy_s 63173->63189 63177 6c9b6175 63175->63177 63193 6c9aedf3 14 API calls __dosmaperr 63175->63193 63177->63139 63185 6c9c9353 63177->63185 63178 6c9b634b 63194 6c9aaa38 96 API calls _memcpy_s 63178->63194 63181 6c9b62ea 63181->63175 63191 6c9b0617 105 API calls 2 library calls 63181->63191 63183 6c9b6308 63183->63175 63192 6c9b0617 105 API calls 2 library calls 63183->63192 63195 6c9c8cfb 63185->63195 63188->63173 63189->63177 63190->63181 63191->63183 63192->63175 63193->63178 63194->63177 63197 6c9c8d07 ___scrt_is_nonwritable_in_current_image 63195->63197 63196 6c9c8d0e 63215 6c9aedf3 14 API calls __dosmaperr 63196->63215 63197->63196 63200 6c9c8d39 63197->63200 63199 6c9c8d13 63216 6c9aaa38 96 API calls _memcpy_s 63199->63216 63206 6c9c92e5 63200->63206 63205 6c9c8d1d 63205->63139 63207 6c9afc06 __wsopen_s 105 API calls 63206->63207 63208 6c9c9307 63207->63208 63209 6c9afbe9 __wsopen_s 17 API calls 63208->63209 63210 6c9c9314 63209->63210 63211 6c9c931b 63210->63211 63212 6c9c9373 __wsopen_s 152 API calls 63210->63212 63213 6c9c8d5d 63211->63213 63214 6c9b90b8 ___free_lconv_mon 14 API calls 63211->63214 63212->63211 63217 6c9c8d90 LeaveCriticalSection __wsopen_s 63213->63217 63214->63213 63215->63199 63216->63205 63217->63205 63220 6c9af51a ___scrt_is_nonwritable_in_current_image 63218->63220 63219 6c9af520 63245 6c9aa9bb 96 API calls 2 library calls 63219->63245 63220->63219 63222 6c9af563 63220->63222 63235 6c9aea2f EnterCriticalSection 63222->63235 63224 6c9af56f 63236 6c9af691 63224->63236 63226 6c9af585 63246 6c9af5ae LeaveCriticalSection _Fgetc 63226->63246 63228 6c9af53b 63229 6c9a8350 63228->63229 63230 6c9a835c 63229->63230 63231 6c9a8373 63230->63231 63275 6c9a85d0 96 API calls 2 library calls 63230->63275 63234 6c9a1906 63231->63234 63276 6c9a85d0 96 API calls 2 library calls 63231->63276 63234->63089 63234->63121 63235->63224 63237 6c9af6b7 63236->63237 63238 6c9af6a4 63236->63238 63247 6c9af5b8 63237->63247 63238->63226 63240 6c9af768 63240->63226 63241 6c9af6da 63241->63240 63251 6c9ae4f1 63241->63251 63245->63228 63246->63228 63248 6c9af5c9 63247->63248 63250 6c9af621 63247->63250 63248->63250 63260 6c9bf061 98 API calls 2 library calls 63248->63260 63250->63241 63252 6c9ae50a 63251->63252 63253 6c9ae531 63251->63253 63252->63253 63261 6c9b6471 63252->63261 63257 6c9bf0a1 63253->63257 63255 6c9ae526 63268 6c9bdb63 128 API calls 3 library calls 63255->63268 63269 6c9bef80 63257->63269 63259 6c9bf0ba 63259->63240 63260->63250 63262 6c9b647d 63261->63262 63263 6c9b6492 63261->63263 63264 6c9aedf3 __dosmaperr 14 API calls 63262->63264 63263->63255 63265 6c9b6482 63264->63265 63266 6c9aaa38 _memcpy_s 96 API calls 63265->63266 63267 6c9b648d 63266->63267 63267->63255 63268->63253 63270 6c9b6e9a __wsopen_s 96 API calls 63269->63270 63271 6c9bef92 63270->63271 63272 6c9befae SetFilePointerEx 63271->63272 63274 6c9bef9a __wsopen_s 63271->63274 63273 6c9befc6 GetLastError 63272->63273 63272->63274 63273->63274 63274->63259 63275->63231 63276->63234 63278 6c9ae627 ___scrt_is_nonwritable_in_current_image 63277->63278 63279 6c9ae631 63278->63279 63280 6c9ae654 63278->63280 63303 6c9aa9bb 96 API calls 2 library calls 63279->63303 63287 6c9ae64c 63280->63287 63288 6c9aea2f EnterCriticalSection 63280->63288 63283 6c9ae672 63289 6c9ae6b2 63283->63289 63285 6c9ae67f 63304 6c9ae6aa LeaveCriticalSection _Fgetc 63285->63304 63287->63124 63288->63283 63290 6c9ae6bf 63289->63290 63291 6c9ae6e2 63289->63291 63316 6c9aa9bb 96 API calls 2 library calls 63290->63316 63293 6c9ae6da 63291->63293 63294 6c9ae4f1 ___scrt_uninitialize_crt 128 API calls 63291->63294 63293->63285 63295 6c9ae6fa 63294->63295 63305 6c9be1fa 63295->63305 63298 6c9b6471 _Fgetc 96 API calls 63299 6c9ae70e 63298->63299 63309 6c9bdf21 63299->63309 63302 6c9b90b8 ___free_lconv_mon 14 API calls 63302->63293 63303->63287 63304->63287 63306 6c9be211 63305->63306 63307 6c9ae702 63305->63307 63306->63307 63308 6c9b90b8 ___free_lconv_mon 14 API calls 63306->63308 63307->63298 63308->63307 63310 6c9bdf4a 63309->63310 63315 6c9ae715 63309->63315 63311 6c9bdf99 63310->63311 63313 6c9bdf71 63310->63313 63325 6c9aa9bb 96 API calls 2 library calls 63311->63325 63317 6c9bde90 63313->63317 63315->63293 63315->63302 63316->63293 63318 6c9bde9c ___scrt_is_nonwritable_in_current_image 63317->63318 63319 6c9b6c1e __wsopen_s EnterCriticalSection 63318->63319 63320 6c9bdeaa 63319->63320 63321 6c9bdedb 63320->63321 63322 6c9bdff4 __wsopen_s 99 API calls 63320->63322 63323 6c9bdf15 LeaveCriticalSection 63321->63323 63322->63321 63324 6c9bdefe 63323->63324 63324->63315 63325->63315 63327 6c850b2a 63326->63327 63333 6c850e10 63327->63333 63329 6c850b46 63329->62975 63345 6c84d210 63330->63345 63331 6c85dbee 63331->62976 63334 6c850e47 63333->63334 63335 6c850e4e 63334->63335 63337 6c850e6f 63334->63337 63336 6c8458e0 96 API calls 63335->63336 63339 6c850e68 63336->63339 63341 6c850e90 63337->63341 63344 6c846780 96 API calls 63337->63344 63339->63329 63340 6c8458e0 96 API calls 63340->63339 63342 6c847250 129 API calls 63341->63342 63343 6c850eed shared_ptr numpunct _Getvals 63341->63343 63342->63343 63343->63339 63343->63340 63344->63341 63346 6c84d221 63345->63346 63352 6c84d2a1 63346->63352 63353 6c84ea00 63346->63353 63349 6c84d28a 63349->63352 63363 6c9aee06 63349->63363 63352->63331 63354 6c84ea12 numpunct 63353->63354 63355 6c84d25d 63353->63355 63354->63355 63377 6c9aed1c 130 API calls __vswprintf_s_l 63354->63377 63355->63349 63355->63352 63357 6c9af77d 63355->63357 63358 6c9af790 __vswprintf_s_l 63357->63358 63359 6c9af50e 130 API calls 63358->63359 63360 6c9af7a5 63359->63360 63361 6c9a8350 __vswprintf_s_l 96 API calls 63360->63361 63362 6c9af7b2 63361->63362 63362->63349 63364 6c9aee11 63363->63364 63365 6c9aee26 63363->63365 63384 6c9aedf3 14 API calls __dosmaperr 63364->63384 63367 6c9aee2e 63365->63367 63368 6c9aee43 63365->63368 63386 6c9aedf3 14 API calls __dosmaperr 63367->63386 63378 6c9b6a8f 63368->63378 63370 6c9aee16 63385 6c9aaa38 96 API calls _memcpy_s 63370->63385 63373 6c9aee33 63387 6c9aaa38 96 API calls _memcpy_s 63373->63387 63374 6c9aee3e 63374->63352 63375 6c9aee21 63375->63352 63377->63355 63379 6c9b6aa3 __vswprintf_s_l 63378->63379 63388 6c9b6498 63379->63388 63382 6c9a8350 __vswprintf_s_l 96 API calls 63383 6c9b6abd 63382->63383 63383->63374 63384->63370 63385->63375 63386->63373 63387->63374 63389 6c9b64a4 ___scrt_is_nonwritable_in_current_image 63388->63389 63390 6c9b64ab 63389->63390 63391 6c9b64ce 63389->63391 63414 6c9aa9bb 96 API calls 2 library calls 63390->63414 63399 6c9aea2f EnterCriticalSection 63391->63399 63394 6c9b64dc 63400 6c9b6527 63394->63400 63396 6c9b64eb 63415 6c9b651d LeaveCriticalSection _Fgetc 63396->63415 63398 6c9b64c4 63398->63382 63399->63394 63401 6c9b655e 63400->63401 63402 6c9b6536 63400->63402 63404 6c9b6471 _Fgetc 96 API calls 63401->63404 63419 6c9aa9bb 96 API calls 2 library calls 63402->63419 63406 6c9b6567 63404->63406 63405 6c9b6551 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 63405->63396 63416 6c9bf043 63406->63416 63409 6c9b6611 63420 6c9b6893 101 API calls 4 library calls 63409->63420 63411 6c9b6628 63411->63405 63421 6c9b66c8 100 API calls 2 library calls 63411->63421 63412 6c9b6620 63412->63405 63414->63398 63415->63398 63422 6c9bee5b 63416->63422 63419->63405 63420->63412 63421->63405 63425 6c9bee67 ___scrt_is_nonwritable_in_current_image 63422->63425 63423 6c9b6585 63423->63405 63423->63409 63423->63411 63424 6c9beeaa 63426 6c9aa9bb _memcpy_s 96 API calls 63424->63426 63425->63423 63425->63424 63427 6c9beef0 63425->63427 63426->63423 63428 6c9b6c1e __wsopen_s EnterCriticalSection 63427->63428 63429 6c9beef6 63428->63429 63430 6c9bef80 __fread_nolock 98 API calls 63429->63430 63431 6c9bef17 63429->63431 63430->63431 63432 6c9bef78 LeaveCriticalSection 63431->63432 63432->63423 63434 6c848687 numpunct 63433->63434 63436 6c848691 numpunct shared_ptr 63434->63436 63439 6c842c30 96 API calls numpunct 63434->63439 63438 6c8486bb HandleT shared_ptr Concurrency::task_continuation_context::task_continuation_context char_traits numpunct 63436->63438 63440 6c849110 96 API calls numpunct 63436->63440 63438->62991 63439->63436 63440->63438 63444 6c84d410 63441->63444 63442 6c85dbb6 63442->62998 63446 6c84d41f _Min_value numpunct 63444->63446 63445 6c84d427 63445->63442 63446->63445 63447 6c84d532 63446->63447 63448 6c9af3da __fread_nolock 109 API calls 63446->63448 63447->63445 63450 6c9af3da 63447->63450 63448->63446 63453 6c9af3f7 63450->63453 63454 6c9af403 ___scrt_is_nonwritable_in_current_image 63453->63454 63455 6c9af44d 63454->63455 63456 6c9af416 char_traits 63454->63456 63465 6c9af3f2 63454->63465 63466 6c9aea2f EnterCriticalSection 63455->63466 63480 6c9aedf3 14 API calls __dosmaperr 63456->63480 63459 6c9af457 63467 6c9af201 63459->63467 63460 6c9af430 63481 6c9aaa38 96 API calls _memcpy_s 63460->63481 63465->63445 63466->63459 63470 6c9af213 char_traits 63467->63470 63473 6c9af230 63467->63473 63468 6c9af220 63548 6c9aedf3 14 API calls __dosmaperr 63468->63548 63470->63468 63470->63473 63476 6c9af271 __fread_nolock 63470->63476 63471 6c9af225 63549 6c9aaa38 96 API calls _memcpy_s 63471->63549 63482 6c9af48c LeaveCriticalSection _Fgetc 63473->63482 63474 6c9af39c char_traits 63551 6c9aedf3 14 API calls __dosmaperr 63474->63551 63476->63473 63476->63474 63477 6c9b6471 _Fgetc 96 API calls 63476->63477 63483 6c9bead0 63476->63483 63550 6c9ae209 96 API calls 4 library calls 63476->63550 63477->63476 63480->63460 63481->63465 63482->63465 63484 6c9beafa 63483->63484 63485 6c9beae2 63483->63485 63486 6c9bee3c 63484->63486 63491 6c9beb3d 63484->63491 63561 6c9aede0 14 API calls __dosmaperr 63485->63561 63576 6c9aede0 14 API calls __dosmaperr 63486->63576 63488 6c9beae7 63562 6c9aedf3 14 API calls __dosmaperr 63488->63562 63490 6c9bee41 63577 6c9aedf3 14 API calls __dosmaperr 63490->63577 63493 6c9beaef 63491->63493 63495 6c9beb48 63491->63495 63501 6c9beb78 63491->63501 63493->63476 63563 6c9aede0 14 API calls __dosmaperr 63495->63563 63496 6c9beb55 63578 6c9aaa38 96 API calls _memcpy_s 63496->63578 63498 6c9beb4d 63564 6c9aedf3 14 API calls __dosmaperr 63498->63564 63502 6c9beb91 63501->63502 63503 6c9beb9e 63501->63503 63504 6c9bebcc 63501->63504 63502->63503 63537 6c9bebba 63502->63537 63565 6c9aede0 14 API calls __dosmaperr 63503->63565 63507 6c9b97a4 __fread_nolock 15 API calls 63504->63507 63506 6c9beba3 63566 6c9aedf3 14 API calls __dosmaperr 63506->63566 63510 6c9bebdd 63507->63510 63513 6c9b90b8 ___free_lconv_mon 14 API calls 63510->63513 63511 6c9bebaa 63567 6c9aaa38 96 API calls _memcpy_s 63511->63567 63512 6c9bed18 63515 6c9bed8c 63512->63515 63519 6c9bed31 GetConsoleMode 63512->63519 63516 6c9bebe6 63513->63516 63518 6c9bed90 ReadFile 63515->63518 63517 6c9b90b8 ___free_lconv_mon 14 API calls 63516->63517 63520 6c9bebed 63517->63520 63521 6c9beda8 63518->63521 63522 6c9bee04 GetLastError 63518->63522 63519->63515 63523 6c9bed42 63519->63523 63524 6c9bec12 63520->63524 63525 6c9bebf7 63520->63525 63521->63522 63527 6c9bed81 63521->63527 63526 6c9bee11 63522->63526 63534 6c9bed68 63522->63534 63523->63518 63528 6c9bed48 ReadConsoleW 63523->63528 63570 6c9bf061 98 API calls 2 library calls 63524->63570 63568 6c9aedf3 14 API calls __dosmaperr 63525->63568 63574 6c9aedf3 14 API calls __dosmaperr 63526->63574 63541 6c9bedcd 63527->63541 63542 6c9bede4 63527->63542 63545 6c9bebb5 __fread_nolock 63527->63545 63528->63527 63533 6c9bed62 GetLastError 63528->63533 63529 6c9b90b8 ___free_lconv_mon 14 API calls 63529->63493 63533->63534 63534->63545 63571 6c9aed99 14 API calls __dosmaperr 63534->63571 63535 6c9bebfc 63569 6c9aede0 14 API calls __dosmaperr 63535->63569 63536 6c9bee16 63575 6c9aede0 14 API calls __dosmaperr 63536->63575 63552 6c9c589d 63537->63552 63572 6c9be7e2 101 API calls 3 library calls 63541->63572 63544 6c9bedfd 63542->63544 63542->63545 63573 6c9be628 99 API calls __fread_nolock 63544->63573 63545->63529 63547 6c9bee02 63547->63545 63548->63471 63549->63473 63550->63476 63551->63471 63553 6c9c58aa 63552->63553 63554 6c9c58b7 63552->63554 63579 6c9aedf3 14 API calls __dosmaperr 63553->63579 63556 6c9c58c3 63554->63556 63580 6c9aedf3 14 API calls __dosmaperr 63554->63580 63556->63512 63558 6c9c58af 63558->63512 63559 6c9c58e4 63581 6c9aaa38 96 API calls _memcpy_s 63559->63581 63561->63488 63562->63493 63563->63498 63564->63496 63565->63506 63566->63511 63567->63545 63568->63535 63569->63545 63570->63537 63571->63545 63572->63545 63573->63547 63574->63536 63575->63545 63576->63490 63577->63496 63578->63493 63579->63558 63580->63559 63581->63558 63583 6c84ec32 63582->63583 63584 6c84ec02 63582->63584 63585 6c84eb20 96 API calls 63583->63585 63587 6c84ea00 130 API calls 63584->63587 63586 6c84cee4 63585->63586 63586->63002 63586->63003 63588 6c84ec18 63587->63588 63589 6c9ae740 133 API calls 63588->63589 63589->63583 63591 6c845a37 shared_ptr shared_ptr 63590->63591 63592 6c845a68 Concurrency::task_continuation_context::task_continuation_context shared_ptr 63591->63592 63594 6c846b10 96 API calls allocator 63591->63594 63592->62555 63594->63592 63654 6c8498f0 63595->63654 63599 6c84a1f3 63602 6c84a22a CryptImportKey 63599->63602 63600 6c84a1d2 63730 6c8498c0 96 API calls std::exception::exception 63600->63730 63604 6c84a28f 63602->63604 63605 6c84a261 CryptReleaseContext 63602->63605 63603 6c84a1e2 63731 6c9a2cde RaiseException 63603->63731 63609 6c84a29b CryptSetKeyParam 63604->63609 63732 6c8498c0 96 API calls std::exception::exception 63605->63732 63608 6c84a27e 63733 6c9a2cde RaiseException 63608->63733 63612 6c84a2f3 CryptSetKeyParam 63609->63612 63613 6c84a2ba CryptDestroyKey CryptReleaseContext 63609->63613 63611 6c84a022 char_traits 63627 6c84a10e 63611->63627 63729 6c84aab0 96 API calls 2 library calls 63611->63729 63614 6c84a310 CryptDestroyKey CryptReleaseContext 63612->63614 63615 6c84a348 63612->63615 63734 6c8498c0 96 API calls std::exception::exception 63613->63734 63736 6c8498c0 96 API calls std::exception::exception 63614->63736 63715 6c84a7e0 63615->63715 63618 6c84a2e1 63735 6c9a2cde RaiseException 63618->63735 63619 6c84a337 63737 6c9a2cde RaiseException 63619->63737 63624 6c84a2f2 63624->63612 63625 6c84a363 63626 6c84a372 CryptDecrypt 63625->63626 63628 6c84a397 CryptDestroyKey CryptReleaseContext 63626->63628 63629 6c84a3d0 CryptDestroyKey CryptReleaseContext 63626->63629 63672 6c849a10 63627->63672 63738 6c8498c0 96 API calls std::exception::exception 63628->63738 63719 6c84a6d0 63629->63719 63632 6c84a3be 63739 6c9a2cde RaiseException 63632->63739 63634 6c84a3cf 63634->63629 63635 6c84a3f5 63722 6c844cc0 63635->63722 63637 6c84a424 std::ios_base::failure::failure 63638 6c844bb0 std::ios_base::failure::failure 96 API calls 63637->63638 63639 6c84a447 63638->63639 63726 6c84a6f0 63639->63726 63642 6c84a6f0 96 API calls 63643 6c84a465 63642->63643 63644 6c84a6f0 96 API calls 63643->63644 63645 6c84a474 63644->63645 63646 6c84a6f0 96 API calls 63645->63646 63647 6c84a483 63646->63647 63648 6c84a6f0 96 API calls 63647->63648 63649 6c84a492 63648->63649 63650 6c846f80 63649->63650 63651 6c846f92 HandleT shared_ptr 63650->63651 63652 6c845a20 shared_ptr 96 API calls 63651->63652 63653 6c846f9a shared_ptr 63651->63653 63652->63653 63653->62562 63740 6c844b20 63654->63740 63656 6c84992f CryptStringToBinaryA 63657 6c84993a 63656->63657 63659 6c849955 numpunct 63656->63659 63746 6c8498c0 96 API calls std::exception::exception 63657->63746 63742 6c84a860 63659->63742 63660 6c849947 63747 6c9a2cde RaiseException 63660->63747 63663 6c849977 std::runtime_error::runtime_error 63664 6c849991 CryptStringToBinaryA 63663->63664 63665 6c8499b2 63664->63665 63666 6c8499cd 63664->63666 63748 6c8498c0 96 API calls std::exception::exception 63665->63748 63669 6c84a6f0 96 API calls 63666->63669 63668 6c8499bf 63749 6c9a2cde RaiseException 63668->63749 63671 6c8499f2 63669->63671 63671->63611 63673 6c849a36 63672->63673 63674 6c849a48 CryptAcquireContextW 63673->63674 63675 6c849a73 63674->63675 63693 6c849a94 63674->63693 63762 6c8498c0 96 API calls std::exception::exception 63675->63762 63677 6c849a83 63763 6c9a2cde RaiseException 63677->63763 63679 6c849acd CryptCreateHash 63681 6c849ae8 CryptReleaseContext 63679->63681 63679->63693 63680 6c849e98 CryptReleaseContext 63683 6c849eb4 63680->63683 63764 6c8498c0 96 API calls std::exception::exception 63681->63764 63758 6c84ab70 63683->63758 63684 6c9a2cde RaiseException Concurrency::cancel_current_task 63684->63693 63686 6c849b3c CryptHashData 63687 6c849b66 CryptDestroyHash CryptReleaseContext 63686->63687 63686->63693 63765 6c8498c0 96 API calls std::exception::exception 63687->63765 63689 6c849f05 63690 6c84ab70 96 API calls 63689->63690 63691 6c849f9e 63690->63691 63692 6c84a6f0 96 API calls 63691->63692 63697 6c849fab 63692->63697 63693->63679 63693->63680 63693->63684 63693->63686 63694 6c849caa CryptHashData 63693->63694 63703 6c84aab0 96 API calls 63693->63703 63712 6c849dee CryptDestroyHash 63693->63712 63695 6c849cd1 CryptDestroyHash CryptReleaseContext 63694->63695 63696 6c849d0a CryptGetHashParam 63694->63696 63766 6c8498c0 96 API calls std::exception::exception 63695->63766 63700 6c849d38 CryptDestroyHash CryptReleaseContext 63696->63700 63708 6c849cf8 63696->63708 63699 6c84a6f0 96 API calls 63697->63699 63701 6c849fb7 63699->63701 63767 6c8498c0 96 API calls std::exception::exception 63700->63767 63706 6c84a6f0 96 API calls 63701->63706 63703->63693 63704 6c84a6d0 96 API calls 63704->63708 63705 6c9a2cde RaiseException Concurrency::cancel_current_task 63705->63708 63707 6c849fc6 63706->63707 63709 6c84a6f0 96 API calls 63707->63709 63708->63696 63708->63704 63708->63705 63710 6c849d86 CryptGetHashParam 63708->63710 63713 6c849fd5 CryptAcquireContextW 63709->63713 63711 6c849db5 CryptDestroyHash CryptReleaseContext 63710->63711 63710->63712 63768 6c8498c0 96 API calls std::exception::exception 63711->63768 63712->63693 63713->63599 63713->63600 63716 6c84a7f7 HandleT shared_ptr 63715->63716 63774 6c84adc0 63716->63774 63718 6c84a84a 63718->63625 63782 6c84ac30 63719->63782 63721 6c84a6e9 63721->63635 63723 6c844cf1 numpunct 63722->63723 63787 6c847920 63723->63787 63725 6c844d08 63725->63637 63795 6c84a9c0 63726->63795 63729->63627 63730->63603 63731->63599 63732->63608 63733->63604 63734->63618 63735->63624 63736->63619 63737->63615 63738->63632 63739->63634 63741 6c844b2f Concurrency::task_continuation_context::task_continuation_context 63740->63741 63741->63656 63743 6c84a880 63742->63743 63750 6c84aea0 63743->63750 63745 6c84a88d 63745->63663 63746->63660 63747->63659 63748->63668 63749->63666 63751 6c84aec6 numpunct shared_ptr 63750->63751 63755 6c84af38 shared_ptr 63751->63755 63756 6c84b000 96 API calls 63751->63756 63753 6c84aef9 63757 6c84af60 96 API calls 63753->63757 63755->63745 63756->63753 63757->63755 63759 6c84ab86 HandleT ctype 63758->63759 63769 6c84b570 63759->63769 63761 6c84abd9 63761->63689 63762->63677 63763->63693 63764->63693 63765->63693 63766->63708 63767->63708 63768->63693 63770 6c84b581 shared_ptr shared_ptr 63769->63770 63772 6c84b5cf HandleT ctype 63770->63772 63773 6c84bb30 96 API calls 3 library calls 63770->63773 63772->63761 63773->63772 63775 6c84ade6 numpunct shared_ptr 63774->63775 63777 6c84ae84 shared_ptr 63775->63777 63780 6c84b000 96 API calls 63775->63780 63777->63718 63778 6c84ae19 HandleT 63781 6c84af60 96 API calls 63778->63781 63780->63778 63781->63777 63783 6c84ac41 shared_ptr 63782->63783 63785 6c84ac6e ctype 63783->63785 63786 6c84b720 96 API calls 2 library calls 63783->63786 63785->63721 63786->63785 63788 6c847937 numpunct 63787->63788 63790 6c847941 numpunct shared_ptr 63788->63790 63793 6c842c30 96 API calls numpunct 63788->63793 63792 6c84796b HandleT shared_ptr Concurrency::task_continuation_context::task_continuation_context numpunct 63790->63792 63794 6c849110 96 API calls numpunct 63790->63794 63792->63725 63793->63790 63794->63792 63797 6c84a9e6 shared_ptr ctype shared_ptr 63795->63797 63796 6c84a456 63796->63642 63797->63796 63799 6c847060 96 API calls allocator 63797->63799 63799->63796 63813 6c9ab834 63800->63813 63803 6c9afc2a 63805 6c9afbe9 63803->63805 63824 6c9afb37 63805->63824 63808 6c9bf207 DeleteFileW 63809 6c9bf22b 63808->63809 63810 6c9bf219 GetLastError 63808->63810 63809->62576 63849 6c9aed99 14 API calls __dosmaperr 63810->63849 63812 6c9bf225 63812->62576 63814 6c9ab84b 63813->63814 63815 6c9ab852 63813->63815 63814->63803 63821 6c9bc742 5 API calls std::_Lockit::_Lockit 63814->63821 63815->63814 63816 6c9b94b9 __Getctype 96 API calls 63815->63816 63817 6c9ab873 63816->63817 63822 6c9b9ab9 96 API calls __Getctype 63817->63822 63819 6c9ab889 63823 6c9b9b17 105 API calls __vsnwscanf_s_l 63819->63823 63821->63803 63822->63819 63823->63814 63825 6c9afb5f 63824->63825 63826 6c9afb45 63824->63826 63827 6c9afb66 63825->63827 63828 6c9afb85 63825->63828 63842 6c9afc45 14 API calls ___free_lconv_mon 63826->63842 63841 6c9afb4f 63827->63841 63843 6c9afc5f 15 API calls __wsopen_s 63827->63843 63844 6c9bf1dd MultiByteToWideChar ctype 63828->63844 63832 6c9afb94 63833 6c9afb9b GetLastError 63832->63833 63838 6c9afbc1 63832->63838 63847 6c9afc5f 15 API calls __wsopen_s 63832->63847 63845 6c9aed99 14 API calls __dosmaperr 63833->63845 63836 6c9afba7 63846 6c9aedf3 14 API calls __dosmaperr 63836->63846 63838->63841 63848 6c9bf1dd MultiByteToWideChar ctype 63838->63848 63839 6c9afbd8 63839->63833 63839->63841 63841->62576 63841->63808 63842->63841 63843->63841 63844->63832 63845->63836 63846->63841 63847->63838 63848->63839 63849->63812 63854 6c844b70 63850->63854 63852 6c85ae67 std::ios_base::failure::failure HandleT 63852->62584 63853->62615 63855 6c844b8a Concurrency::task_continuation_context::task_continuation_context 63854->63855 63856 6c845ab0 std::ios_base::failure::failure 96 API calls 63855->63856 63857 6c844b9d 63856->63857 63857->63852 63862 6c85cb61 63859->63862 63860 6c85cbe5 63861 6c844c40 numpunct 96 API calls 63861->63862 63862->63860 63862->63861 63864 6c844bb0 std::ios_base::failure::failure 96 API calls 63862->63864 63865 6c85cbd4 Sleep 63862->63865 63866 6c85cba3 63862->63866 63874 6c85c940 CreateToolhelp32Snapshot 63862->63874 63864->63862 63865->63862 63867 6c844c40 numpunct 96 API calls 63866->63867 63868 6c85cbaf 63867->63868 63885 6c85ca30 98 API calls 3 library calls 63868->63885 63870 6c85cbbf 63871 6c844bb0 std::ios_base::failure::failure 96 API calls 63870->63871 63872 6c85cbd1 63871->63872 63872->63860 63875 6c85c963 char_traits 63874->63875 63876 6c85c95c 63874->63876 63877 6c85c980 Process32FirstW 63875->63877 63876->63862 63878 6c85ca14 CloseHandle 63877->63878 63879 6c85c998 WideCharToMultiByte 63877->63879 63878->63876 63880 6c844c40 numpunct 96 API calls 63879->63880 63881 6c85c9cb 63880->63881 63882 6c844bb0 std::ios_base::failure::failure 96 API calls 63881->63882 63883 6c85c9f1 CloseHandle 63881->63883 63884 6c85c9ff Process32NextW 63881->63884 63882->63881 63883->63876 63884->63878 63884->63879 63885->63870 63886 6c8412dd 63891 6c8895e7 63886->63891 63888 6c8412e2 63895 6c99f6a7 96 API calls _Error_objects 63888->63895 63890 6c8412ec 63892 6c8895f3 __EH_prolog3 63891->63892 63896 6c88a342 63892->63896 63894 6c8897dc Concurrency::details::ExternalContextBase::~ExternalContextBase 63894->63888 63895->63890 63897 6c88a363 char_traits 63896->63897 63906 6c88a3ea 63896->63906 63900 6c88a393 VerSetConditionMask VerSetConditionMask VerifyVersionInfoW GetSystemMetrics 63897->63900 63898 6c99fa4e _ValidateLocalCookies 5 API calls 63899 6c88a3fd 63898->63899 63899->63894 63907 6c88adfa 63900->63907 63902 6c88a3dc 63984 6c88a8db 63902->63984 63906->63898 64070 6c99fa8e 63907->64070 63909 6c88ae06 GetSysColor 63910 6c88ae27 GetSysColor 63909->63910 63911 6c88ae1b GetSysColor 63909->63911 63913 6c88ae3e GetSysColor 63910->63913 63914 6c88ae4a 63910->63914 63911->63910 63913->63914 64071 6c871a91 63914->64071 63916 6c88ae60 22 API calls 63917 6c88af8a 63916->63917 63918 6c88af93 GetSysColor 63916->63918 63919 6c88afa5 GetSysColorBrush 63917->63919 63918->63919 63920 6c88afc1 GetSysColorBrush 63919->63920 63921 6c88b212 63919->63921 63920->63921 63922 6c88afd4 GetSysColorBrush 63920->63922 64111 6c86dc83 58 API calls Concurrency::cancel_current_task 63921->64111 63922->63921 63924 6c88afe7 63922->63924 64079 6c8724bb 63924->64079 63925 6c88b217 63927 6c88aff4 CreateSolidBrush 64084 6c8723b4 63927->64084 63930 6c8724bb 59 API calls 63931 6c88b012 CreateSolidBrush 63930->63931 63932 6c8723b4 58 API calls 63931->63932 63933 6c88b023 63932->63933 63934 6c8724bb 59 API calls 63933->63934 63935 6c88b030 CreateSolidBrush 63934->63935 63936 6c8723b4 58 API calls 63935->63936 63937 6c88b041 63936->63937 63938 6c8724bb 59 API calls 63937->63938 63939 6c88b04e CreateSolidBrush 63938->63939 63940 6c8723b4 58 API calls 63939->63940 63941 6c88b062 63940->63941 63942 6c8724bb 59 API calls 63941->63942 63943 6c88b06f CreateSolidBrush 63942->63943 63944 6c8723b4 58 API calls 63943->63944 63945 6c88b080 63944->63945 63946 6c8724bb 59 API calls 63945->63946 63947 6c88b08d CreateSolidBrush 63946->63947 63948 6c8723b4 58 API calls 63947->63948 63949 6c88b09e 63948->63949 63950 6c8724bb 59 API calls 63949->63950 63951 6c88b0ab CreateSolidBrush 63950->63951 63952 6c8723b4 58 API calls 63951->63952 63953 6c88b0bc 63952->63953 63954 6c8724bb 59 API calls 63953->63954 63955 6c88b0c9 CreatePen 63954->63955 63956 6c8723b4 58 API calls 63955->63956 63957 6c88b0e2 63956->63957 63958 6c8724bb 59 API calls 63957->63958 63959 6c88b0ef CreatePen 63958->63959 63960 6c8723b4 58 API calls 63959->63960 63961 6c88b106 63960->63961 63962 6c8724bb 59 API calls 63961->63962 63963 6c88b113 CreatePen 63962->63963 63964 6c8723b4 58 API calls 63963->63964 63965 6c88b12a 63964->63965 63966 6c88b141 63965->63966 63970 6c8724bb 59 API calls 63965->63970 63967 6c88b14a CreateSolidBrush 63966->63967 63968 6c88b1ae 63966->63968 63971 6c8723b4 58 API calls 63967->63971 64107 6c889d51 7 API calls 2 library calls 63968->64107 63970->63966 63972 6c88b1ac 63971->63972 64090 6c8b306e 63972->64090 63973 6c88b1b8 63973->63921 63974 6c88b1bc 63973->63974 63975 6c8723b4 58 API calls 63974->63975 63977 6c88b1d5 CreatePatternBrush 63975->63977 63979 6c8723b4 58 API calls 63977->63979 63981 6c88b1e6 63979->63981 64108 6c85f050 63981->64108 63982 6c88b20c Concurrency::details::ExternalContextBase::~ExternalContextBase 63982->63902 63985 6c88a8ea __EH_prolog3_GS 63984->63985 63986 6c871a91 59 API calls 63985->63986 63987 6c88a8f9 GetDeviceCaps 63986->63987 63988 6c88a933 63987->63988 63989 6c88a967 63988->63989 63991 6c87250e 58 API calls 63988->63991 63990 6c88a985 63989->63990 63995 6c87250e 58 API calls 63989->63995 63992 6c88a9a3 63990->63992 63996 6c87250e 58 API calls 63990->63996 63994 6c88a960 DeleteObject 63991->63994 63993 6c88a9c1 63992->63993 64000 6c87250e 58 API calls 63992->64000 63997 6c88a9df 63993->63997 64004 6c87250e 58 API calls 63993->64004 63994->63989 63998 6c88a97e DeleteObject 63995->63998 63999 6c88a99c DeleteObject 63996->63999 64001 6c88a9fd 63997->64001 64007 6c87250e 58 API calls 63997->64007 63998->63990 63999->63992 64003 6c88a9ba DeleteObject 64000->64003 64002 6c88aa1b 64001->64002 64009 6c87250e 58 API calls 64001->64009 64005 6c88aa39 64002->64005 64013 6c87250e 58 API calls 64002->64013 64003->63993 64006 6c88a9d8 DeleteObject 64004->64006 64010 6c88aa57 64005->64010 64016 6c87250e 58 API calls 64005->64016 64006->63997 64008 6c88a9f6 DeleteObject 64007->64008 64008->64001 64012 6c88aa14 DeleteObject 64009->64012 64011 6c88aa75 64010->64011 64017 6c87250e 58 API calls 64010->64017 64162 6c88a29e 64011->64162 64012->64002 64015 6c88aa32 DeleteObject 64013->64015 64015->64005 64019 6c88aa50 DeleteObject 64016->64019 64020 6c88aa6e DeleteObject 64017->64020 64018 6c88aa8d char_traits 64021 6c88aa9a GetTextCharsetInfo 64018->64021 64019->64010 64020->64011 64022 6c88aad4 lstrcpyW 64021->64022 64024 6c88ab08 64022->64024 64025 6c88ab74 CreateFontIndirectW 64022->64025 64024->64025 64027 6c88ab11 EnumFontFamiliesW 64024->64027 64026 6c8723b4 58 API calls 64025->64026 64033 6c88ab86 64026->64033 64028 6c88ab2d lstrcpyW 64027->64028 64029 6c88ab42 EnumFontFamiliesW 64027->64029 64028->64025 64030 6c88ab61 lstrcpyW 64029->64030 64030->64025 64032 6c88abbc CreateFontIndirectW 64034 6c8723b4 58 API calls 64032->64034 64033->64032 64035 6c88abce 64034->64035 64036 6c88a29e SystemParametersInfoW 64035->64036 64037 6c88abe9 CreateFontIndirectW 64036->64037 64038 6c8723b4 58 API calls 64037->64038 64039 6c88ac11 CreateFontIndirectW 64038->64039 64040 6c8723b4 58 API calls 64039->64040 64041 6c88ac3d CreateFontIndirectW 64040->64041 64042 6c8723b4 58 API calls 64041->64042 64043 6c88ac5e GetSystemMetrics lstrcpyW CreateFontIndirectW 64042->64043 64044 6c8723b4 58 API calls 64043->64044 64045 6c88ac9a GetStockObject 64044->64045 64046 6c88acc8 GetObjectW 64045->64046 64047 6c88ad92 64045->64047 64046->64047 64049 6c88acdd lstrcpyW CreateFontIndirectW 64046->64049 64165 6c88b218 64047->64165 64050 6c8723b4 58 API calls 64049->64050 64051 6c88ad2c CreateFontIndirectW 64050->64051 64052 6c8723b4 58 API calls 64051->64052 64056 6c88ad45 GetObjectW CreateFontIndirectW 64052->64056 64053 6c88adce 64057 6c85f050 59 API calls 64053->64057 64054 6c88ad99 64054->64053 64055 6c88adf4 64054->64055 64183 6c863fb3 58 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 64054->64183 64184 6c86dc83 58 API calls Concurrency::cancel_current_task 64055->64184 64060 6c8723b4 58 API calls 64056->64060 64061 6c88ade3 64057->64061 64064 6c88ad71 CreateFontIndirectW 64060->64064 64062 6c871bea 60 API calls 64061->64062 64066 6c88adee 64062->64066 64063 6c88adf9 64065 6c8723b4 58 API calls 64064->64065 64065->64047 64067 6c99fa70 _Error_objects 5 API calls 64066->64067 64068 6c88a3e3 64067->64068 64069 6c88a4ae 8 API calls 64068->64069 64069->63906 64070->63909 64072 6c871a9d __EH_prolog3 64071->64072 64073 6c871ac0 GetWindowDC 64072->64073 64112 6c872372 64073->64112 64076 6c871ad6 Concurrency::details::ExternalContextBase::~ExternalContextBase 64076->63916 64080 6c8724c4 64079->64080 64081 6c8724c1 64079->64081 64121 6c87250e 64080->64121 64081->63927 64083 6c8724c9 DeleteObject 64083->63927 64085 6c8723c1 64084->64085 64086 6c8723d6 64084->64086 64087 6c872ebe 58 API calls 64085->64087 64086->63930 64088 6c8723cb 64087->64088 64146 6c87c797 58 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 64088->64146 64091 6c8b3077 64090->64091 64101 6c88b1fa 64090->64101 64091->64101 64147 6c8e21a7 59 API calls _DebugHeapAllocator 64091->64147 64093 6c8b308a 64148 6c8e21a7 59 API calls _DebugHeapAllocator 64093->64148 64095 6c8b3094 64149 6c8e21a7 59 API calls _DebugHeapAllocator 64095->64149 64097 6c8b309e 64150 6c8e21a7 59 API calls _DebugHeapAllocator 64097->64150 64099 6c8b30a8 64151 6c8e21a7 59 API calls _DebugHeapAllocator 64099->64151 64102 6c871bea 64101->64102 64152 6c8724d1 64102->64152 64104 6c871c1a ReleaseDC 64156 6c871b3a 64104->64156 64107->63973 64109 6c8724bb 59 API calls 64108->64109 64110 6c85f094 shared_ptr 64109->64110 64110->63972 64111->63925 64113 6c87237f 64112->64113 64117 6c871ad2 64112->64117 64119 6c872e4d 58 API calls 3 library calls 64113->64119 64115 6c87238a 64120 6c87c797 58 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 64115->64120 64117->64076 64118 6c87233e RaiseException Concurrency::cancel_current_task 64117->64118 64119->64115 64120->64117 64122 6c872520 64121->64122 64123 6c872519 64121->64123 64122->64083 64125 6c872ebe 64123->64125 64126 6c872eca __EH_prolog3 64125->64126 64133 6c87b7ab 64126->64133 64128 6c872f15 Concurrency::details::ExternalContextBase::~ExternalContextBase 64128->64122 64129 6c872ecf Concurrency::details::ExternalContextBase::~ExternalContextBase 64129->64128 64130 6c861c4d allocator 15 API calls 64129->64130 64131 6c872ef0 64130->64131 64131->64128 64143 6c87f71a 58 API calls 2 library calls 64131->64143 64134 6c87b778 _Error_objects 57 API calls 64133->64134 64135 6c87b7b0 64134->64135 64136 6c87cdf8 _Error_objects 57 API calls 64135->64136 64137 6c87b7bd 64136->64137 64138 6c87b7c5 64137->64138 64140 6c86dc83 64137->64140 64138->64129 64142 6c8805ad SendMessageW 64140->64142 64144 6c9a2cde RaiseException 64140->64144 64145 6c8806bb 58 API calls 64140->64145 64142->64129 64143->64128 64144->64140 64145->64140 64146->64086 64147->64093 64148->64095 64149->64097 64150->64099 64151->64101 64153 6c8724e4 64152->64153 64154 6c8724dd 64152->64154 64153->64104 64161 6c872e4d 58 API calls 3 library calls 64154->64161 64157 6c871b74 64156->64157 64158 6c871b68 64156->64158 64157->63982 64159 6c8724d1 58 API calls 64158->64159 64160 6c871b6d DeleteDC 64159->64160 64160->64157 64161->64153 64163 6c88a2ad 64162->64163 64164 6c88a2b3 SystemParametersInfoW 64162->64164 64163->64164 64164->64018 64166 6c88b224 __EH_prolog3_GS 64165->64166 64167 6c871a91 59 API calls 64166->64167 64168 6c88b230 64167->64168 64185 6c872aab 64168->64185 64171 6c88b24d GetTextMetricsW 64173 6c872aab 60 API calls 64171->64173 64172 6c88b2d0 64193 6c86dc83 58 API calls Concurrency::cancel_current_task 64172->64193 64175 6c88b28d GetTextMetricsW 64173->64175 64177 6c872aab 60 API calls 64175->64177 64176 6c88b2d5 64178 6c88b2c2 64177->64178 64179 6c871bea 60 API calls 64178->64179 64180 6c88b2ca 64179->64180 64181 6c99fa70 _Error_objects 5 API calls 64180->64181 64182 6c88b2cf 64181->64182 64182->64054 64183->64054 64184->64063 64186 6c872ad1 64185->64186 64187 6c872ac2 SelectObject 64185->64187 64189 6c872ae7 64186->64189 64191 6c872add SelectObject 64186->64191 64187->64186 64194 6c872627 64189->64194 64191->64189 64192 6c872aed 64192->64171 64192->64172 64193->64176 64195 6c872ebe 58 API calls 64194->64195 64196 6c872631 __EH_prolog3_catch 64195->64196 64197 6c87f9b5 Concurrency::details::ExternalContextBase::~ExternalContextBase 64196->64197 64206 6c87c941 58 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 64196->64206 64197->64192 64199 6c87f9c6 64199->64197 64207 6c87c941 58 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 64199->64207 64201 6c87f9d3 Concurrency::details::ExternalContextBase::~ExternalContextBase 64208 6c8a7653 58 API calls 64201->64208 64203 6c87fa02 64209 6c86dc9d RaiseException Concurrency::cancel_current_task 64203->64209 64206->64199 64207->64201 64208->64203 64210 6c84119d 64215 6c861d50 64210->64215 64214 6c8411b3 64216 6c871165 Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 58 API calls 64215->64216 64217 6c8411a9 64216->64217 64218 6c99f6a7 96 API calls _Error_objects 64217->64218 64218->64214

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 206 6c849a10-6c849a71 call 6c844a20 * 2 CryptAcquireContextW 211 6c849a95-6c849ab5 call 6c844a20 * 2 206->211 212 6c849a73-6c849a94 call 6c8498c0 call 6c9a2cde 206->212 221 6c849ab9-6c849ac7 call 6c84a4e0 211->221 212->211 224 6c849acd-6c849ae6 CryptCreateHash 221->224 225 6c849e98-6c849fe3 CryptReleaseContext call 6c84a5c0 call 6c84a4b0 call 6c84a5c0 call 6c84ab70 call 6c84a5c0 call 6c84a4b0 * 2 call 6c84a5c0 call 6c84a4b0 call 6c84ab70 call 6c84a6f0 * 4 221->225 226 6c849b17-6c849b24 call 6c8448d0 224->226 227 6c849ae8-6c849b16 CryptReleaseContext call 6c8498c0 call 6c9a2cde 224->227 237 6c849b26-6c849b64 call 6c84a4e0 call 6c844930 CryptHashData 226->237 238 6c849b9f-6c849c25 call 6c844950 call 6c84a8a0 call 6c84a8f0 call 6c84a540 call 6c84aab0 call 6c8448d0 226->238 227->226 237->238 252 6c849b66-6c849b9e CryptDestroyHash CryptReleaseContext call 6c8498c0 call 6c9a2cde 237->252 273 6c849c97-6c849ccf call 6c84a4e0 call 6c844930 CryptHashData 238->273 274 6c849c27-6c849c96 call 6c84a500 call 6c84a580 call 6c84a540 call 6c84aab0 238->274 252->238 288 6c849cd1-6c849d09 CryptDestroyHash CryptReleaseContext call 6c8498c0 call 6c9a2cde 273->288 289 6c849d0a-6c849d36 CryptGetHashParam 273->289 274->273 288->289 294 6c849d71-6c849db3 call 6c84a6d0 call 6c844930 CryptGetHashParam 289->294 295 6c849d38-6c849d70 CryptDestroyHash CryptReleaseContext call 6c8498c0 call 6c9a2cde 289->295 314 6c849db5-6c849ded CryptDestroyHash CryptReleaseContext call 6c8498c0 call 6c9a2cde 294->314 315 6c849dee-6c849e93 CryptDestroyHash call 6c84a540 call 6c84a5c0 call 6c84a540 call 6c84aab0 294->315 295->294 314->315 315->221
                        APIs
                        • CryptAcquireContextW.ADVAPI32(00000000,00000000,00000000,00000001,F0000000), ref: 6C849A69
                        • std::bad_exception::bad_exception.LIBCMTD ref: 6C849A7E
                          • Part of subcall function 6C8498C0: std::exception::exception.LIBCONCRTD ref: 6C8498CE
                          • Part of subcall function 6C9A2CDE: RaiseException.KERNEL32(E06D7363,00000001,00000003,6C842B0C,?,?,?,?,6C842B0C,?,6CA2D624,?,?,6C8497EF), ref: 6C9A2D3F
                        • CryptCreateHash.ADVAPI32(00000000,00008003,00000000,00000000,00000000), ref: 6C849ADE
                        • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6C849AEE
                        • std::bad_exception::bad_exception.LIBCMTD ref: 6C849B00
                        • CryptHashData.ADVAPI32(?,?,?,00000000,?,6CA2D688,Failed to create hash object.), ref: 6C849B5C
                        • CryptDestroyHash.ADVAPI32(00000000), ref: 6C849B6A
                        • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6C849B76
                        • std::bad_exception::bad_exception.LIBCMTD ref: 6C849B88
                        • CryptHashData.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?), ref: 6C849CC7
                        • CryptDestroyHash.ADVAPI32(00000000), ref: 6C849CD5
                        • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6C849CE1
                        • std::bad_exception::bad_exception.LIBCMTD ref: 6C849CF3
                        • CryptGetHashParam.ADVAPI32(00000000,00000004,00000000,00000004,00000000), ref: 6C849D2E
                        • CryptDestroyHash.ADVAPI32(00000000), ref: 6C849D3C
                        • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6C849D48
                        • std::bad_exception::bad_exception.LIBCMTD ref: 6C849D5A
                        • CryptGetHashParam.ADVAPI32(?,00000002,?,00000000,00000000,00000000), ref: 6C849DAB
                        • CryptDestroyHash.ADVAPI32(00000000), ref: 6C849DB9
                        • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6C849DC5
                        • std::bad_exception::bad_exception.LIBCMTD ref: 6C849DD7
                        • CryptDestroyHash.ADVAPI32(00000000), ref: 6C849DF2
                        • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6C849E9E
                          • Part of subcall function 6C84A4B0: _DebugHeapAllocator.LIBCPMTD ref: 6C84A4C8
                        Strings
                        • Failed to create hash object., xrefs: 6C849AF5
                        • Failed to acquire cryptographic context., xrefs: 6C849A73
                        • Failed to hash data., xrefs: 6C849CE8
                        • Failed to get hash length., xrefs: 6C849D4F
                        • Failed to hash data., xrefs: 6C849B7D
                        • Failed to get hash value., xrefs: 6C849DCC
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Crypt$Hash$Context$Releasestd::bad_exception::bad_exception$Destroy$DataParam$AcquireAllocatorCreateDebugExceptionHeapRaisestd::exception::exception
                        • String ID: Failed to acquire cryptographic context.$Failed to create hash object.$Failed to get hash length.$Failed to get hash value.$Failed to hash data.$Failed to hash data.
                        • API String ID: 558081898-2481914407
                        • Opcode ID: c06db9260536769b238283b4f077732b46f59ebc2f6ad3a856b1c0467c2824ea
                        • Instruction ID: ae3b7aa9f390dfd6ff90f21ed062986f0e26cac144c763a8381ca6f43d2e9116
                        • Opcode Fuzzy Hash: c06db9260536769b238283b4f077732b46f59ebc2f6ad3a856b1c0467c2824ea
                        • Instruction Fuzzy Hash: 0E02C871904218AFDB24CF94DD94FEEB7B9BF59304F1085A9E20AA7650DB306A89CF50

                        Control-flow Graph

                        APIs
                          • Part of subcall function 6C8498F0: CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6C849930
                          • Part of subcall function 6C8498F0: std::bad_exception::bad_exception.LIBCMTD ref: 6C849942
                          • Part of subcall function 6C8498F0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,?,00000000,00000000,00000000), ref: 6C8499A8
                          • Part of subcall function 6C8498F0: std::bad_exception::bad_exception.LIBCMTD ref: 6C8499BA
                        • CryptAcquireContextW.ADVAPI32(00000000,00000000,00000000,00000001,F0000000), ref: 6C84A1C8
                        • std::bad_exception::bad_exception.LIBCMTD ref: 6C84A1DD
                        • CryptImportKey.ADVAPI32(00000000,00000008,00000014,00000000,00000000,00000000), ref: 6C84A257
                        • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6C84A267
                        • std::bad_exception::bad_exception.LIBCMTD ref: 6C84A279
                        • CryptSetKeyParam.ADVAPI32(?,00000001,?,00000000), ref: 6C84A2B0
                        • CryptDestroyKey.ADVAPI32(00000000), ref: 6C84A2BE
                        • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6C84A2CA
                        • std::bad_exception::bad_exception.LIBCMTD ref: 6C84A2DC
                        • CryptSetKeyParam.ADVAPI32(00000000,00000004,00000001,00000000), ref: 6C84A306
                        • CryptDestroyKey.ADVAPI32(00000000), ref: 6C84A314
                        • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6C84A320
                        • std::bad_exception::bad_exception.LIBCMTD ref: 6C84A332
                        • CryptDecrypt.ADVAPI32(?,00000000,00000001,00000000,?,6C9CB349,000000FF), ref: 6C84A38D
                        • CryptDestroyKey.ADVAPI32(00000000), ref: 6C84A39B
                        • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6C84A3A7
                        • std::bad_exception::bad_exception.LIBCMTD ref: 6C84A3B9
                        • CryptDestroyKey.ADVAPI32(00000000), ref: 6C84A3D4
                        • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6C84A3E0
                          • Part of subcall function 6C84A4B0: _DebugHeapAllocator.LIBCPMTD ref: 6C84A4C8
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Crypt$std::bad_exception::bad_exception$Context$Release$Destroy$BinaryParamString$AcquireAllocatorDebugDecryptHeapImport
                        • String ID: Failed to acquire cryptographic context.$Failed to decrypt data.$Failed to import key.$Failed to set IV.$Failed to set cipher mode.$Salted__
                        • API String ID: 580516112-4088208083
                        • Opcode ID: 1794138dd1f99257acb9930fee1a445558fed7943ec7d1fee086ce7b52c945a1
                        • Instruction ID: 9db42f927a5eab14a12fbc46c353edb5a7f0341256d0c15131c338b475e9cecb
                        • Opcode Fuzzy Hash: 1794138dd1f99257acb9930fee1a445558fed7943ec7d1fee086ce7b52c945a1
                        • Instruction Fuzzy Hash: 0AE1EB71910218DBDB24CFA4CD94FEEB774BF59304F1085A9E209BB690DB746A88CF60

                        Control-flow Graph

                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 6C85C94D
                        • Process32FirstW.KERNEL32(000000FF,0000022C), ref: 6C85C98E
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000104,00000000,00000000), ref: 6C85C9B5
                        • CloseHandle.KERNEL32(000000FF,?,?), ref: 6C85C9F5
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ByteCharCloseCreateFirstHandleMultiProcess32SnapshotToolhelp32Wide
                        • String ID:
                        • API String ID: 1100011785-0
                        • Opcode ID: a2bbbeb56795b7229a1c722e324868891feaa93973aa61085bbc3957d2d67867
                        • Instruction ID: 25aae31c1514f3fa27809ecebed85ec685a29b566234b1b9de14c72340c587af
                        • Opcode Fuzzy Hash: a2bbbeb56795b7229a1c722e324868891feaa93973aa61085bbc3957d2d67867
                        • Instruction Fuzzy Hash: 7721B275A04208BBDF10DBE4CD49FEE7BB8AB59705F104598E105B72C1D7706688CF60

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 6c88a8db-6c88a931 call 6c99fac1 call 6c871a91 GetDeviceCaps 5 6c88a949-6c88a951 0->5 6 6c88a933-6c88a93f 0->6 8 6c88a953-6c88a957 5->8 9 6c88a967-6c88a96f 5->9 6->5 7 6c88a941 6->7 7->5 8->9 10 6c88a959-6c88a961 call 6c87250e DeleteObject 8->10 11 6c88a971-6c88a975 9->11 12 6c88a985-6c88a98d 9->12 10->9 11->12 14 6c88a977-6c88a97f call 6c87250e DeleteObject 11->14 15 6c88a98f-6c88a993 12->15 16 6c88a9a3-6c88a9ab 12->16 14->12 15->16 21 6c88a995-6c88a99d call 6c87250e DeleteObject 15->21 17 6c88a9ad-6c88a9b1 16->17 18 6c88a9c1-6c88a9c9 16->18 17->18 23 6c88a9b3-6c88a9bb call 6c87250e DeleteObject 17->23 24 6c88a9cb-6c88a9cf 18->24 25 6c88a9df-6c88a9e7 18->25 21->16 23->18 24->25 29 6c88a9d1-6c88a9d9 call 6c87250e DeleteObject 24->29 30 6c88a9e9-6c88a9ed 25->30 31 6c88a9fd-6c88aa05 25->31 29->25 30->31 36 6c88a9ef-6c88a9f7 call 6c87250e DeleteObject 30->36 32 6c88aa1b-6c88aa23 31->32 33 6c88aa07-6c88aa0b 31->33 38 6c88aa39-6c88aa41 32->38 39 6c88aa25-6c88aa29 32->39 33->32 37 6c88aa0d-6c88aa15 call 6c87250e DeleteObject 33->37 36->31 37->32 45 6c88aa43-6c88aa47 38->45 46 6c88aa57-6c88aa5f 38->46 39->38 44 6c88aa2b-6c88aa33 call 6c87250e DeleteObject 39->44 44->38 45->46 51 6c88aa49-6c88aa51 call 6c87250e DeleteObject 45->51 47 6c88aa61-6c88aa65 46->47 48 6c88aa75-6c88aad2 call 6c88a29e call 6c9a29e0 GetTextCharsetInfo 46->48 47->48 52 6c88aa67-6c88aa6f call 6c87250e DeleteObject 47->52 62 6c88aad9-6c88aadd 48->62 63 6c88aad4-6c88aad7 48->63 51->46 52->48 64 6c88aae0-6c88ab06 lstrcpyW 62->64 65 6c88aadf 62->65 63->64 66 6c88ab08-6c88ab0f 64->66 67 6c88ab74-6c88abb5 CreateFontIndirectW call 6c8723b4 call 6c9b03a7 64->67 65->64 66->67 69 6c88ab11-6c88ab2b EnumFontFamiliesW 66->69 78 6c88abbc-6c88acc2 CreateFontIndirectW call 6c8723b4 call 6c88a29e CreateFontIndirectW call 6c8723b4 CreateFontIndirectW call 6c8723b4 CreateFontIndirectW call 6c8723b4 GetSystemMetrics lstrcpyW CreateFontIndirectW call 6c8723b4 GetStockObject 67->78 79 6c88abb7-6c88abb9 67->79 70 6c88ab2d-6c88ab40 lstrcpyW 69->70 71 6c88ab42-6c88ab5f EnumFontFamiliesW 69->71 70->67 73 6c88ab68 71->73 74 6c88ab61-6c88ab66 71->74 76 6c88ab6d-6c88ab6e lstrcpyW 73->76 74->76 76->67 92 6c88acc8-6c88acd7 GetObjectW 78->92 93 6c88ad92-6c88ad9f call 6c88b218 78->93 79->78 92->93 95 6c88acdd-6c88ad8d lstrcpyW CreateFontIndirectW call 6c8723b4 CreateFontIndirectW call 6c8723b4 GetObjectW CreateFontIndirectW call 6c8723b4 CreateFontIndirectW call 6c8723b4 92->95 98 6c88adca-6c88adcc 93->98 95->93 101 6c88adce-6c88adde call 6c85f050 98->101 102 6c88ada1-6c88ada8 98->102 110 6c88ade3-6c88adf3 call 6c871bea call 6c99fa70 101->110 103 6c88adaa-6c88adb4 call 6c863fb3 102->103 104 6c88adf4-6c88adf9 call 6c86dc83 102->104 103->98 117 6c88adb6-6c88adc6 103->117 117->98
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C88A8E5
                          • Part of subcall function 6C871A91: __EH_prolog3.LIBCMT ref: 6C871A98
                          • Part of subcall function 6C871A91: GetWindowDC.USER32(00000000,00000004,6C88AE60,00000000), ref: 6C871AC4
                        • GetDeviceCaps.GDI32(?,00000058), ref: 6C88A905
                        • DeleteObject.GDI32(00000000), ref: 6C88A961
                        • DeleteObject.GDI32(00000000), ref: 6C88A97F
                        • DeleteObject.GDI32(00000000), ref: 6C88A99D
                        • DeleteObject.GDI32(00000000), ref: 6C88A9BB
                        • DeleteObject.GDI32(00000000), ref: 6C88A9D9
                        • DeleteObject.GDI32(00000000), ref: 6C88A9F7
                        • DeleteObject.GDI32(00000000), ref: 6C88AA15
                        • DeleteObject.GDI32(00000000), ref: 6C88AA33
                        • DeleteObject.GDI32(00000000), ref: 6C88AA51
                        • DeleteObject.GDI32(00000000), ref: 6C88AA6F
                        • GetTextCharsetInfo.GDI32(?,00000000,00000000), ref: 6C88AAA7
                        • lstrcpyW.KERNEL32(?,?), ref: 6C88AAFC
                        • EnumFontFamiliesW.GDI32(?,00000000,6C88A140,Segoe UI), ref: 6C88AB23
                        • lstrcpyW.KERNEL32(?,Segoe UI), ref: 6C88AB36
                        • EnumFontFamiliesW.GDI32(?,00000000,6C88A140,Tahoma), ref: 6C88AB54
                        • lstrcpyW.KERNEL32(?,MS Sans Serif), ref: 6C88AB6E
                        • CreateFontIndirectW.GDI32(?), ref: 6C88AB78
                        • CreateFontIndirectW.GDI32(?), ref: 6C88ABC0
                        • CreateFontIndirectW.GDI32(?), ref: 6C88ABFF
                        • CreateFontIndirectW.GDI32(?), ref: 6C88AC2B
                        • CreateFontIndirectW.GDI32(?), ref: 6C88AC4C
                        • GetSystemMetrics.USER32(00000048), ref: 6C88AC6B
                        • lstrcpyW.KERNEL32(?,Marlett), ref: 6C88AC7E
                        • CreateFontIndirectW.GDI32(?), ref: 6C88AC88
                        • GetStockObject.GDI32(00000011), ref: 6C88ACB4
                        • GetObjectW.GDI32(00000000,0000005C,?), ref: 6C88ACCF
                        • lstrcpyW.KERNEL32(?,Arial), ref: 6C88AD10
                        • CreateFontIndirectW.GDI32(?), ref: 6C88AD1A
                        • CreateFontIndirectW.GDI32(?), ref: 6C88AD33
                        • GetObjectW.GDI32(?,0000005C,?), ref: 6C88AD51
                        • CreateFontIndirectW.GDI32(?), ref: 6C88AD5F
                        • CreateFontIndirectW.GDI32(?), ref: 6C88AD80
                          • Part of subcall function 6C88B218: __EH_prolog3_GS.LIBCMT ref: 6C88B21F
                          • Part of subcall function 6C88B218: GetTextMetricsW.GDI32(?,?), ref: 6C88B254
                          • Part of subcall function 6C88B218: GetTextMetricsW.GDI32(?,?), ref: 6C88B294
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Object$Font$CreateDeleteIndirect$lstrcpy$MetricsText$EnumFamiliesH_prolog3_$CapsCharsetDeviceH_prolog3InfoStockSystemWindow
                        • String ID: Arial$MS Sans Serif$Marlett$Segoe UI$Tahoma
                        • API String ID: 2837096512-1395034203
                        • Opcode ID: ac15cee56d8760e75e9d8e8bbceb971bba82f97d3ba583b4c4e471640ee2a7d6
                        • Instruction ID: 027c42b24d04a55b1379f22ef6ec28f8853fdcbee4a8545df297076297384c87
                        • Opcode Fuzzy Hash: ac15cee56d8760e75e9d8e8bbceb971bba82f97d3ba583b4c4e471640ee2a7d6
                        • Instruction Fuzzy Hash: 15E18370A05749DFDF219FB4CA58BDEB7B8BF05309F104969D41AB7A90EB34A588CB10

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 121 6c88adfa-6c88ae19 call 6c99fa8e GetSysColor 124 6c88ae2a 121->124 125 6c88ae1b-6c88ae25 GetSysColor 121->125 127 6c88ae2c-6c88ae3c GetSysColor 124->127 125->124 126 6c88ae27-6c88ae28 125->126 126->127 128 6c88ae3e-6c88ae48 GetSysColor 127->128 129 6c88ae4f 127->129 128->129 130 6c88ae4a-6c88ae4d 128->130 131 6c88ae51-6c88af88 call 6c871a91 GetDeviceCaps GetSysColor * 21 129->131 130->131 134 6c88af8a-6c88af91 131->134 135 6c88af93-6c88af9f GetSysColor 131->135 136 6c88afa5-6c88afbb GetSysColorBrush 134->136 135->136 137 6c88afc1-6c88afce GetSysColorBrush 136->137 138 6c88b212-6c88b217 call 6c86dc83 136->138 137->138 139 6c88afd4-6c88afe1 GetSysColorBrush 137->139 139->138 141 6c88afe7-6c88b132 call 6c8724bb CreateSolidBrush call 6c8723b4 call 6c8724bb CreateSolidBrush call 6c8723b4 call 6c8724bb CreateSolidBrush call 6c8723b4 call 6c8724bb CreateSolidBrush call 6c8723b4 call 6c8724bb CreateSolidBrush call 6c8723b4 call 6c8724bb CreateSolidBrush call 6c8723b4 call 6c8724bb CreateSolidBrush call 6c8723b4 call 6c8724bb CreatePen call 6c8723b4 call 6c8724bb CreatePen call 6c8723b4 call 6c8724bb CreatePen call 6c8723b4 139->141 183 6c88b141-6c88b148 141->183 184 6c88b134-6c88b138 141->184 186 6c88b14a-6c88b1ac CreateSolidBrush call 6c8723b4 183->186 187 6c88b1ae-6c88b1ba call 6c889d51 183->187 184->183 185 6c88b13a-6c88b13c call 6c8724bb 184->185 185->183 193 6c88b1f5-6c88b211 call 6c8b306e call 6c871bea call 6c99fa5c 186->193 187->138 194 6c88b1bc-6c88b1f0 call 6c8723b4 CreatePatternBrush call 6c8723b4 call 6c85f050 187->194 194->193
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C88AE01
                        • GetSysColor.USER32(00000016), ref: 6C88AE0A
                        • GetSysColor.USER32(0000000F), ref: 6C88AE1D
                        • GetSysColor.USER32(00000015), ref: 6C88AE34
                        • GetSysColor.USER32(0000000F), ref: 6C88AE40
                        • GetDeviceCaps.GDI32(?,0000000C), ref: 6C88AE68
                        • GetSysColor.USER32(0000000F), ref: 6C88AE76
                        • GetSysColor.USER32(00000010), ref: 6C88AE84
                        • GetSysColor.USER32(00000015), ref: 6C88AE92
                        • GetSysColor.USER32(00000016), ref: 6C88AEA0
                        • GetSysColor.USER32(00000014), ref: 6C88AEAE
                        • GetSysColor.USER32(00000012), ref: 6C88AEBC
                        • GetSysColor.USER32(00000011), ref: 6C88AECA
                        • GetSysColor.USER32(00000006), ref: 6C88AED5
                        • GetSysColor.USER32(0000000D), ref: 6C88AEE0
                        • GetSysColor.USER32(0000000E), ref: 6C88AEEB
                        • GetSysColor.USER32(00000005), ref: 6C88AEF6
                        • GetSysColor.USER32(00000008), ref: 6C88AF04
                        • GetSysColor.USER32(00000009), ref: 6C88AF0F
                        • GetSysColor.USER32(00000007), ref: 6C88AF1A
                        • GetSysColor.USER32(00000002), ref: 6C88AF25
                        • GetSysColor.USER32(00000003), ref: 6C88AF30
                        • GetSysColor.USER32(0000001B), ref: 6C88AF3E
                        • GetSysColor.USER32(0000001C), ref: 6C88AF4C
                        • GetSysColor.USER32(0000000A), ref: 6C88AF5A
                        • GetSysColor.USER32(0000000B), ref: 6C88AF68
                        • GetSysColor.USER32(00000013), ref: 6C88AF76
                        • GetSysColor.USER32(0000001A), ref: 6C88AF9F
                        • GetSysColorBrush.USER32(00000010), ref: 6C88AFB0
                        • GetSysColorBrush.USER32(00000014), ref: 6C88AFC3
                        • GetSysColorBrush.USER32(00000005), ref: 6C88AFD6
                        • CreateSolidBrush.GDI32(?), ref: 6C88AFF7
                        • CreateSolidBrush.GDI32(?), ref: 6C88B015
                        • CreateSolidBrush.GDI32(?), ref: 6C88B033
                        • CreateSolidBrush.GDI32(?), ref: 6C88B054
                        • CreateSolidBrush.GDI32(?), ref: 6C88B072
                        • CreateSolidBrush.GDI32(?), ref: 6C88B090
                        • CreateSolidBrush.GDI32(?), ref: 6C88B0AE
                        • CreatePen.GDI32(00000000,00000001,00000000), ref: 6C88B0D4
                        • CreatePen.GDI32(00000000,00000001,00000000), ref: 6C88B0F8
                        • CreatePen.GDI32(00000000,00000001,00000000), ref: 6C88B11C
                        • CreateSolidBrush.GDI32(?), ref: 6C88B19A
                        • CreatePatternBrush.GDI32(00000000), ref: 6C88B1D8
                          • Part of subcall function 6C8724BB: DeleteObject.GDI32(00000000), ref: 6C8724CA
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Color$BrushCreate$Solid$CapsDeleteDeviceH_prolog3ObjectPattern
                        • String ID:
                        • API String ID: 3754413814-0
                        • Opcode ID: 3ed9da48d3a5c7f05e0a7eb364fb6030dae902b542dbf93d6f398c49c17bd979
                        • Instruction ID: edd161e61faa0ab982cb6a55e3d44732cc908c63d2edf1b538e6ab38c8468b0a
                        • Opcode Fuzzy Hash: 3ed9da48d3a5c7f05e0a7eb364fb6030dae902b542dbf93d6f398c49c17bd979
                        • Instruction Fuzzy Hash: 09C1AFB0B00A12AFDF199FB4891879DBA70BF09705F104925F619E7A80DF78B565CBA0

                        Control-flow Graph

                        APIs
                        • GetFileAttributesA.KERNELBASE(00000000,?,?,C:\Users\Public\Bilite\), ref: 6C85CCCA
                        • SHGetFolderPathA.SHELL32(00000000,00000000,00000000,00000000,?,?,?,C:\Users\Public\Bilite\), ref: 6C85CCF9
                        • GetFileAttributesA.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,C:\Users\Public\Bilite\), ref: 6C85CDC6
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AttributesFile$FolderPath
                        • String ID: .lnk$C:\Users\Public\Bilite\
                        • API String ID: 1382956649-3663404336
                        • Opcode ID: 1817cc70aa06d9d01a9cf9e0c3e526e47fc957e19818dd3a5fa02518896b8add
                        • Instruction ID: c3939c09cdfd34b556826daee06f1fca666d200f0c20cabf86c1a4b412b4ed66
                        • Opcode Fuzzy Hash: 1817cc70aa06d9d01a9cf9e0c3e526e47fc957e19818dd3a5fa02518896b8add
                        • Instruction Fuzzy Hash: 90A18E70D04288EFDB10CFE8C944BEEBBB4AF59304F1485A8E115B7781DB756A48CBA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 490 6c87cbd5-6c87cbf7 EnterCriticalSection 491 6c87cc0d-6c87cc10 490->491 492 6c87cbf9-6c87cbfd 490->492 493 6c87cc12-6c87cc15 491->493 494 6c87cc3d-6c87cc3f 491->494 495 6c87cc03-6c87cc07 492->495 496 6c87cd12 492->496 493->496 497 6c87cc1b-6c87cc20 493->497 498 6c87cc40-6c87cc49 494->498 495->491 500 6c87ccce-6c87ccd4 495->500 499 6c87cd15-6c87cd20 LeaveCriticalSection call 6c86dc9d 496->499 501 6c87cc23-6c87cc26 497->501 504 6c87cc60-6c87cc6d GlobalHandle 498->504 505 6c87cc4b-6c87cc5e call 6c87a95f GlobalAlloc 498->505 502 6c87ccd6 500->502 503 6c87ccd9-6c87ccf3 LeaveCriticalSection 500->503 507 6c87cc30-6c87cc32 501->507 508 6c87cc28-6c87cc2e 501->508 502->503 510 6c87ccf4-6c87ccf7 504->510 511 6c87cc73-6c87cc8f GlobalUnlock call 6c87a95f GlobalReAlloc 504->511 519 6c87cc95-6c87cc97 505->519 507->500 513 6c87cc38-6c87cc3b 507->513 508->501 508->507 514 6c87cd0c-6c87cd10 510->514 515 6c87ccf9-6c87cd03 GlobalHandle 510->515 511->519 513->498 514->499 515->514 518 6c87cd05-6c87cd06 GlobalLock 515->518 518->514 519->510 521 6c87cc99-6c87cca7 GlobalLock 519->521 521->514 522 6c87cca9-6c87cccc call 6c9a29e0 521->522 522->500
                        APIs
                        • EnterCriticalSection.KERNEL32(6CA388F0,?,?,?,6CA388D4,6CA388D4,?,6C87CE3F,00000004,6C87B787,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87CBE6
                        • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,6CA388D4,6CA388D4,?,6C87CE3F,00000004,6C87B787,6C863ABF,6C87116D,?,6C876CE6,00000004), ref: 6C87CC58
                        • GlobalHandle.KERNEL32(6CA388E4), ref: 6C87CC62
                        • GlobalUnlock.KERNEL32(00000000), ref: 6C87CC74
                        • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 6C87CC8F
                        • GlobalLock.KERNEL32(00000000), ref: 6C87CC9A
                        • LeaveCriticalSection.KERNEL32(6CA388F0), ref: 6C87CCE7
                        • GlobalHandle.KERNEL32(6CA388E4), ref: 6C87CCFB
                        • GlobalLock.KERNEL32(00000000), ref: 6C87CD06
                        • LeaveCriticalSection.KERNEL32(6CA388F0,?,?,?,6CA388D4,6CA388D4,?,6C87CE3F,00000004,6C87B787,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87CD15
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
                        • String ID:
                        • API String ID: 2667261700-0
                        • Opcode ID: db6bc3868f351f6e9a7994568fba3331ea7525f6e3c29f896bb4a182f2938d9d
                        • Instruction ID: f7c74c9e99f3d08274706a4d09acbc02c94fee1c71adba9e4cfb566a71dc74ae
                        • Opcode Fuzzy Hash: db6bc3868f351f6e9a7994568fba3331ea7525f6e3c29f896bb4a182f2938d9d
                        • Instruction Fuzzy Hash: 1D41B071600619AFDB34DF68CA88B8DBBB8FF45305F21456AE415E7A41FB70E980CB60

                        Control-flow Graph

                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Yarn$LockitLockit::_std::_
                        • String ID: bad locale name
                        • API String ID: 360232963-1405518554
                        • Opcode ID: fb4d2e8516d4f8fe1cd74c3ebca52f4e8e847ef87f5a4028eb07967064ee71bf
                        • Instruction ID: 13b642151acdf8977248f5d03808838a4f8864eec597926534696d699e1e94c0
                        • Opcode Fuzzy Hash: fb4d2e8516d4f8fe1cd74c3ebca52f4e8e847ef87f5a4028eb07967064ee71bf
                        • Instruction Fuzzy Hash: 50215BB090918DDBCB14CF98DA50BAEBB71AF91308F148968D01237B81CB755A14C7A6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 547 6c9c9373-6c9c93a3 call 6c9c90c1 550 6c9c93be-6c9c93ca call 6c9b6cf6 547->550 551 6c9c93a5-6c9c93b0 call 6c9aede0 547->551 557 6c9c93cc-6c9c93e1 call 6c9aede0 call 6c9aedf3 550->557 558 6c9c93e3-6c9c942c call 6c9c902c 550->558 556 6c9c93b2-6c9c93b9 call 6c9aedf3 551->556 567 6c9c9698-6c9c969c 556->567 557->556 565 6c9c942e-6c9c9437 558->565 566 6c9c9499-6c9c94a2 GetFileType 558->566 569 6c9c946e-6c9c9494 GetLastError call 6c9aed99 565->569 570 6c9c9439-6c9c943d 565->570 571 6c9c94eb-6c9c94ee 566->571 572 6c9c94a4-6c9c94d5 GetLastError call 6c9aed99 CloseHandle 566->572 569->556 570->569 576 6c9c943f-6c9c946c call 6c9c902c 570->576 574 6c9c94f7-6c9c94fd 571->574 575 6c9c94f0-6c9c94f5 571->575 572->556 586 6c9c94db-6c9c94e6 call 6c9aedf3 572->586 579 6c9c9501-6c9c954f call 6c9b6c41 574->579 580 6c9c94ff 574->580 575->579 576->566 576->569 589 6c9c956e-6c9c9596 call 6c9c8dd6 579->589 590 6c9c9551-6c9c955d call 6c9c923b 579->590 580->579 586->556 596 6c9c9598-6c9c9599 589->596 597 6c9c959b-6c9c95dc 589->597 590->589 598 6c9c955f 590->598 599 6c9c9561-6c9c9569 call 6c9bdfc4 596->599 600 6c9c95fd-6c9c960b 597->600 601 6c9c95de-6c9c95e2 597->601 598->599 599->567 603 6c9c9696 600->603 604 6c9c9611-6c9c9615 600->604 601->600 602 6c9c95e4-6c9c95f8 601->602 602->600 603->567 604->603 606 6c9c9617-6c9c964a CloseHandle call 6c9c902c 604->606 610 6c9c964c-6c9c9678 GetLastError call 6c9aed99 call 6c9b6e09 606->610 611 6c9c967e-6c9c9692 606->611 610->611 611->603
                        APIs
                          • Part of subcall function 6C9C902C: CreateFileW.KERNELBASE(00000040,00000000,?,6C9C941C,?,?,00000000,?,6C9C941C,00000040,0000000C), ref: 6C9C9049
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C9C9487
                        • __dosmaperr.LIBCMT ref: 6C9C948E
                        • GetFileType.KERNELBASE(00000000), ref: 6C9C949A
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C9C94A4
                        • __dosmaperr.LIBCMT ref: 6C9C94AD
                        • CloseHandle.KERNEL32(00000000), ref: 6C9C94CD
                        • CloseHandle.KERNEL32(6C9C3A52), ref: 6C9C961A
                        • GetLastError.KERNEL32 ref: 6C9C964C
                        • __dosmaperr.LIBCMT ref: 6C9C9653
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                        • String ID:
                        • API String ID: 4237864984-0
                        • Opcode ID: 134c99cc303a1c070ad9b32cd99369ebd431002021560b4e02dedd15aa77d50f
                        • Instruction ID: 7390af13f736893c02249fb26d5c9b48b6bb538d40c500b6b24415c2f7dd6ee0
                        • Opcode Fuzzy Hash: 134c99cc303a1c070ad9b32cd99369ebd431002021560b4e02dedd15aa77d50f
                        • Instruction Fuzzy Hash: 4FA10132B082549FCF09CF68DC51BAE3BB5AB16328F19024DE811AB7D1C735D916CB92

                        Control-flow Graph

                        APIs
                          • Part of subcall function 6C844560: Sleep.KERNELBASE(00000064), ref: 6C8445D7
                          • Part of subcall function 6C85CF30: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 6C85CF63
                        • CreateThread.KERNELBASE(00000000,00000000,6C85CB40,00000000,00000000,00000000), ref: 6C85D28D
                        • CreateThread.KERNELBASE(00000000,00000000,6C85C920,00000000,00000000,00000000), ref: 6C85D2A3
                        • WaitForSingleObject.KERNEL32(00000000,00011170), ref: 6C85D2BB
                        • CloseHandle.KERNEL32(00000000), ref: 6C85D2CC
                          • Part of subcall function 6C85D000: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 6C85D033
                          • Part of subcall function 6C8539D0: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 6C8539EE
                          • Part of subcall function 6C85D0D0: GetModuleHandleA.KERNEL32(00000000), ref: 6C85D0E9
                          • Part of subcall function 6C84C5E0: GetTempPathA.KERNEL32(00000104,?), ref: 6C84C60A
                          • Part of subcall function 6C85C780: GetModuleHandleA.KERNEL32(6C85D37C), ref: 6C85C78A
                          • Part of subcall function 6C85C780: FindResourceW.KERNEL32(?,?,?), ref: 6C85C87A
                          • Part of subcall function 6C85C780: LoadResource.KERNEL32(?,00000000), ref: 6C85C895
                          • Part of subcall function 6C85C780: SizeofResource.KERNEL32(?,00000000), ref: 6C85C8A6
                          • Part of subcall function 6C85C780: LockResource.KERNEL32(?), ref: 6C85C8B3
                        • CreateThread.KERNEL32(00000000,00000000,6C853A20,00000000,00000000,00000000), ref: 6C85D38E
                          • Part of subcall function 6C85C030: WSAStartup.WS2_32(00000202,?), ref: 6C85C053
                          • Part of subcall function 6C85C030: getaddrinfo.WS2_32(?,?,?,00000000), ref: 6C85C108
                          • Part of subcall function 6C85C030: WSACleanup.WS2_32 ref: 6C85C117
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Module$Resource$CreateFileHandleNameThread$CleanupCloseFindLoadLockObjectPathSingleSizeofSleepStartupTempWaitgetaddrinfo
                        • String ID: IiViS$Update.dll
                        • API String ID: 3269629270-2501748675
                        • Opcode ID: f05765a68c901429abf0bef9b4d2b4b9452030159ef602718c43a23d23aa3993
                        • Instruction ID: 5927f638488f82981ae242315ae99805b514bae212f3cb1862544f0510b592a4
                        • Opcode Fuzzy Hash: f05765a68c901429abf0bef9b4d2b4b9452030159ef602718c43a23d23aa3993
                        • Instruction Fuzzy Hash: 57610871C00248BADB20DBE4ED55FEE7B746F60308F4488A8E50576B81EFB5665CCBA1

                        Control-flow Graph

                        APIs
                        • __RTC_Initialize.LIBCMT ref: 6C99F88E
                        • ___scrt_uninitialize_crt.LIBCMT ref: 6C99F8A8
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Initialize___scrt_uninitialize_crt
                        • String ID:
                        • API String ID: 2442719207-0
                        • Opcode ID: 34ff11fab9a5fb9e7bc593a4a626c3e8b9c76af662e5595f8dbd452e56d6f316
                        • Instruction ID: bb8703dcb7e836ce28f314da3add3f91f39baeee44ff55b8c220343b20d117c3
                        • Opcode Fuzzy Hash: 34ff11fab9a5fb9e7bc593a4a626c3e8b9c76af662e5595f8dbd452e56d6f316
                        • Instruction Fuzzy Hash: 8E41E572E05629BFCF108F95C800BEEB679EF6179DF18411AF82996B40D730CD458BA0

                        Control-flow Graph

                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8E0BA5
                          • Part of subcall function 6C87F682: EnterCriticalSection.KERNEL32(6CA38B60,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6B3
                          • Part of subcall function 6C87F682: InitializeCriticalSection.KERNEL32(00000000,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6C9
                          • Part of subcall function 6C87F682: LeaveCriticalSection.KERNEL32(6CA38B60,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6D7
                          • Part of subcall function 6C87F682: EnterCriticalSection.KERNEL32(00000000,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498,00000120), ref: 6C87F6E4
                        • GetProfileIntW.KERNEL32(windows,DragMinDist,00000002), ref: 6C8E0BF8
                        • GetProfileIntW.KERNEL32(windows,DragDelay,000000C8), ref: 6C8E0C0E
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterProfile$H_prolog3InitializeLeave
                        • String ID: DragDelay$DragMinDist$windows
                        • API String ID: 3965097884-2101198082
                        • Opcode ID: 76f58258c44757acdd2e9b78a78a752482f62b10761e840d4ee5f3bb2df5330e
                        • Instruction ID: f0357335ca93747c34b63a4f337d4c02f50c3235cc1d9ee4b69a707fb3b6b9ac
                        • Opcode Fuzzy Hash: 76f58258c44757acdd2e9b78a78a752482f62b10761e840d4ee5f3bb2df5330e
                        • Instruction Fuzzy Hash: 150148B1A00B009FDBB19F698A5574ABAF1BB69B04F40492DE14AD6F90E7789901CB44

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 750 6c9bead0-6c9beae0 751 6c9beafa-6c9beafc 750->751 752 6c9beae2-6c9beaf5 call 6c9aede0 call 6c9aedf3 750->752 753 6c9bee3c-6c9bee49 call 6c9aede0 call 6c9aedf3 751->753 754 6c9beb02-6c9beb08 751->754 766 6c9bee54 752->766 771 6c9bee4f call 6c9aaa38 753->771 754->753 756 6c9beb0e-6c9beb37 754->756 756->753 760 6c9beb3d-6c9beb46 756->760 764 6c9beb48-6c9beb5b call 6c9aede0 call 6c9aedf3 760->764 765 6c9beb60-6c9beb62 760->765 764->771 769 6c9bee38-6c9bee3a 765->769 770 6c9beb68-6c9beb6c 765->770 772 6c9bee57-6c9bee5a 766->772 769->772 770->769 774 6c9beb72-6c9beb76 770->774 771->766 774->764 777 6c9beb78-6c9beb8f 774->777 779 6c9beb91-6c9beb94 777->779 780 6c9bebc4-6c9bebca 777->780 783 6c9bebba-6c9bebc2 779->783 784 6c9beb96-6c9beb9c 779->784 781 6c9beb9e-6c9bebb5 call 6c9aede0 call 6c9aedf3 call 6c9aaa38 780->781 782 6c9bebcc-6c9bebd3 780->782 815 6c9bed6f 781->815 787 6c9bebd7-6c9bebf5 call 6c9b97a4 call 6c9b90b8 * 2 782->787 788 6c9bebd5 782->788 786 6c9bec37-6c9bec56 783->786 784->781 784->783 790 6c9bec5c-6c9bec68 786->790 791 6c9bed12-6c9bed1b call 6c9c589d 786->791 819 6c9bec12-6c9bec35 call 6c9bf061 787->819 820 6c9bebf7-6c9bec0d call 6c9aedf3 call 6c9aede0 787->820 788->787 790->791 795 6c9bec6e-6c9bec70 790->795 802 6c9bed1d-6c9bed2f 791->802 803 6c9bed8c 791->803 795->791 799 6c9bec76-6c9bec97 795->799 799->791 804 6c9bec99-6c9becaf 799->804 802->803 809 6c9bed31-6c9bed40 GetConsoleMode 802->809 807 6c9bed90-6c9beda6 ReadFile 803->807 804->791 810 6c9becb1-6c9becb3 804->810 813 6c9beda8-6c9bedae 807->813 814 6c9bee04-6c9bee0f GetLastError 807->814 809->803 816 6c9bed42-6c9bed46 809->816 810->791 811 6c9becb5-6c9becd8 810->811 811->791 818 6c9becda-6c9becf0 811->818 813->814 823 6c9bedb0 813->823 821 6c9bee28-6c9bee2b 814->821 822 6c9bee11-6c9bee23 call 6c9aedf3 call 6c9aede0 814->822 817 6c9bed72-6c9bed7c call 6c9b90b8 815->817 816->807 824 6c9bed48-6c9bed60 ReadConsoleW 816->824 817->772 818->791 826 6c9becf2-6c9becf4 818->826 819->786 820->815 833 6c9bed68-6c9bed6e call 6c9aed99 821->833 834 6c9bee31-6c9bee33 821->834 822->815 830 6c9bedb3-6c9bedc5 823->830 831 6c9bed62 GetLastError 824->831 832 6c9bed81-6c9bed8a 824->832 826->791 836 6c9becf6-6c9bed0d 826->836 830->817 840 6c9bedc7-6c9bedcb 830->840 831->833 832->830 833->815 834->817 836->791 844 6c9bedcd-6c9beddd call 6c9be7e2 840->844 845 6c9bede4-6c9bedf1 840->845 857 6c9bede0-6c9bede2 844->857 850 6c9bedfd-6c9bee02 call 6c9be628 845->850 851 6c9bedf3 call 6c9be939 845->851 855 6c9bedf8-6c9bedfb 850->855 851->855 855->857 857->817
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dff16564943a723df62e47d139e5f24f7323898414cdb9ed92c1d23e36e78f20
                        • Instruction ID: 71f3cd3d44793605079373fa4ba3373f9524554b8de5c1bb2fcf433824e1ae4c
                        • Opcode Fuzzy Hash: dff16564943a723df62e47d139e5f24f7323898414cdb9ed92c1d23e36e78f20
                        • Instruction Fuzzy Hash: B3B1E474A04259BFDB02CF98C850BAFBBB9BF56318F144198E415A7781C7B0D946CBE1

                        Control-flow Graph

                        APIs
                        • GetCommandLineW.KERNEL32(00000001), ref: 00851C61
                        • CommandLineToArgvW.SHELL32(00000000), ref: 00851C68
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00850000), ref: 00851CD3
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 00851CF3
                        • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,00850000,00000000,00000000,00000000,00852778,00000014), ref: 00851D25
                        Memory Dump Source
                        • Source File: 00000003.00000002.1695694382.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                        • Associated: 00000003.00000002.1695648911.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695714101.0000000000852000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695732256.0000000000853000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000854000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000896000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_850000_Update.jbxd
                        Similarity
                        • API ID: ByteCharCommandLineMultiWide$ArgvFreeLocal
                        • String ID:
                        • API String ID: 4060259846-0
                        • Opcode ID: 7fb8307ebf5cb2e10b6c4d992c6ca59a2a3d7e34590191712344aad8b5451b85
                        • Instruction ID: b4f7734ada17e34004304ca15f2afa09d2973027c2838e9d9983f14fdfe41657
                        • Opcode Fuzzy Hash: 7fb8307ebf5cb2e10b6c4d992c6ca59a2a3d7e34590191712344aad8b5451b85
                        • Instruction Fuzzy Hash: 0F319070605305ABEB10EF289C49B1BB7E4FF84712F10492DF956D72C1EA75AD088B62

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 894 6c99f8f5-6c99f906 call 6c99fb70 897 6c99f908-6c99f90e 894->897 898 6c99f917-6c99f91e 894->898 897->898 899 6c99f910-6c99f912 897->899 900 6c99f92a-6c99f93e dllmain_raw 898->900 901 6c99f920-6c99f923 898->901 902 6c99f9f0-6c99f9ff 899->902 904 6c99f944-6c99f955 dllmain_crt_dispatch 900->904 905 6c99f9e7-6c99f9ee 900->905 901->900 903 6c99f925-6c99f928 901->903 906 6c99f95b-6c99f96d call 6c90f70f 903->906 904->905 904->906 905->902 909 6c99f96f-6c99f971 906->909 910 6c99f996-6c99f998 906->910 909->910 911 6c99f973-6c99f991 call 6c90f70f call 6c99f847 dllmain_raw 909->911 912 6c99f99a-6c99f99d 910->912 913 6c99f99f-6c99f9b0 dllmain_crt_dispatch 910->913 911->910 912->905 912->913 913->905 915 6c99f9b2-6c99f9e4 dllmain_raw 913->915 915->905
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: dllmain_raw$dllmain_crt_dispatch
                        • String ID:
                        • API String ID: 3136044242-0
                        • Opcode ID: c0e8810465aa6001a33193cdc9ee32c35ac6b2e8599e72d1c87e0cbe070548fc
                        • Instruction ID: 68ab4850e54f9c5b92efe8471b99951d4316291186729ca43bccd949d746d1a4
                        • Opcode Fuzzy Hash: c0e8810465aa6001a33193cdc9ee32c35ac6b2e8599e72d1c87e0cbe070548fc
                        • Instruction Fuzzy Hash: 32218172E01659BFDF218F55C840AAFBA7DEBA1B9CF194115F82857B10D330CD418BA1
                        APIs
                        • GetModuleHandleW.KERNEL32(Shell32,?,?,6C85F2AC,YSS.AppID.NoVersion,00000000,6CA3B478,?,Function_0018AEC0,000000FF,?,6C84114D), ref: 6C878CEE
                        • GetProcAddress.KERNEL32(00000000,SetCurrentProcessExplicitAppUserModelID), ref: 6C878CFF
                        Strings
                        • SetCurrentProcessExplicitAppUserModelID, xrefs: 6C878CF9
                        • Shell32, xrefs: 6C878CE7
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: SetCurrentProcessExplicitAppUserModelID$Shell32
                        • API String ID: 1646373207-2658420654
                        • Opcode ID: 36d8b52fc7bba11c5a22396aaf70d4a52a429ead6c6c7899a14bfba1803e797e
                        • Instruction ID: ec33c6a7acaccd210454ad3d5573720f335ed7001c7d5adb4fefd7950d61a75d
                        • Opcode Fuzzy Hash: 36d8b52fc7bba11c5a22396aaf70d4a52a429ead6c6c7899a14bfba1803e797e
                        • Instruction Fuzzy Hash: 9AE04F71B05E55A78B249B65D90CC5E7F78DF956A6321853AF901E3A00DE30E840CAE4
                        APIs
                        • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003), ref: 6C88A39F
                        • VerSetConditionMask.KERNEL32(00000000), ref: 6C88A3A7
                        • VerifyVersionInfoW.KERNEL32(0000011C,00000003,00000000), ref: 6C88A3B8
                        • GetSystemMetrics.USER32(00001000), ref: 6C88A3C9
                          • Part of subcall function 6C88ADFA: __EH_prolog3.LIBCMT ref: 6C88AE01
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000016), ref: 6C88AE0A
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(0000000F), ref: 6C88AE1D
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000015), ref: 6C88AE34
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(0000000F), ref: 6C88AE40
                          • Part of subcall function 6C88ADFA: GetDeviceCaps.GDI32(?,0000000C), ref: 6C88AE68
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(0000000F), ref: 6C88AE76
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000010), ref: 6C88AE84
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000015), ref: 6C88AE92
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000016), ref: 6C88AEA0
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000014), ref: 6C88AEAE
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000012), ref: 6C88AEBC
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000011), ref: 6C88AECA
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000006), ref: 6C88AED5
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(0000000D), ref: 6C88AEE0
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(0000000E), ref: 6C88AEEB
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000005), ref: 6C88AEF6
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000008), ref: 6C88AF04
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000009), ref: 6C88AF0F
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000007), ref: 6C88AF1A
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000002), ref: 6C88AF25
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(00000003), ref: 6C88AF30
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(0000001B), ref: 6C88AF3E
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(0000001C), ref: 6C88AF4C
                          • Part of subcall function 6C88ADFA: GetSysColor.USER32(0000000A), ref: 6C88AF5A
                          • Part of subcall function 6C88A8DB: __EH_prolog3_GS.LIBCMT ref: 6C88A8E5
                          • Part of subcall function 6C88A8DB: GetDeviceCaps.GDI32(?,00000058), ref: 6C88A905
                          • Part of subcall function 6C88A8DB: DeleteObject.GDI32(00000000), ref: 6C88A961
                          • Part of subcall function 6C88A8DB: DeleteObject.GDI32(00000000), ref: 6C88A97F
                          • Part of subcall function 6C88A8DB: DeleteObject.GDI32(00000000), ref: 6C88A99D
                          • Part of subcall function 6C88A8DB: DeleteObject.GDI32(00000000), ref: 6C88A9BB
                          • Part of subcall function 6C88A8DB: DeleteObject.GDI32(00000000), ref: 6C88A9D9
                          • Part of subcall function 6C88A8DB: DeleteObject.GDI32(00000000), ref: 6C88A9F7
                          • Part of subcall function 6C88A8DB: DeleteObject.GDI32(00000000), ref: 6C88AA15
                          • Part of subcall function 6C88A8DB: DeleteObject.GDI32(00000000), ref: 6C88AA33
                          • Part of subcall function 6C88A4AE: GetSystemMetrics.USER32(00000031), ref: 6C88A4BC
                          • Part of subcall function 6C88A4AE: GetSystemMetrics.USER32(00000032), ref: 6C88A4CA
                          • Part of subcall function 6C88A4AE: SetRectEmpty.USER32(?), ref: 6C88A4DD
                          • Part of subcall function 6C88A4AE: EnumDisplayMonitors.USER32(00000000,00000000,6C88A2C4,?,?,00000000,6C88A3EA), ref: 6C88A4ED
                          • Part of subcall function 6C88A4AE: SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 6C88A4FC
                          • Part of subcall function 6C88A4AE: SystemParametersInfoW.USER32(00001002,00000000,?,00000000), ref: 6C88A529
                          • Part of subcall function 6C88A4AE: SystemParametersInfoW.USER32(00001012,00000000,?,00000000), ref: 6C88A53D
                          • Part of subcall function 6C88A4AE: SystemParametersInfoW.USER32 ref: 6C88A563
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Color$DeleteObject$System$Info$Parameters$Metrics$CapsConditionDeviceMask$DisplayEmptyEnumH_prolog3H_prolog3_MonitorsRectVerifyVersion
                        • String ID:
                        • API String ID: 2442922003-0
                        • Opcode ID: 73c8ecaafbcde9e431fd8d3b8a948e22acc5f9ba8d3ace0a19820890ae1cfc3e
                        • Instruction ID: e2c74f5f87aba90fed76d69768d451f9a82137fadd0f273ef1d2af96b4ff851d
                        • Opcode Fuzzy Hash: 73c8ecaafbcde9e431fd8d3b8a948e22acc5f9ba8d3ace0a19820890ae1cfc3e
                        • Instruction Fuzzy Hash: 8911CAB0A00318ABDB259F758D5AFEBB7BCEB89708F00445DE206A76C1CB745A458B90
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: __fread_nolock$Min_value
                        • String ID:
                        • API String ID: 3100174245-0
                        • Opcode ID: 69540fd15075f42c48b3ecf6efc8efd62ee66a9252466c8f0c774d105b5d3196
                        • Instruction ID: 98771c983f5b4a0530750e44cef410a0702dc18b33f2ca9f3d22b877725bcd93
                        • Opcode Fuzzy Hash: 69540fd15075f42c48b3ecf6efc8efd62ee66a9252466c8f0c774d105b5d3196
                        • Instruction Fuzzy Hash: A251C975E0010DEFDB14CF98CA90AEEB7B5BF48308F10C96AE915A7750DB70AA45DB90
                        APIs
                        • DeleteFileW.KERNELBASE(6C9AFD10,?,6C9AFD10,?), ref: 6C9BF20F
                        • GetLastError.KERNEL32(?,6C9AFD10,?), ref: 6C9BF219
                        • __dosmaperr.LIBCMT ref: 6C9BF220
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: DeleteErrorFileLast__dosmaperr
                        • String ID:
                        • API String ID: 1545401867-0
                        • Opcode ID: e8ca407ef79572cc5b62622fdfd9e3e84b40721d1bbff42dd76f19c27fff2519
                        • Instruction ID: 3bb040642d565d35acb48f77f556c48b8dffeaeec85172d52d621f7785b98406
                        • Opcode Fuzzy Hash: e8ca407ef79572cc5b62622fdfd9e3e84b40721d1bbff42dd76f19c27fff2519
                        • Instruction Fuzzy Hash: 39D0123A219A487B8F006AF6BC084177F7CAB9277D3280619F52DD5990DF35D4919690
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID:
                        • String ID: Score:
                        • API String ID: 0-2344496721
                        • Opcode ID: d7c496db8b075228a928f102ed1e1776b132ea1e07c066fc97bd1a11a9746072
                        • Instruction ID: 403773c094e757065d6a5211329b63a91067ab10d102efd8dd5a4ac336565d57
                        • Opcode Fuzzy Hash: d7c496db8b075228a928f102ed1e1776b132ea1e07c066fc97bd1a11a9746072
                        • Instruction Fuzzy Hash: F1514E74D0811DDBCB20CF98DA90A9DBB72BF94309F15CD55D819BBB01E731AA84CBA1
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 6C847740
                          • Part of subcall function 6C8435A0: std::_Lockit::_Lockit.LIBCPMT ref: 6C8435B6
                          • Part of subcall function 6C8435A0: std::_Lockit::~_Lockit.LIBCPMT ref: 6C8435E1
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 6C847803
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Lockitstd::_$Lockit::_Lockit::~_
                        • String ID:
                        • API String ID: 593203224-0
                        • Opcode ID: 2f0aa6b9dcd8ec3f7bf2600f2743e09f0de11ebef1e48ea9dc962eaaad717b19
                        • Instruction ID: 1c69d0781deadd8acd1c1df97ded8ae037fc717b27435c212c88f1ddc233837d
                        • Opcode Fuzzy Hash: 2f0aa6b9dcd8ec3f7bf2600f2743e09f0de11ebef1e48ea9dc962eaaad717b19
                        • Instruction Fuzzy Hash: 28316DB5D0020DDFCB14DF98CA50BEEB7B5BF59314F208A29D415A7780DB306A05CBA1
                        APIs
                        • __RTC_Initialize.LIBCMT ref: 6C99F78D
                          • Part of subcall function 6C9A07C2: InitializeSListHead.KERNEL32(6CA3A848,6C99F797,6CA2CB98,00000010,6C99F728,?,?,?,6C99F94E,?,00000001,?,?,00000001,?,6CA2CBE0), ref: 6C9A07C7
                        • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6C99F7F7
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                        • String ID:
                        • API String ID: 3231365870-0
                        • Opcode ID: 3053f510f2d0f3625f408f1eade7a813fa7d15a8fdeec709ac739ef6d113f135
                        • Instruction ID: c0fb7daa448edef2e9fa1ea5c25eac68fa731581866ef12ab6560a1642163d8c
                        • Opcode Fuzzy Hash: 3053f510f2d0f3625f408f1eade7a813fa7d15a8fdeec709ac739ef6d113f135
                        • Instruction Fuzzy Hash: BA2143312482429ADF005BF488047DCB7B1AF7272CF288199E04667EC1DB32E44AC665
                        APIs
                          • Part of subcall function 6C844310: Mailbox.LIBCMTD ref: 6C84436E
                        • Sleep.KERNELBASE(00000064), ref: 6C8445D7
                        Strings
                        • Game Over! Final Score: , xrefs: 6C8445E0
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MailboxSleep
                        • String ID: Game Over! Final Score:
                        • API String ID: 3547818576-1191702134
                        • Opcode ID: 8ec2feb927635eb718ba075536a9f76f867412c07f4a088c2f17eeed66f29270
                        • Instruction ID: cc94de920fd6a10a29bc3f0793e512c4e5b10e00196045fc46694e1b32faa3e5
                        • Opcode Fuzzy Hash: 8ec2feb927635eb718ba075536a9f76f867412c07f4a088c2f17eeed66f29270
                        • Instruction Fuzzy Hash: 8B1163B5D0410C9BDB10DF94EE41BDEB778AB54618F104E34E815A3B81E735AA08C6A2
                        APIs
                        • SetFilePointerEx.KERNELBASE(00000000,00000000,?,00008000,6C84F27C,00008000,6C9C3A52,?,?,?,6C9BF08A,6C9C3A52,?,00000000,6C84F27C,?), ref: 6C9BEFBC
                        • GetLastError.KERNEL32(00000000,?,?,?,6C9BF08A,6C9C3A52,?,00000000,6C84F27C,?,00000000,00008000,6C9C3A52,?,?,6C9C9390), ref: 6C9BEFC9
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ErrorFileLastPointer
                        • String ID:
                        • API String ID: 2976181284-0
                        • Opcode ID: d565ccda6a8dea4756ce0fb30dc989401978f6f5d7458b6e33e46d97cfcb800b
                        • Instruction ID: 5bcfc521ffafca448b6a2a17e75d3721133ad299cc1ca6f1d6385a50edbb7f73
                        • Opcode Fuzzy Hash: d565ccda6a8dea4756ce0fb30dc989401978f6f5d7458b6e33e46d97cfcb800b
                        • Instruction Fuzzy Hash: FE019633614559BFCF058F59CC0999F3B7DEF96324B244248F811AB6D0E671E9A18BD0
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Yarn
                        • String ID:
                        • API String ID: 1767336200-0
                        • Opcode ID: 87f291c98e7f01a6af98925635d0e9f891f09a57c5b0e2299b68c123ba61da2d
                        • Instruction ID: 21549719680a136b6f245c88974786ef94c851897530573615701ff5353cbe80
                        • Opcode Fuzzy Hash: 87f291c98e7f01a6af98925635d0e9f891f09a57c5b0e2299b68c123ba61da2d
                        • Instruction Fuzzy Hash: A3E065223082457BEB0C5675AC52BF733D9EB65569F10012EEC6B9AEC0EE20EC088654
                        APIs
                        • RtlFreeHeap.NTDLL(00000000,00000000,?,6C9C5FF1,?,00000000,?,?,6C9C6292,?,00000007,?,?,6C9C3D2B,?,?), ref: 6C9B90CE
                        • GetLastError.KERNEL32(?,?,6C9C5FF1,?,00000000,?,?,6C9C6292,?,00000007,?,?,6C9C3D2B,?,?), ref: 6C9B90D9
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 485612231-0
                        • Opcode ID: 81f4d92024160c05644f4d88130647d99c4980bc592bfd4a4d84bdaf4e5880d3
                        • Instruction ID: b8de159edee769438db80c6320c5c9e245e1482044229d28f4b42b5f914cd83b
                        • Opcode Fuzzy Hash: 81f4d92024160c05644f4d88130647d99c4980bc592bfd4a4d84bdaf4e5880d3
                        • Instruction Fuzzy Hash: E0E08C32204614ABCB211BE1A808B8A3AB8AB1339AF214124F608E6660CF35E591C7D8
                        APIs
                          • Part of subcall function 00851721: GetModuleHandleW.KERNEL32(00000000,008511DF,00850000,00000000,00000000,00000000,00852778,00000014), ref: 00851723
                        • _c_exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00851227
                        • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000007,00852778,00000014), ref: 00851256
                        Memory Dump Source
                        • Source File: 00000003.00000002.1695694382.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                        • Associated: 00000003.00000002.1695648911.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695714101.0000000000852000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695732256.0000000000853000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000854000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000896000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_850000_Update.jbxd
                        Similarity
                        • API ID: HandleModule_c_exit_exit
                        • String ID:
                        • API String ID: 750871209-0
                        • Opcode ID: 16fa93b7bc53292110ca8a16250e65417d72c628d38c51941cfc6685c9766e0c
                        • Instruction ID: 239bbfca79ce7705426114fe16aa386567287fdde593388196b1095f3217d0bd
                        • Opcode Fuzzy Hash: 16fa93b7bc53292110ca8a16250e65417d72c628d38c51941cfc6685c9766e0c
                        • Instruction Fuzzy Hash: 6FE08632D042498FCF10DBACD80A3DCB771FB45366F100555DD21E3291D73518198651
                        APIs
                        • GetLastError.KERNEL32(00000000,?,6C9AEDF8,6C9B9144,?,?,6C9B9506,00000001,00000364,?,FFFFFFFF,000000FF,?,?,6C9A5A34), ref: 6C9B960E
                        • SetLastError.KERNEL32(00000000,6C84458B,00000000,?,?,?,?,?,?,?,?,?,?,?,6C9CB00D,000000FF), ref: 6C9B96B0
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID:
                        • API String ID: 1452528299-0
                        • Opcode ID: 0acb0af11bc69448058209ea727dcaf258a62552be0bc98b3faca6452e312407
                        • Instruction ID: 2d257fa44d6a83a4d7d4d23d5d4523c007718e0c4952fb3b1d6bcef3c497f67f
                        • Opcode Fuzzy Hash: 0acb0af11bc69448058209ea727dcaf258a62552be0bc98b3faca6452e312407
                        • Instruction Fuzzy Hash: D1110831368716BEE7112AB98CC8E9B367CAB7236DB120234F918F1AD0DB71C80941A5
                        APIs
                        • CloseHandle.KERNELBASE(00000000,?,00000000,?,6C9BDFE3,6C9C9566,?,00000000,00000000), ref: 6C9BE04A
                        • GetLastError.KERNEL32(?,00000000,?,6C9BDFE3,6C9C9566,?,00000000,00000000), ref: 6C9BE054
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CloseErrorHandleLast
                        • String ID:
                        • API String ID: 918212764-0
                        • Opcode ID: 4394d0cdb7b425e15dc98fa33f29cc6c78e7d046435f8391ce1120d259ba51be
                        • Instruction ID: 90d83dd8a4475b9da31409684f683251fc8888c924042876dc4c78955874016c
                        • Opcode Fuzzy Hash: 4394d0cdb7b425e15dc98fa33f29cc6c78e7d046435f8391ce1120d259ba51be
                        • Instruction Fuzzy Hash: 0711063260C214BAD719067898487AF37BD5F93B3CF29028DE919F6AC1DB74E88182D0
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fd2121022140d84460d37c7b2ba2723f84e74984b545aa74e59a965483263e9e
                        • Instruction ID: d2e363061cbdc4a05eadbe5cc7321447097dcc7a70882d07d9b3413c51601d8d
                        • Opcode Fuzzy Hash: fd2121022140d84460d37c7b2ba2723f84e74984b545aa74e59a965483263e9e
                        • Instruction Fuzzy Hash: 1E51A470A04205FFDB18CF58CC84A9ABFB5EF55318F148158E808AB751D772ED55CB90
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: fpos
                        • String ID:
                        • API String ID: 1083263101-0
                        • Opcode ID: 33874e5d7c851dd2faab9ef3d2a80b10c07f522cd938180c23faad2d1b9274a6
                        • Instruction ID: e2b389966a11f61857bf8a0bafbe3bf78302cfa13fdbd42d137cd2875dee427b
                        • Opcode Fuzzy Hash: 33874e5d7c851dd2faab9ef3d2a80b10c07f522cd938180c23faad2d1b9274a6
                        • Instruction Fuzzy Hash: A1416D7090014CEBDB24DF98DE50FEEB7B5BF40304F508A68A5166BAD0DB716E49CB90
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: fpos
                        • String ID:
                        • API String ID: 1083263101-0
                        • Opcode ID: ae1d8795e23fd11922058b9f80ffecddf38b4d25827b55aedc2aeb502e1b7cca
                        • Instruction ID: 31eb528edc70a6a324f94b39bb9a36d1034cd6329b09484652fb6a0975482a26
                        • Opcode Fuzzy Hash: ae1d8795e23fd11922058b9f80ffecddf38b4d25827b55aedc2aeb502e1b7cca
                        • Instruction Fuzzy Hash: 9341FBB5E00109EFCB04CF98DA91AEEBBB1FF49314F248659E515AB790C7716E01CBA1
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8895EE
                          • Part of subcall function 6C88A342: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003), ref: 6C88A39F
                          • Part of subcall function 6C88A342: VerSetConditionMask.KERNEL32(00000000), ref: 6C88A3A7
                          • Part of subcall function 6C88A342: VerifyVersionInfoW.KERNEL32(0000011C,00000003,00000000), ref: 6C88A3B8
                          • Part of subcall function 6C88A342: GetSystemMetrics.USER32(00001000), ref: 6C88A3C9
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ConditionMask$H_prolog3InfoMetricsSystemVerifyVersion
                        • String ID:
                        • API String ID: 2710481357-0
                        • Opcode ID: c19f903a26ca6ae6299807ff5e396d70ac0147ea3fc1349c6a0398fee7a3452b
                        • Instruction ID: 778d5cad5c9e9f8f3596a3dfa90d6d893efc66c9adbb824599b662293c153283
                        • Opcode Fuzzy Hash: c19f903a26ca6ae6299807ff5e396d70ac0147ea3fc1349c6a0398fee7a3452b
                        • Instruction Fuzzy Hash: DA51BDB0946F418ED3A9CF3A85417C6FAE0BF89300F108A2E91AED6660EB7161848F55
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: __wsopen_s
                        • String ID:
                        • API String ID: 3347428461-0
                        • Opcode ID: a28b246fbe17eedf870b760c87b8060edd5ad4950d3d10150d8fa49320fb40c5
                        • Instruction ID: 544a5b9513c69f6ea062ea66e9a7e31cf5a2cb0fc1c42498e0d2e5840807b4d0
                        • Opcode Fuzzy Hash: a28b246fbe17eedf870b760c87b8060edd5ad4950d3d10150d8fa49320fb40c5
                        • Instruction Fuzzy Hash: BA115871A0420AABCF05CF58E8449DB3BF8EB48314F058059F809AB341D630E921CBA6
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C87CDFF
                          • Part of subcall function 6C87CAC8: TlsAlloc.KERNEL32(?,6C87CE2B,00000004,6C87B787,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498,00000120,6C85F296,00000000,6CA3B478,?,Function_0018AEC0), ref: 6C87CAE7
                          • Part of subcall function 6C87CAC8: InitializeCriticalSection.KERNEL32(6CA388F0,?,6C87CE2B,00000004,6C87B787,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498,00000120,6C85F296,00000000,6CA3B478), ref: 6C87CAF8
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AllocCriticalH_prolog3InitializeSection
                        • String ID:
                        • API String ID: 2369468792-0
                        • Opcode ID: 1b0924d44ef4819ac18330f2b965637fb696baec22cb7587ad90e73d16f28c99
                        • Instruction ID: b6a2b28028bd981835ebc1258c6b0af402fa0d0de804af6a91fd967dfe84d85a
                        • Opcode Fuzzy Hash: 1b0924d44ef4819ac18330f2b965637fb696baec22cb7587ad90e73d16f28c99
                        • Instruction Fuzzy Hash: 7901B172B017068BDB34AFB8C95469DB770AF01398B344936A814DBB91FF30DA44C761
                        APIs
                        • RtlAllocateHeap.NTDLL(00000008,?,?,?,6C9B9506,00000001,00000364,?,FFFFFFFF,000000FF,?,?,6C9A5A34,?,6C84458B,00000000), ref: 6C9B9133
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: b3b8965e6a8d9c35647ff76c09be16b5c493f0691405800e75e18452fdbcddcf
                        • Instruction ID: 5c0408c88083d7292a4f6eb689085ac1ab3c41f8ff1310323e27b98b4c21f652
                        • Opcode Fuzzy Hash: b3b8965e6a8d9c35647ff76c09be16b5c493f0691405800e75e18452fdbcddcf
                        • Instruction Fuzzy Hash: 4EF0B43166A52577EB115A66880CBAB377CAF73B68F238111E81CF7A80DB30D60166E1
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,00001000,?,?,6C861C78,00001000,?,?,?,6C842B8C,00001000,?,6C84982D,00001000), ref: 6C9B97D6
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: 62c8f6de831884990cfb370fd904a81deea56a2823a6ed0f1d5843b59e28d971
                        • Instruction ID: 16b6bdfebd04752979d9a2749b90b1aa11a3f7e329e3dbbd32a9a8c1aabe617b
                        • Opcode Fuzzy Hash: 62c8f6de831884990cfb370fd904a81deea56a2823a6ed0f1d5843b59e28d971
                        • Instruction Fuzzy Hash: CFE03031655A2177E7111E69ACD4B8B37FC9B76FA8B224210D814B6980DB70D80141E1
                        APIs
                        • CreateFileW.KERNELBASE(00000040,00000000,?,6C9C941C,?,?,00000000,?,6C9C941C,00000040,0000000C), ref: 6C9C9049
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: 733d90e1f13bf15cf5885ab2cb86660ea0d5571bc90106a6487b01e6ef4cdc41
                        • Instruction ID: e730be73a769770d73c0a11dce0fec610b7c051a5b9f55bfa24d6aba7adad92d
                        • Opcode Fuzzy Hash: 733d90e1f13bf15cf5885ab2cb86660ea0d5571bc90106a6487b01e6ef4cdc41
                        • Instruction Fuzzy Hash: AED06C3210010DBBDF028E84DC06EDA3BBAFB48714F154000BA1866020C732E861AB90
                        APIs
                        • TCGamerUpdateMain.UPDATE(?,?), ref: 0085100B
                        Memory Dump Source
                        • Source File: 00000003.00000002.1695694382.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                        • Associated: 00000003.00000002.1695648911.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695714101.0000000000852000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695732256.0000000000853000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000854000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000896000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_850000_Update.jbxd
                        Similarity
                        • API ID: GamerMainUpdate
                        • String ID:
                        • API String ID: 3533789159-0
                        • Opcode ID: 0dc032e54f475a4c8a862538ffc73d883b9d6e7095286aea5a65631e74e2db75
                        • Instruction ID: 801d6bf8f2f3a9994866699c0b074b9900116f8f1744d07f70f4810265a68a7f
                        • Opcode Fuzzy Hash: 0dc032e54f475a4c8a862538ffc73d883b9d6e7095286aea5a65631e74e2db75
                        • Instruction Fuzzy Hash: 9EB09B7655020C678B44DADCDC41D55739C5648651B404014BD0C8B241D535F55447A1
                        APIs
                        • DeleteObject.GDI32(00000000), ref: 6C8724CA
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: DeleteObject
                        • String ID:
                        • API String ID: 1531683806-0
                        • Opcode ID: 6abf0febc82f7219087c7dcf360eb35eaf840a02b24775c5e8757bd19d32ad68
                        • Instruction ID: 7df9ea134cd4b98159d3fe9826c590c1aded4de6302e322c1bfc5c78b9ec2326
                        • Opcode Fuzzy Hash: 6abf0febc82f7219087c7dcf360eb35eaf840a02b24775c5e8757bd19d32ad68
                        • Instruction Fuzzy Hash: C6B092A0905509EEEF709A348B0C30B35756B4131AF248CA8A004A2541EB3DD186C520
                        APIs
                          • Part of subcall function 6C85C940: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 6C85C94D
                        • Sleep.KERNELBASE(00000BB8,?), ref: 6C85CBD9
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CreateSleepSnapshotToolhelp32
                        • String ID:
                        • API String ID: 684154974-0
                        • Opcode ID: bc2835a530f804d9d6e4d505944a530119a6f2b102b2bc6d4fca1834ead31c2e
                        • Instruction ID: a45855832954dbdda5211c9d1c09ff3659291c0399206f3a1a29d84e906ba31f
                        • Opcode Fuzzy Hash: bc2835a530f804d9d6e4d505944a530119a6f2b102b2bc6d4fca1834ead31c2e
                        • Instruction Fuzzy Hash: 5B11B2B1D0514CABCF54DFACCA50BEDB778AB59714F608668D416A3B81DB306B08CB52
                        APIs
                        • Sleep.KERNELBASE(00011D28), ref: 6C85C928
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Sleep
                        • String ID:
                        • API String ID: 3472027048-0
                        • Opcode ID: 10ae152dd301a0a9ced2e75307d1d596c628069aa044c9f62c71532a3f14c1ce
                        • Instruction ID: 475c0814a3286b40beccd4dd402ab8117683f96d725c49b2f89167650ab09582
                        • Opcode Fuzzy Hash: 10ae152dd301a0a9ced2e75307d1d596c628069aa044c9f62c71532a3f14c1ce
                        • Instruction Fuzzy Hash: 91B0127124820C17070096EA680684277EC8B556613400021B30886000D46160904075
                        APIs
                        • GetDlgItem.USER32(?,00003020), ref: 6C880ACE
                        • GetDlgItem.USER32(?,00003020), ref: 6C880AF9
                        • GetWindowRect.USER32(00000000,?), ref: 6C880B0D
                        • MapDialogRect.USER32(?,?), ref: 6C880B30
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000016), ref: 6C880B5A
                        • GetDlgItem.USER32(?,00000001), ref: 6C880B6B
                        • GetWindowRect.USER32(00000000,?), ref: 6C880B7D
                        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000015,?), ref: 6C880BA1
                        • GetWindowRect.USER32(?,?), ref: 6C880BB6
                        • GetWindowRect.USER32(?,?), ref: 6C880C14
                        • GetDlgItem.USER32(?,00000001), ref: 6C880C26
                        • GetWindowRect.USER32(00000000,?), ref: 6C880C35
                        • GetDlgItem.USER32(?,00000001), ref: 6C880C5E
                        • ShowWindow.USER32(00000000,00000000), ref: 6C880C6D
                        • EnableWindow.USER32(00000000,00000000), ref: 6C880C76
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$Rect$Item$DialogEnableShow
                        • String ID:
                        • API String ID: 763981185-0
                        • Opcode ID: 89d3fedaa6127e8491fd81813a06b82eabb61653cde150fdaf819af6dfafdd1b
                        • Instruction ID: e2d5a4368d78ecea9f18c72c29c921140cecfaf9142cf9bdaafd2dd2d68a37d9
                        • Opcode Fuzzy Hash: 89d3fedaa6127e8491fd81813a06b82eabb61653cde150fdaf819af6dfafdd1b
                        • Instruction Fuzzy Hash: 9A514071A05649AFEB20DFB5CE88EBFBBB9FF49704F100518F545B2551DB31A9808B20
                        APIs
                        • SetRectEmpty.USER32(?), ref: 6C8970A7
                        • RedrawWindow.USER32(?,00000000,00000000,00000505,?,?), ref: 6C8970C5
                        • ReleaseCapture.USER32 ref: 6C8970CB
                        • SetCapture.USER32(?,?,?), ref: 6C8970DE
                        • ReleaseCapture.USER32 ref: 6C89716B
                        • SetCapture.USER32(?), ref: 6C89717E
                        • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 6C897272
                        • UpdateWindow.USER32(?), ref: 6C8972FE
                        • SendMessageW.USER32(?,00000111,00000000,00000000), ref: 6C89734D
                        • IsWindow.USER32(?), ref: 6C897359
                        • IsIconic.USER32(?), ref: 6C897364
                        • IsZoomed.USER32(?), ref: 6C89736F
                        • IsWindow.USER32(?), ref: 6C89738D
                        • UpdateWindow.USER32(?), ref: 6C8973E9
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$Capture$MessageReleaseSendUpdate$EmptyIconicRectRedrawZoomed
                        • String ID:
                        • API String ID: 2500574155-0
                        • Opcode ID: 27ca43366fce666aeddf958e1940d4ccb4f7716a8cc6618b9178ba1c41fe593b
                        • Instruction ID: 0f9045044f35b1e40bd4f9729cd2e761d09fc8bff35d8e68ec59f83f66fcaaba
                        • Opcode Fuzzy Hash: 27ca43366fce666aeddf958e1940d4ccb4f7716a8cc6618b9178ba1c41fe593b
                        • Instruction Fuzzy Hash: 48C1C031700A159FCF159F69C994AAD3BB6FF49328F144679FC1AAB791CB30A8418F90
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Cleanup$Startupgetaddrinfosocket
                        • String ID:
                        • API String ID: 2560534018-0
                        • Opcode ID: d88ad5c332838011f744b3f9aefe05bd03e5fe7002af698107465a9d59ce8393
                        • Instruction ID: e5255f0ba761d4f725fa02287e3d19eb67f4b110431512f708f6c392aebfcf10
                        • Opcode Fuzzy Hash: d88ad5c332838011f744b3f9aefe05bd03e5fe7002af698107465a9d59ce8393
                        • Instruction Fuzzy Hash: 94817FB5A04609DFCB28DFE8E958BADB7B5BB4E308F108618E109E7381C770A945CF54
                        APIs
                          • Part of subcall function 6C864227: GetParent.USER32(?), ref: 6C864231
                        • ScreenToClient.USER32(?,?), ref: 6C8877E4
                        • GetKeyState.USER32(00000001), ref: 6C887855
                        • GetKeyState.USER32(00000001), ref: 6C8878B0
                        • IsWindow.USER32(?), ref: 6C887971
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: State$ClientParentScreenWindow
                        • String ID: 0
                        • API String ID: 1527269598-4108050209
                        • Opcode ID: b7f9ec8bf93e12d3f7289c6906c94f40e6bf4d783849d81c9c91f057222fec62
                        • Instruction ID: 35bbfa990864f3358772c042d86a38827bb14dc7600134f57c8b4939b5da844f
                        • Opcode Fuzzy Hash: b7f9ec8bf93e12d3f7289c6906c94f40e6bf4d783849d81c9c91f057222fec62
                        • Instruction Fuzzy Hash: 9D61D430B06619DBDF209F65CA84BADBBB1FF49718F140529F811A7F80EB74A841CB81
                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6C87847C,6C877999,00000003,?,00000004,6C877999), ref: 6C87EDF6
                        • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 6C87EE06
                        • EncodePointer.KERNEL32(00000000,?,6C87847C,6C877999,00000003,?,00000004,6C877999), ref: 6C87EE0F
                        • DecodePointer.KERNEL32(00000000,?,?,6C87847C,6C877999,00000003,?,00000004,6C877999), ref: 6C87EE1D
                        • GetLocaleInfoW.KERNEL32(00000000,00000004,?,00000003,?,6C87847C,6C877999,00000003,?,00000004,6C877999), ref: 6C87EE54
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeHandleInfoLocaleModuleProc
                        • String ID: GetLocaleInfoEx$kernel32.dll
                        • API String ID: 1461536855-1547310189
                        • Opcode ID: fc78fa007b600a30cebf124821f2f3a9a56bb3d91e4b133dce0830649686a61c
                        • Instruction ID: 8bae1c20039bfe4e42ca8b4ba0e30a514ae3945926bb82d21f042cd2449900bd
                        • Opcode Fuzzy Hash: fc78fa007b600a30cebf124821f2f3a9a56bb3d91e4b133dce0830649686a61c
                        • Instruction Fuzzy Hash: 69016236605A1AEFCF225FA5CD0889E3F79FF0A7567144C25FD15E2510EB31E8909BA0
                        APIs
                        • __EH_prolog3_catch_GS.LIBCMT ref: 6C8E229B
                          • Part of subcall function 6C871A91: __EH_prolog3.LIBCMT ref: 6C871A98
                          • Part of subcall function 6C871A91: GetWindowDC.USER32(00000000,00000004,6C88AE60,00000000), ref: 6C871AC4
                        • CreateCompatibleDC.GDI32(00000000), ref: 6C8E22C1
                        • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C8E22E7
                          • Part of subcall function 6C872A4C: SelectObject.GDI32(00000048,?), ref: 6C872A55
                        • FillRect.USER32(?,?,00000000), ref: 6C8E2339
                        • OpenClipboard.USER32(?), ref: 6C8E2393
                        • EmptyClipboard.USER32 ref: 6C8E23D3
                        • SetClipboardData.USER32(00000002,00000000), ref: 6C8E23F7
                        • CloseClipboard.USER32 ref: 6C8E2411
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Clipboard$CompatibleCreate$BitmapCloseDataEmptyFillH_prolog3H_prolog3_catch_ObjectOpenRectSelectWindow
                        • String ID:
                        • API String ID: 2940850299-0
                        • Opcode ID: b67f830f51226375672b9835dc2c687e29c8f9ee1bb23c03e1fafed77d076e2b
                        • Instruction ID: edb4c02cf8351ef9e6f7146cbc84ba6a012f787b40d1c617ea858ea26579f0e1
                        • Opcode Fuzzy Hash: b67f830f51226375672b9835dc2c687e29c8f9ee1bb23c03e1fafed77d076e2b
                        • Instruction Fuzzy Hash: D9419471904215ABCF24DBE9CE489DEBB79AF09318F108525E415B7AA0EB349A08CB70
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C88EB96
                        • PathIsUNCW.SHLWAPI(?,?,?,?,6C8DA239,00000024,?,?,?), ref: 6C88EC46
                        • GetVolumeInformationW.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000,?,6C8DA239,00000024,?,?,?), ref: 6C88EC6A
                        • GetFullPathNameW.KERNEL32(?,00000104,?,?,00000268,6C88E390,?,?,00000000,?,6C8DA239,00000024,?,?,?), ref: 6C88EBC9
                          • Part of subcall function 6C88EB4A: GetLastError.KERNEL32(?,?,?,6C88EC7B,?,?,?,6C8DA239,00000024,?,?,?), ref: 6C88EB56
                          • Part of subcall function 6C88E407: PathStripToRootW.SHLWAPI(00000000,?,?,6C8DA239,00000024,?,?,?), ref: 6C88E43B
                        • CharUpperW.USER32(?,?,6C8DA239,00000024,?,?,?), ref: 6C88EC98
                        • FindFirstFileW.KERNEL32(?,?,?,6C8DA239,00000024,?,?,?), ref: 6C88ECB0
                        • FindClose.KERNEL32(00000000,?,6C8DA239,00000024,?,?,?), ref: 6C88ECBC
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Path$Find$CharCloseErrorFileFirstFullH_prolog3_InformationLastNameRootStripUpperVolume
                        • String ID:
                        • API String ID: 2323451338-0
                        • Opcode ID: 03249ae10b69252e794b6568a000609571df9337f170092bf7aebc54471d7906
                        • Instruction ID: 77c0c16264a5e8aef51fd240009aead3b0340d4621cc5b5bf748ee270bc7d5e2
                        • Opcode Fuzzy Hash: 03249ae10b69252e794b6568a000609571df9337f170092bf7aebc54471d7906
                        • Instruction Fuzzy Hash: 3E41AA75905115ABDB249F68CE88EEFB37CEF10318F504EA5A415E2E40EB34ED458BA1
                        APIs
                        • CryptStringToBinaryA.CRYPT32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 6C849930
                        • std::bad_exception::bad_exception.LIBCMTD ref: 6C849942
                          • Part of subcall function 6C8498C0: std::exception::exception.LIBCONCRTD ref: 6C8498CE
                          • Part of subcall function 6C9A2CDE: RaiseException.KERNEL32(E06D7363,00000001,00000003,6C842B0C,?,?,?,?,6C842B0C,?,6CA2D624,?,?,6C8497EF), ref: 6C9A2D3F
                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,?,00000000,00000000,00000000), ref: 6C8499A8
                        • std::bad_exception::bad_exception.LIBCMTD ref: 6C8499BA
                        Strings
                        • Failed to decode base64 string., xrefs: 6C8499B2
                        • Failed to calculate base64 decoded size., xrefs: 6C84993A
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: BinaryCryptStringstd::bad_exception::bad_exception$ExceptionRaisestd::exception::exception
                        • String ID: Failed to calculate base64 decoded size.$Failed to decode base64 string.
                        • API String ID: 2976706698-2878110109
                        • Opcode ID: 44dc020992a4cc986a195dc876eda2e78eea6d8957f85f368eb0154ecde170db
                        • Instruction ID: 8aea2cb29e55e803db165c2ecd580fd6bb9125d9fb1535be105ef39684bf8af9
                        • Opcode Fuzzy Hash: 44dc020992a4cc986a195dc876eda2e78eea6d8957f85f368eb0154ecde170db
                        • Instruction Fuzzy Hash: 0531FC7090020CABDB24DF94DA91FEEB7B9EF44744F108528E515B7A80DB74AA49CB94
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 6C87594C
                        • EqualRect.USER32(?,00000000), ref: 6C87596A
                          • Part of subcall function 6C86926E: SetWindowPos.USER32(?,?,?,7CCA8F6A,6C86962D,?,6C869CCC,00000000,?,6C86CE6F,00000000,00000000,00000000,00000000,00000000,00000097), ref: 6C869296
                        • IsWindowVisible.USER32(?), ref: 6C875A25
                        • CopyRect.USER32(?,?), ref: 6C875A65
                        • GetParent.USER32(?), ref: 6C875B47
                        • SetParent.USER32(?,?), ref: 6C875B5D
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: RectWindow$Parent$CopyEqualVisible
                        • String ID:
                        • API String ID: 3103310903-0
                        • Opcode ID: 304aea2528197ee8f84f279627343276dec5ea0467d81c56856c6b660422688c
                        • Instruction ID: 5ef57a3f50b342c60aafe99c84df34ab26d4b14ce4a5772301256a1a7b45dc6c
                        • Opcode Fuzzy Hash: 304aea2528197ee8f84f279627343276dec5ea0467d81c56856c6b660422688c
                        • Instruction Fuzzy Hash: 4381D671A05719ABDF348F38CD98BEEB779BF44318F1406A9E819D7A80DB349D448B60
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 6C87631C
                        • EqualRect.USER32(?,?), ref: 6C87633A
                          • Part of subcall function 6C86926E: SetWindowPos.USER32(?,?,?,7CCA8F6A,6C86962D,?,6C869CCC,00000000,?,6C86CE6F,00000000,00000000,00000000,00000000,00000000,00000097), ref: 6C869296
                        • GetDlgCtrlID.USER32(?), ref: 6C8763E6
                        • CopyRect.USER32(?,?), ref: 6C876422
                        • GetParent.USER32(?), ref: 6C876503
                        • SetParent.USER32(?,?), ref: 6C876519
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$ParentWindow$CopyCtrlEqual
                        • String ID:
                        • API String ID: 1662903855-0
                        • Opcode ID: 4a426d251bed6ea224e4c78ef8df837f0a4f491ac0f7ee6fc3f78e7975e6ff53
                        • Instruction ID: 0466cb01627af3d1f31e9f8ae2e1f979cdc130ccba7631734d494dcef2a5ba35
                        • Opcode Fuzzy Hash: 4a426d251bed6ea224e4c78ef8df837f0a4f491ac0f7ee6fc3f78e7975e6ff53
                        • Instruction Fuzzy Hash: 1C81C271601619ABCF34DF68CD88BEEB7B9BF05308F1446B9E819D7A50DB34A944CB60
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 008515DC
                        • memset.VCRUNTIME140(?,00000000,00000003), ref: 00851602
                        • memset.VCRUNTIME140(?,00000000,00000050), ref: 0085168C
                        • IsDebuggerPresent.KERNEL32 ref: 008516A8
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 008516C8
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 008516D2
                        Memory Dump Source
                        • Source File: 00000003.00000002.1695694382.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                        • Associated: 00000003.00000002.1695648911.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695714101.0000000000852000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695732256.0000000000853000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000854000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000896000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_850000_Update.jbxd
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandledmemset$DebuggerFeatureProcessor
                        • String ID:
                        • API String ID: 1045392073-0
                        • Opcode ID: 4427cc37bd13768664d8080fbe5677725e7f3436e20b3509237ae7a7bc620baf
                        • Instruction ID: ae79712a41f7d58d23d648dd12adf643fd900ba5d2463c2d1da7d404001043e7
                        • Opcode Fuzzy Hash: 4427cc37bd13768664d8080fbe5677725e7f3436e20b3509237ae7a7bc620baf
                        • Instruction Fuzzy Hash: F1310875D022189BDF21DFA4D9897CDBBF8BF18305F10419AE409AB250EB745A88CF05
                        APIs
                        • GetClientRect.USER32(?,?), ref: 6C8700F0
                        • InflateRect.USER32(?,?,?), ref: 6C87010C
                        • BeginDeferWindowPos.USER32(?), ref: 6C870180
                        • InvalidateRect.USER32(?,00000000,00000001,00000018,00000008,00000000,0000EA20), ref: 6C8701EF
                        • EndDeferWindowPos.USER32(00000000), ref: 6C8703ED
                          • Part of subcall function 6C868EAD: GetDlgItem.USER32(?,?), ref: 6C868EBE
                          • Part of subcall function 6C86F153: GetClientRect.USER32(?,?), ref: 6C86F175
                          • Part of subcall function 6C86F153: GetParent.USER32(?), ref: 6C86F18E
                          • Part of subcall function 6C86F153: GetClientRect.USER32(?,?), ref: 6C86F1BD
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Client$DeferWindow$BeginInflateInvalidateItemParent
                        • String ID:
                        • API String ID: 939197390-0
                        • Opcode ID: e277e8bc3ce03c6e9bb859110ac8b1dcdf583e8a3029fcfd893807dc4ac7a2fb
                        • Instruction ID: c4979213f229821aa46ebb1571eaed977a853aa129a6b50a1e9ee6d20987093e
                        • Opcode Fuzzy Hash: e277e8bc3ce03c6e9bb859110ac8b1dcdf583e8a3029fcfd893807dc4ac7a2fb
                        • Instruction Fuzzy Hash: 32B13671E00649EFDB25CFA8C980BEDFBB6FF48304F144629E519A7640EB31A955CB60
                        APIs
                          • Part of subcall function 6C9B94B9: GetLastError.KERNEL32(?,?,6C9A5A34,?,6C84458B,00000000), ref: 6C9B94BD
                          • Part of subcall function 6C9B94B9: SetLastError.KERNEL32(00000000,6C84458B,00000000,?,?,?,?,?,?,?,?,?,?,?,6C9CB00D,000000FF), ref: 6C9B955F
                        • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 6C9C763F
                        • IsValidCodePage.KERNEL32(00000000), ref: 6C9C767D
                        • IsValidLocale.KERNEL32(?,00000001), ref: 6C9C7690
                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 6C9C76D8
                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 6C9C76F3
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                        • String ID:
                        • API String ID: 415426439-0
                        • Opcode ID: fb982d74304a3e73efa37c14f243dba08b64a67af17c519773360462c4404602
                        • Instruction ID: 73f2ac8b93c5f16c77ed1c1086842bd3c4e12f0f2272b8a4a9bf18d0079739b8
                        • Opcode Fuzzy Hash: fb982d74304a3e73efa37c14f243dba08b64a67af17c519773360462c4404602
                        • Instruction Fuzzy Hash: 0F516F71B01209ABEF10DFA9CD40AAE77BCBF69748F104469A515E7540EB70D944CB63
                        APIs
                          • Part of subcall function 6C9B94B9: GetLastError.KERNEL32(?,?,6C9A5A34,?,6C84458B,00000000), ref: 6C9B94BD
                          • Part of subcall function 6C9B94B9: SetLastError.KERNEL32(00000000,6C84458B,00000000,?,?,?,?,?,?,?,?,?,?,?,6C9CB00D,000000FF), ref: 6C9B955F
                        • GetACP.KERNEL32(?,?,?,?,?,?,6C9BB226,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 6C9C6C81
                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,6C9BB226,?,?,?,00000055,?,-00000050,?,?), ref: 6C9C6CB8
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 6C9C6E1B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ErrorLast$CodeInfoLocalePageValid
                        • String ID: utf8
                        • API String ID: 607553120-905460609
                        • Opcode ID: 23949b55ca4ffba1c6ba4c3fe95af3734c3a893e619492e4077c7e1273e597c7
                        • Instruction ID: 3ebed6ff14172db512b29895689235d62c57b20743a2824be67dbbe60c2e9f8f
                        • Opcode Fuzzy Hash: 23949b55ca4ffba1c6ba4c3fe95af3734c3a893e619492e4077c7e1273e597c7
                        • Instruction Fuzzy Hash: AF712831B44602AAE7149B75CC41BFB73BCEF65708F20452AE615DBA80EB74E544C7A3
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e65742e894918bf4e86fc2b9ed42b1f87a8ffac3a49cef3bbaea6e76e472994b
                        • Instruction ID: 7b183d5c15f71f6d851b27117a7bb150ceca7c4949d498acd6aef788609d12c9
                        • Opcode Fuzzy Hash: e65742e894918bf4e86fc2b9ed42b1f87a8ffac3a49cef3bbaea6e76e472994b
                        • Instruction Fuzzy Hash: C3024C71E012199BDB14CFE9C8906AEFBF5FF48318F248269D919E7740D731AA16CB90
                        APIs
                          • Part of subcall function 6C868F23: GetWindowLongW.USER32(?,000000EC), ref: 6C868F30
                        • GetAsyncKeyState.USER32(00000011), ref: 6C8A2A73
                        • GetClientRect.USER32(?,?), ref: 6C8A2C15
                        • SetScrollPos.USER32(00000000,00000002,?,00000001), ref: 6C8A2D03
                          • Part of subcall function 6C89FF7E: GetClientRect.USER32(?,?), ref: 6C89FFB8
                          • Part of subcall function 6C89FF7E: InflateRect.USER32(?,00000000,00000000), ref: 6C89FFF2
                          • Part of subcall function 6C89FF7E: SetRectEmpty.USER32(?), ref: 6C8A0096
                          • Part of subcall function 6C89FF7E: SetRectEmpty.USER32(?), ref: 6C8A00A3
                          • Part of subcall function 6C89FF7E: GetSystemMetrics.USER32(00000002), ref: 6C8A00C8
                          • Part of subcall function 6C89FF7E: EqualRect.USER32(?,?), ref: 6C8A0195
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$ClientEmpty$AsyncEqualInflateLongMetricsScrollStateSystemWindow
                        • String ID:
                        • API String ID: 3234605627-0
                        • Opcode ID: 5b279f5c510ae26da35aa92a9adfecc7d1887b9c28b6195b0520264af64759bf
                        • Instruction ID: 9de28c78ef3c1f1e18bbe0102644030922d461bd160ada7f3cfe56a733c8c5eb
                        • Opcode Fuzzy Hash: 5b279f5c510ae26da35aa92a9adfecc7d1887b9c28b6195b0520264af64759bf
                        • Instruction Fuzzy Hash: B2C1053070161ACBDF358FA685987BC77B1AF49309F104579D909ABB91CF38AC478B80
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(00000017,00000001), ref: 6C9A0619
                        • IsDebuggerPresent.KERNEL32 ref: 6C9A06E5
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6C9A06FE
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 6C9A0708
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                        • String ID:
                        • API String ID: 254469556-0
                        • Opcode ID: 494f08a9ae901cdece626648c16a30a6459cf3bee974caad72674e8b6e0144dc
                        • Instruction ID: af6b1c6560c093da704570ce6adf482cfbb2a0cc456305d62a9f38a29aae16a7
                        • Opcode Fuzzy Hash: 494f08a9ae901cdece626648c16a30a6459cf3bee974caad72674e8b6e0144dc
                        • Instruction Fuzzy Hash: 7A311475D062589BDF20DFA4C9897CDBBB8AF18704F1041AAE50DAB250EB709A858F44
                        APIs
                          • Part of subcall function 6C868F77: GetWindowLongW.USER32(?,000000F0), ref: 6C868F84
                        • GetKeyState.USER32(00000010), ref: 6C8651CA
                        • GetKeyState.USER32(00000011), ref: 6C8651D7
                        • GetKeyState.USER32(00000012), ref: 6C8651E4
                        • SendMessageW.USER32(?,00000111,0000E146,00000000), ref: 6C8651FE
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: State$LongMessageSendWindow
                        • String ID:
                        • API String ID: 1063413437-0
                        • Opcode ID: 684c582e59a96fb376fe048d152b21396336f0eca47ff324122097068b8230eb
                        • Instruction ID: 5cbba7dadc8ea73ef8c3ea9c7d24dcffe3ba6cc24b7e6b19856c2e977006cece
                        • Opcode Fuzzy Hash: 684c582e59a96fb376fe048d152b21396336f0eca47ff324122097068b8230eb
                        • Instruction Fuzzy Hash: 52F0B43538674927EB3026368D05BAA34719F06B84F010D6CE612FBEC1DFB0845142A0
                        APIs
                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 6C9AA934
                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 6C9AA93E
                        • UnhandledExceptionFilter.KERNEL32(-00000325,?,?,?,?,?,00000000), ref: 6C9AA94B
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: 522fd7d873c4f83dd7e180bbc3d001c9bcda8bcf83c46de0497b17d577d9deb2
                        • Instruction ID: 4b8eaab6028143ca071b6f828f640acdaa85f7138f389ce9cb05381f60ab4579
                        • Opcode Fuzzy Hash: 522fd7d873c4f83dd7e180bbc3d001c9bcda8bcf83c46de0497b17d577d9deb2
                        • Instruction Fuzzy Hash: 6A31D5759012189BCB21DF68C8887CDBBB8BF18354F6081DAE41CA7250EB309F868F44
                        APIs
                        • SendMessageW.USER32(?,00000111,?,?), ref: 6C86F4ED
                        • IsIconic.USER32(?), ref: 6C86F509
                        • IsWindowVisible.USER32(?), ref: 6C86F516
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: IconicMessageSendVisibleWindow
                        • String ID:
                        • API String ID: 2733464030-0
                        • Opcode ID: 04b8e7d8ebb431a7b82b29bdfa3c8596112cd4c55e78371822a64672c9814042
                        • Instruction ID: 51059072bcc7af18b7e7a7c1221b6e9114a6c979866e9c888af28b8dc6a65534
                        • Opcode Fuzzy Hash: 04b8e7d8ebb431a7b82b29bdfa3c8596112cd4c55e78371822a64672c9814042
                        • Instruction Fuzzy Hash: 28012F32304014AB8F115F3ADD08EADBB7AFF86394B208435FC08D6E20EF20D8118B80
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Parent$Iconic
                        • String ID:
                        • API String ID: 344791563-0
                        • Opcode ID: 232efa5f0c0b0b58a6948d0fb4641347e237eb15dc13c76426d1d265d33d066c
                        • Instruction ID: fe93481b6aeba29cc77a1292144344d757c7d1cb9412ecedadbb81fee812b8d1
                        • Opcode Fuzzy Hash: 232efa5f0c0b0b58a6948d0fb4641347e237eb15dc13c76426d1d265d33d066c
                        • Instruction Fuzzy Hash: 3CF0C832606714A7DB3116BA891496A36B4BF54A55B504D35F446EBF10EF30D8008B60
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: IconicVisibleWindow
                        • String ID:
                        • API String ID: 1797901696-0
                        • Opcode ID: c8610ac06a135089974ed714139ba4c1087362b7048ca7a61a2b884dbf8b8950
                        • Instruction ID: 2a3cedea54c951aaa1c75215d7bff5edc663660e6780842d820d6673ec734f18
                        • Opcode Fuzzy Hash: c8610ac06a135089974ed714139ba4c1087362b7048ca7a61a2b884dbf8b8950
                        • Instruction Fuzzy Hash: 7FF0E233325420679614273E8E409BDB2AEDB8A239B140736E920A3DE0EBA0985162D0
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Iconic
                        • String ID:
                        • API String ID: 110040809-0
                        • Opcode ID: ae61d9bc3f3a67bbddf150f62448e2d58743a527dcb9578f9a72bcd0b166389c
                        • Instruction ID: 2f21997846bb5af65ddbd3e028d2d071a782c0d47191bb8433da94017362f187
                        • Opcode Fuzzy Hash: ae61d9bc3f3a67bbddf150f62448e2d58743a527dcb9578f9a72bcd0b166389c
                        • Instruction Fuzzy Hash: F7D0C931119AA0CBC7315A36A5447C6B3B4AB05319F100D6AD042A6E70E7B0A8C5CA40
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_00001770,008510D3), ref: 00851769
                        Memory Dump Source
                        • Source File: 00000003.00000002.1695694382.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                        • Associated: 00000003.00000002.1695648911.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695714101.0000000000852000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695732256.0000000000853000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000854000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000896000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_850000_Update.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 143c368aa2d63480fa3976632d58375b42aca81e52845730e37fb2eda847107f
                        • Instruction ID: 58078b1a2cfce99546d3b60ff2fff0edbb4a34753bc572e9f26be37ef5df7345
                        • Opcode Fuzzy Hash: 143c368aa2d63480fa3976632d58375b42aca81e52845730e37fb2eda847107f
                        • Instruction Fuzzy Hash:
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C87BAE7
                          • Part of subcall function 6C86D33C: __EH_prolog3.LIBCMT ref: 6C86D343
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 6C87BB5F
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 6C87BB92
                        • CopyRect.USER32(?,?), ref: 6C87BBB9
                        • GetObjectW.GDI32(?,00000018,?), ref: 6C87BBE6
                        • GetSystemMetrics.USER32(00000032), ref: 6C87BC03
                        • GetSystemMetrics.USER32(00000031), ref: 6C87BC0E
                        • GetSysColor.USER32(00000004), ref: 6C87BC4E
                        • CreateCompatibleDC.GDI32(00000000), ref: 6C87BC68
                        • CopyRect.USER32(?,?), ref: 6C87BCBC
                        • GetSysColor.USER32(0000000D), ref: 6C87BCCD
                        • GetSysColor.USER32(00000010), ref: 6C87BCED
                        • GetSysColor.USER32(00000014), ref: 6C87BCF7
                        • GetSysColor.USER32(0000000D), ref: 6C87BD2D
                        • GetSysColor.USER32(00000007), ref: 6C87BEA2
                        • ExtTextOutW.GDI32(00000001,?,?,00000002,00000000,?,?,00000000), ref: 6C87BEE7
                        • CreateCompatibleDC.GDI32(00000000), ref: 6C87BF4C
                        • InflateRect.USER32(00000000,000000FF,000000FF), ref: 6C87BF75
                        • BitBlt.GDI32(00000003,00000000,?,?,?,?,00000000,00000000,00CC0020), ref: 6C87BF94
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Color$Rect$CompatibleCopyCreateInfoItemMenuMetricsSystem$H_prolog3H_prolog3_InflateObjectText
                        • String ID: @
                        • API String ID: 364174344-2766056989
                        • Opcode ID: 1533f32d4ed7d37a50ce073dcd944b56cddf643b6937eac8a764a7415ca411f6
                        • Instruction ID: 6beb1bc87c4eaf89c54b495350d4bcec88b79d2dbf3b148bb126833cbfe61159
                        • Opcode Fuzzy Hash: 1533f32d4ed7d37a50ce073dcd944b56cddf643b6937eac8a764a7415ca411f6
                        • Instruction Fuzzy Hash: 37F15971A006189FDF24CFA8CD88BEDBBB5FF08314F148569E905BB690DB74A945CB60
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C8E44BB
                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,6C9DF5FC,00000000,6C9ED894,00000000,6C9DC6EC,00000000,?,?,00000A88,6C8E56FD,?,00000000,00000038), ref: 6C8E455A
                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,6C9DC6EC,00000000,?,?,00000A88,6C8E56FD,?,00000000,00000038), ref: 6C8E460D
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: File$CreateH_prolog3_ModuleName
                        • String ID:
                        • API String ID: 3408945735-3916222277
                        • Opcode ID: aa4f64d1776dce3a799be6594fea5f3462d82e28365ee769c7f66abc220930a8
                        • Instruction ID: aa5996e3e9a0012602c6d8dc2886fe99a54352a67e686398422eefdb28e3b29e
                        • Opcode Fuzzy Hash: aa4f64d1776dce3a799be6594fea5f3462d82e28365ee769c7f66abc220930a8
                        • Instruction Fuzzy Hash: E6C13071A00628AFDF319B64CD44FEE7778EF8A314F1049A9E909E2950DB749E84CF61
                        APIs
                        • RegisterWindowMessageW.USER32(Native), ref: 6C99F248
                        • RegisterWindowMessageW.USER32(OwnerLink), ref: 6C99F255
                        • RegisterWindowMessageW.USER32(ObjectLink), ref: 6C99F263
                        • RegisterWindowMessageW.USER32(Embedded Object), ref: 6C99F271
                        • RegisterWindowMessageW.USER32(Embed Source), ref: 6C99F27F
                        • RegisterWindowMessageW.USER32(Link Source), ref: 6C99F28D
                        • RegisterWindowMessageW.USER32(Object Descriptor), ref: 6C99F29B
                        • RegisterWindowMessageW.USER32(Link Source Descriptor), ref: 6C99F2A9
                        • RegisterWindowMessageW.USER32(FileName), ref: 6C99F2B7
                        • RegisterWindowMessageW.USER32(FileNameW), ref: 6C99F2C5
                        • RegisterWindowMessageW.USER32(Rich Text Format), ref: 6C99F2D3
                        • RegisterWindowMessageW.USER32(RichEdit Text and Objects), ref: 6C99F2E1
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageRegisterWindow
                        • String ID: Embed Source$Embedded Object$FileName$FileNameW$Link Source$Link Source Descriptor$Native$Object Descriptor$ObjectLink$OwnerLink$Rich Text Format$RichEdit Text and Objects
                        • API String ID: 1814269913-2889995556
                        • Opcode ID: 8a9c35830264f6c95c1284f667ff3cef8b4ea92690f896bb29db2ab7aa2b81ad
                        • Instruction ID: f71dde706bf3f49cf66d08b18bbb6df8492fcc629bd207e80466dc01fea71809
                        • Opcode Fuzzy Hash: 8a9c35830264f6c95c1284f667ff3cef8b4ea92690f896bb29db2ab7aa2b81ad
                        • Instruction Fuzzy Hash: DC115976B04B009FCF649FB1BA0C4467BF0BB0EB55B184D59F196A6A12D734A0C0CF54
                        APIs
                          • Part of subcall function 6C868F23: GetWindowLongW.USER32(?,000000EC), ref: 6C868F30
                        • GetClientRect.USER32(00000000,?), ref: 6C8A5B7B
                        • CopyRect.USER32(?,?), ref: 6C8A5BA8
                          • Part of subcall function 6C872981: ScreenToClient.USER32(?,?), ref: 6C872990
                          • Part of subcall function 6C872981: ScreenToClient.USER32(?,?), ref: 6C87299D
                        • IntersectRect.USER32(?,?,?), ref: 6C8A5BFB
                        • SetRectEmpty.USER32(?), ref: 6C8A5C09
                        • IntersectRect.USER32(?,?,?), ref: 6C8A5C32
                        • SetRectEmpty.USER32(?), ref: 6C8A5C40
                        • IsRectEmpty.USER32(?), ref: 6C8A5C4A
                        • IsRectEmpty.USER32(?), ref: 6C8A5C58
                        • GetWindowRect.USER32(00000000,?), ref: 6C8A5C7A
                        • GetWindowRect.USER32(00000000,?), ref: 6C8A5C9D
                        • UnionRect.USER32(?,?,?), ref: 6C8A5CB9
                        • EqualRect.USER32(?,?), ref: 6C8A5CC7
                        • GetWindowRect.USER32(00000000,?), ref: 6C8A5D5B
                        • IsRectEmpty.USER32(?), ref: 6C8A5DBC
                        • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 6C8A5DD8
                        • RedrawWindow.USER32(00000000,?,00000000,00000185,?,?), ref: 6C8A5DEC
                        • IsRectEmpty.USER32(?), ref: 6C8A5E00
                        • EqualRect.USER32(?,?), ref: 6C8A5E12
                        • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 6C8A5E2E
                        • RedrawWindow.USER32(00000000,?,00000000,00000185,?,?), ref: 6C8A5E42
                        • UpdateWindow.USER32(00000000), ref: 6C8A5E51
                        • IsRectEmpty.USER32(?), ref: 6C8A5E99
                        • InvalidateRect.USER32(00000000,?,00000001,?,?), ref: 6C8A5EAC
                        • IsRectEmpty.USER32(?), ref: 6C8A5EB6
                        • EqualRect.USER32(?,?), ref: 6C8A5EC8
                        • InvalidateRect.USER32(00000000,?,00000001,?,?), ref: 6C8A5EDB
                        • UpdateWindow.USER32(00000000), ref: 6C8A5EE4
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Window$Empty$ClientEqual$IntersectInvalidatePointsRedrawScreenUpdate$CopyLongUnion
                        • String ID:
                        • API String ID: 4119827998-0
                        • Opcode ID: 163bc50ec7c0f36f3790e4545fca5c183e144d027181452cef8e85c7a0bae726
                        • Instruction ID: 12b31956de81968390bc63dc78cc316943a8b59684eeb0efcb184ce2cdf2e8be
                        • Opcode Fuzzy Hash: 163bc50ec7c0f36f3790e4545fca5c183e144d027181452cef8e85c7a0bae726
                        • Instruction Fuzzy Hash: 52D13A71A04609AFDF11CFA4CA48BDEB7B9BF09304F204665E909FB551DB71AA89CF10
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C86A8D0
                        • GetClassNameW.USER32(?,00000000,00000001), ref: 6C86A91B
                          • Part of subcall function 6C86423E: GetParent.USER32(00000000), ref: 6C86426A
                        • SendMessageW.USER32(?,0000041C), ref: 6C86AA0E
                        • SendMessageW.USER32(?,00000409,?,?), ref: 6C86AA23
                        • GetClassNameW.USER32(?,00000000,00000001), ref: 6C86AA4B
                        • SendMessageW.USER32(?,00000418,00000000,00000000), ref: 6C86AADC
                        • SendMessageW.USER32(?,0000041D,-00000001,?), ref: 6C86AAF8
                        • IntersectRect.USER32(?,?,?), ref: 6C86AB0A
                        • CreatePopupMenu.USER32 ref: 6C86AB70
                        • CreateCompatibleDC.GDI32(?), ref: 6C86AB88
                        • CopyRect.USER32(?,?), ref: 6C86AC73
                        • OffsetRect.USER32(?,?,?), ref: 6C86AC89
                        • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C86ACA9
                        • GetSysColor.USER32(00000004), ref: 6C86ACF8
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 6C86ADE0
                        • CopyRect.USER32(?,?), ref: 6C86ADFD
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageRectSend$Create$ClassCompatibleCopyMenuName$BitmapColorH_prolog3_InsertIntersectItemOffsetParentPopup
                        • String ID: 0$ReBarWindow32$ToolbarWindow32
                        • API String ID: 4204073102-333968262
                        • Opcode ID: f9f5dadec96e2a96c01040db824baaa389c8ce85c7374eb82e743a4953eacdd5
                        • Instruction ID: 324f57f8ca56c96dd38db8190972462147c852ca1de23661468b5ec0bb9546b6
                        • Opcode Fuzzy Hash: f9f5dadec96e2a96c01040db824baaa389c8ce85c7374eb82e743a4953eacdd5
                        • Instruction Fuzzy Hash: E6024B719001299BCF35DB55CE94FEDB778AF15308F1045A9E50AB7A90EB30AE89CF60
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C871D3B
                        • CreateCompatibleDC.GDI32(00000000), ref: 6C871D90
                        • CreateCompatibleDC.GDI32(00000000), ref: 6C871DA8
                        • CreateCompatibleDC.GDI32(00000000), ref: 6C871DC0
                        • GetObjectW.GDI32(00000004,00000018,?), ref: 6C871DE0
                        • CreateBitmap.GDI32(?,?,?,?,00000000), ref: 6C871E06
                        • CreateBitmap.GDI32(00000008,00000008,00000001,00000001,6C9DE460), ref: 6C871E29
                        • CreatePatternBrush.GDI32(?), ref: 6C871E3B
                        • DeleteObject.GDI32(?), ref: 6C871E6A
                        • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 6C871E7B
                        • GetPixel.GDI32(?,00000000,00000000), ref: 6C871EC3
                        • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6C871EE9
                        • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00EE0086), ref: 6C871F11
                        • FillRect.USER32(?,?,?), ref: 6C871F73
                          • Part of subcall function 6C872EBE: __EH_prolog3.LIBCMT ref: 6C872EC5
                        • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 6C871FA1
                        • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,008800C6), ref: 6C871FBC
                        • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 6C871FD3
                        • DeleteDC.GDI32(00000000), ref: 6C872040
                        • DeleteDC.GDI32(00000000), ref: 6C87205C
                        • DeleteDC.GDI32(00000000), ref: 6C87207B
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Create$Delete$BitmapCompatible$Object$BrushFillH_prolog3H_prolog3_PatternPixelRect
                        • String ID:
                        • API String ID: 308707564-0
                        • Opcode ID: 0f1d7ff0fb239409c8dfbdfc6d43f06b61131e1b9cbd79468e5f360aa71ab751
                        • Instruction ID: 6d6c4e78377c3f5bca1b3fec90a862f2427319127d6b0e133415007785cf071a
                        • Opcode Fuzzy Hash: 0f1d7ff0fb239409c8dfbdfc6d43f06b61131e1b9cbd79468e5f360aa71ab751
                        • Instruction Fuzzy Hash: 20B1F571D00218EFDF219FA4CE889EEBB79FF09308F204428F515B6660EB359A55DB20
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C8E3F1C
                        • CreateCompatibleDC.GDI32(00000000), ref: 6C8E3F64
                        • GetObjectW.GDI32(?,00000018,?), ref: 6C8E3F85
                        • SelectObject.GDI32(?,?), ref: 6C8E3FC0
                        • CreateCompatibleDC.GDI32(?), ref: 6C8E3FED
                        • CreateDIBSection.GDI32(?,?,00000000,?,00000000,00000000), ref: 6C8E4055
                        • SelectObject.GDI32(?,00000000), ref: 6C8E406C
                        • SelectObject.GDI32(?,00000000), ref: 6C8E407E
                        • SelectObject.GDI32(?,00000000), ref: 6C8E4095
                        • DeleteObject.GDI32(?), ref: 6C8E40A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Object$Select$Create$Compatible$DeleteH_prolog3_Section
                        • String ID: $(
                        • API String ID: 1429849173-55695022
                        • Opcode ID: 914c8c70c8160a437710ac67f57b4fc219be38696116877ebc3ede32cf11aa0a
                        • Instruction ID: d66815f44e9e8ab5355512411e82ea75a8601d190dd7b8622618daf619c4b834
                        • Opcode Fuzzy Hash: 914c8c70c8160a437710ac67f57b4fc219be38696116877ebc3ede32cf11aa0a
                        • Instruction Fuzzy Hash: 8AB14B30904629DFDB25CF65CD44B9EBBB5FF9A304F1085EAE449B6651EB309A84CF20
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C8CD42F
                        • IsWindow.USER32(?), ref: 6C8CD4C6
                        • GetMenuItemCount.USER32(?), ref: 6C8CD66B
                        • AppendMenuW.USER32(?,00000000,00000000,?), ref: 6C8CD69C
                        • SendMessageW.USER32(?,0000040C,00000000,00000000), ref: 6C8CD722
                        • SendMessageW.USER32(000000FF,0000041C,00000000,?), ref: 6C8CD763
                        • GetMenuItemCount.USER32(?), ref: 6C8CD7D6
                        • AppendMenuW.USER32(?,00000800,00000000,00000000), ref: 6C8CD7EC
                        • AppendMenuW.USER32(?,00000000,00000000,?), ref: 6C8CD807
                        • GetMenuItemCount.USER32(?), ref: 6C8CD876
                        • AppendMenuW.USER32(?,00000800,00000000,00000000), ref: 6C8CD88C
                        • AppendMenuW.USER32(?,00000000,00000000,?), ref: 6C8CD8A6
                        • AppendMenuW.USER32(?,00000800,00000000,00000000), ref: 6C8CD681
                          • Part of subcall function 6C868E82: GetDlgCtrlID.USER32(?), ref: 6C868E8D
                        • AppendMenuW.USER32(?,00000000,00000000,?), ref: 6C8CD990
                        • GetWindow.USER32(?,00000005), ref: 6C8CD9C0
                        • AppendMenuW.USER32(?,00000000,00000000,?), ref: 6C8CDA3B
                        • GetMenuItemCount.USER32(?), ref: 6C8CDA7F
                        • AppendMenuW.USER32(?,00000800,00000000,00000000), ref: 6C8CDA95
                        • AppendMenuW.USER32(?,00000000,00000000,?), ref: 6C8CDAAC
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Menu$Append$CountItem$MessageSendWindow$CtrlH_prolog3_
                        • String ID:
                        • API String ID: 465015882-0
                        • Opcode ID: af4656a36a741368c773726964d58018a1b919aae33947c1ebd9541800159d50
                        • Instruction ID: 66c327312c14871c00d62d29c6bf0a4e14b8c4e758c45a6a1cc2e6bf5e04aa63
                        • Opcode Fuzzy Hash: af4656a36a741368c773726964d58018a1b919aae33947c1ebd9541800159d50
                        • Instruction Fuzzy Hash: 5C028F30B00225DFDF249B64C944BADBB75BF49318F2484AAE909AB791DF30AD45CF51
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C882B87
                        • CreateRectRgnIndirect.GDI32(?), ref: 6C882BBF
                        • CopyRect.USER32(?,?), ref: 6C882BD3
                        • InflateRect.USER32(?,?,?), ref: 6C882BE9
                        • IntersectRect.USER32(?,?,?), ref: 6C882BF5
                        • CreateRectRgnIndirect.GDI32(?), ref: 6C882BFF
                        • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6C882C14
                        • CombineRgn.GDI32(?,?,?,00000003), ref: 6C882C2E
                        • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6C882C75
                        • SetRectRgn.GDI32(?,?,00000004,?,?), ref: 6C882C92
                        • CopyRect.USER32(?,?), ref: 6C882C9D
                        • InflateRect.USER32(?,?,?), ref: 6C882CB3
                        • IntersectRect.USER32(?,?,?), ref: 6C882CBF
                        • SetRectRgn.GDI32(?,?,?,?,?), ref: 6C882CD4
                        • CombineRgn.GDI32(?,?,?,00000003), ref: 6C882CE5
                        • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 6C882CF9
                        • CombineRgn.GDI32(?,?,?,00000003), ref: 6C882D13
                          • Part of subcall function 6C882EDC: CreateBitmap.GDI32(00000008,00000008,00000001,00000001,?), ref: 6C882F23
                          • Part of subcall function 6C882EDC: CreatePatternBrush.GDI32(00000000), ref: 6C882F30
                          • Part of subcall function 6C882EDC: DeleteObject.GDI32(00000000), ref: 6C882F3C
                        • PatBlt.GDI32(00000004,?,?,?,?,005A0049), ref: 6C882D71
                          • Part of subcall function 6C872AAB: SelectObject.GDI32(?,00000000), ref: 6C872ACB
                          • Part of subcall function 6C872AAB: SelectObject.GDI32(?,00000000), ref: 6C872AE1
                          • Part of subcall function 6C8729C0: SelectClipRgn.GDI32(?,00000000), ref: 6C8729E0
                          • Part of subcall function 6C8729C0: SelectClipRgn.GDI32(?,00000000), ref: 6C8729F6
                        • PatBlt.GDI32(00000004,?,?,?,?,005A0049), ref: 6C882DD4
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Create$Select$CombineObject$ClipCopyIndirectInflateIntersect$BitmapBrushDeleteH_prolog3_Pattern
                        • String ID:
                        • API String ID: 770706554-0
                        • Opcode ID: 0774869a7bb9d1c258e579c79760517b0eff109470905e9c529763c8ff6181f4
                        • Instruction ID: e6b03e19e929f624424e299a1132c11fe8c4fa2828b76c7fb3fadcc3d134eca8
                        • Opcode Fuzzy Hash: 0774869a7bb9d1c258e579c79760517b0eff109470905e9c529763c8ff6181f4
                        • Instruction Fuzzy Hash: 2D91F4B1A00219AFCF15DFA4C998DEEBBB9FF48304B144529F906B3650DB34A945CB60
                        APIs
                        • IsWindow.USER32(00000000), ref: 6C89DF22
                        • GetCursorPos.USER32(?), ref: 6C89DF40
                        • ScreenToClient.USER32(?,?), ref: 6C89DF4D
                        • GetParent.USER32(?), ref: 6C89E01A
                        • SetTimer.USER32(00000000,0000EC18,FFFFFFFE,00000000), ref: 6C89E078
                        • InvalidateRect.USER32(00000000,00000054,00000001), ref: 6C89E087
                        • UpdateWindow.USER32(00000000), ref: 6C89E090
                        • KillTimer.USER32(00000000,0000EC18,00000000), ref: 6C89E0AB
                        • GetParent.USER32(?), ref: 6C89E181
                        • GetParent.USER32(?), ref: 6C89E1EA
                        • SendMessageW.USER32(00000000,0000011F,00000080,?), ref: 6C89E282
                        • KillTimer.USER32(0000EC18,0000EC18), ref: 6C89E2B7
                        • __EH_prolog3.LIBCMT ref: 6C89E2CF
                        • GetCursorPos.USER32(?), ref: 6C89E3A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ParentTimer$CursorKillWindow$ClientH_prolog3InvalidateMessageRectScreenSendUpdate
                        • String ID: Control Panel\Desktop$MenuShowDelay
                        • API String ID: 2829982909-702829638
                        • Opcode ID: 54ce819b64ba966108e70cdcbf656383d910abaeae8d272be290e7e027314cd5
                        • Instruction ID: aebd5d5500587d962308bd29b366f3f4adb3f98142a21d49090139c117264265
                        • Opcode Fuzzy Hash: 54ce819b64ba966108e70cdcbf656383d910abaeae8d272be290e7e027314cd5
                        • Instruction Fuzzy Hash: 0CD1E271A016159FDF248F68CA44AAD7BB5FF48714F244A69EC15EBB80DB30E941CB90
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C95E2DE
                        • GetCursorPos.USER32(?), ref: 6C95E397
                        • IsRectEmpty.USER32(?), ref: 6C95E3CB
                        • IsRectEmpty.USER32(?), ref: 6C95E3F2
                        • IsRectEmpty.USER32(?), ref: 6C95E414
                        • GetWindowRect.USER32(?,?), ref: 6C95E442
                        • GetWindowRect.USER32(?,?), ref: 6C95E472
                        • PtInRect.USER32(?,?,?), ref: 6C95E4BF
                        • OffsetRect.USER32(?,?,00000000), ref: 6C95E4D7
                          • Part of subcall function 6C95F4F0: __EH_prolog3.LIBCMT ref: 6C95F4F7
                          • Part of subcall function 6C95F4F0: SetRectEmpty.USER32 ref: 6C95F5F7
                          • Part of subcall function 6C95F4F0: SetRectEmpty.USER32(?), ref: 6C95F5FE
                        • SetRectEmpty.USER32(?), ref: 6C95E4FA
                        • OffsetRect.USER32(?,?,?), ref: 6C95E68B
                        • IsRectEmpty.USER32(?), ref: 6C95E6AB
                        • IsRectEmpty.USER32(?), ref: 6C95E6DE
                        • PtInRect.USER32(?,00000000,00000000), ref: 6C95E6F2
                        • OffsetRect.USER32(?,?,?), ref: 6C95E71E
                        • IsRectEmpty.USER32(?), ref: 6C95E73D
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Empty$Offset$Window$CursorH_prolog3H_prolog3_
                        • String ID:
                        • API String ID: 359163869-0
                        • Opcode ID: 2b96b8c6a6382b9a783d6c14528daf766a9a7b6dedc34de2152a9b13a703d080
                        • Instruction ID: 3f1e9a96f4e1a825be3c6c0ce12286dbbbb47a5f16bb8ac722870c70bf065a05
                        • Opcode Fuzzy Hash: 2b96b8c6a6382b9a783d6c14528daf766a9a7b6dedc34de2152a9b13a703d080
                        • Instruction Fuzzy Hash: 41E1E271A01615DFCF05CFA4C984AADBBB9FF48318F548169EC05AF644EB36E852CB90
                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,?), ref: 6C87EE90
                        • GetProcAddress.KERNEL32(00000000,GetThreadPreferredUILanguages), ref: 6C87EEA0
                        • EncodePointer.KERNEL32(00000000,?,?), ref: 6C87EEA9
                        • DecodePointer.KERNEL32(00000000,?,?), ref: 6C87EEB7
                        • GetUserDefaultUILanguage.KERNEL32(?,?), ref: 6C87EEDE
                        • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6C87EEEE
                        • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6C87EF22
                        • GetSystemDefaultUILanguage.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C87EF55
                        • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6C87EF65
                        • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6C87EFA2
                        • ___crtDownlevelLCIDToLocaleName.LIBCPMT ref: 6C87EFDD
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: DownlevelLocaleName___crt$DefaultLanguagePointer$AddressDecodeEncodeHandleModuleProcSystemUser
                        • String ID: GetThreadPreferredUILanguages$kernel32.dll
                        • API String ID: 404278886-1646127487
                        • Opcode ID: 5b362b057e5069b46622c74295a369c434a8670d9481d44bb29e92e18cfdd934
                        • Instruction ID: 6d6bdebd74fb7efd081a30bc4c7bd9c622aad6f15eb47c8bf1257d884b68075e
                        • Opcode Fuzzy Hash: 5b362b057e5069b46622c74295a369c434a8670d9481d44bb29e92e18cfdd934
                        • Instruction Fuzzy Hash: A5511CB2D0420AAFCB14DFA8C984DEF77B9EF59304B104529E505F7650EB34EA09CBA1
                        APIs
                        • GetClientRect.USER32(?,?), ref: 6C89FFB8
                        • InflateRect.USER32(?,00000000,00000000), ref: 6C89FFF2
                        • SetRectEmpty.USER32(?), ref: 6C8A0096
                        • SetRectEmpty.USER32(?), ref: 6C8A00A3
                        • GetSystemMetrics.USER32(00000002), ref: 6C8A00C8
                        • KillTimer.USER32(?,0000EC16), ref: 6C8A0178
                        • EqualRect.USER32(?,?), ref: 6C8A0195
                        • EqualRect.USER32(?,?), ref: 6C8A01AA
                        • EqualRect.USER32(?,?), ref: 6C8A0219
                        • InvalidateRect.USER32(?,?,00000001), ref: 6C8A022E
                        • InvalidateRect.USER32(?,?,00000001), ref: 6C8A023F
                        • EqualRect.USER32(?,?), ref: 6C8A0252
                        • InvalidateRect.USER32(?,?,00000001), ref: 6C8A0264
                        • InvalidateRect.USER32(?,?,00000001), ref: 6C8A0275
                        • UpdateWindow.USER32(?), ref: 6C8A0286
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$EqualInvalidate$Empty$ClientInflateKillMetricsSystemTimerUpdateWindow
                        • String ID:
                        • API String ID: 2140115980-0
                        • Opcode ID: a56f0322be325e8499e4f91b179ff1f5753e489f76c653352a7cc19aebfc42c5
                        • Instruction ID: d618651a56e206424db789cd2b15de368486d103b6487304f240ca66b9bc4d27
                        • Opcode Fuzzy Hash: a56f0322be325e8499e4f91b179ff1f5753e489f76c653352a7cc19aebfc42c5
                        • Instruction Fuzzy Hash: C3A15C72A0061ADFCF11CFA4C984AEE77B5FF49304F14457AED0AAB605DB30A946CB60
                        APIs
                        • GetDlgCtrlID.USER32(?), ref: 6C86C023
                        • GetDlgItem.USER32(?,?), ref: 6C86C0E0
                        • ShowWindow.USER32(00000000,00000000), ref: 6C86C0EE
                        • GetMenu.USER32(?), ref: 6C86C100
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 6C86C11C
                        • GetDlgItem.USER32(?,0000E900), ref: 6C86C168
                        • SetWindowLongW.USER32(00000000,000000F4,0000EA21), ref: 6C86C17C
                        • GetDlgItem.USER32(?,0000EA21), ref: 6C86C198
                        • GetDlgItem.USER32(?,0000E900), ref: 6C86C1AE
                        • SetWindowLongW.USER32(00000000,000000F4,0000EA21), ref: 6C86C1C0
                        • SetWindowLongW.USER32(?,000000F4,0000E900), ref: 6C86C1CC
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 6C86C1DF
                        • SetMenu.USER32(?,00000000), ref: 6C86C1F6
                        • GetDlgItem.USER32(?,?), ref: 6C86C253
                        • ShowWindow.USER32(?,00000005), ref: 6C86C261
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ItemWindow$Long$InvalidateMenuRectShow$Ctrl
                        • String ID:
                        • API String ID: 599340499-0
                        • Opcode ID: 1bca1c1a849a62600227b2154e525774b796134dd727da9e7c98dd90a671db9a
                        • Instruction ID: 490076b109649ecd6573baa1dca5a47f8e6b34dca3ccb1829461b474195e996f
                        • Opcode Fuzzy Hash: 1bca1c1a849a62600227b2154e525774b796134dd727da9e7c98dd90a671db9a
                        • Instruction Fuzzy Hash: 61918D30B01616EFDF14AF65C988BADBBB1FF09314F204569E915ABA91CB70A940CF90
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C872090
                        • GetSysColor.USER32(00000014), ref: 6C8720C7
                          • Part of subcall function 6C871945: __EH_prolog3.LIBCMT ref: 6C87194C
                          • Part of subcall function 6C871945: CreateSolidBrush.GDI32(?), ref: 6C871967
                        • GetSysColor.USER32(00000010), ref: 6C8720DC
                        • CreateCompatibleDC.GDI32(00000000), ref: 6C8720F0
                        • CreateCompatibleDC.GDI32(00000000), ref: 6C872108
                        • GetObjectW.GDI32(00000004,00000018,?), ref: 6C87212B
                        • CreateBitmap.GDI32(?,?,?,?,00000000), ref: 6C87214C
                        • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 6C87216D
                          • Part of subcall function 6C872A4C: SelectObject.GDI32(00000048,?), ref: 6C872A55
                        • GetPixel.GDI32(?,00000000,00000000), ref: 6C8721B5
                          • Part of subcall function 6C872B65: SetBkColor.GDI32(?,?), ref: 6C872B7A
                          • Part of subcall function 6C872B65: SetBkColor.GDI32(?,?), ref: 6C872B8C
                        • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6C8721DE
                        • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,001100A6), ref: 6C872208
                        • BitBlt.GDI32(?,00000001,00000001,?,?,?,00000000,00000000,00E20746), ref: 6C872273
                        • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00E20746), ref: 6C87229C
                        • DeleteDC.GDI32(00000000), ref: 6C872311
                        • DeleteDC.GDI32(00000000), ref: 6C872330
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Create$Color$BitmapCompatibleDeleteH_prolog3Object$BrushPixelSelectSolid
                        • String ID:
                        • API String ID: 2254850417-0
                        • Opcode ID: 0667ae96a091d7a0734140c4da90544f575ebfe6455b6de93681228a39861755
                        • Instruction ID: 4da70062f5c72d6b64dfe1dccac642cf1401827396f4d3c2ce561f453730100b
                        • Opcode Fuzzy Hash: 0667ae96a091d7a0734140c4da90544f575ebfe6455b6de93681228a39861755
                        • Instruction Fuzzy Hash: 3D810971900209FFDF21DFE4CE99AEEBB79AF04304F104428F505B66A0EB759A55DB60
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8A65E9
                          • Part of subcall function 6C86D33C: __EH_prolog3.LIBCMT ref: 6C86D343
                          • Part of subcall function 6C918836: __EH_prolog3.LIBCMT ref: 6C91883D
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: H_prolog3
                        • String ID: MFCButton$MFCColorButton$MFCEditBrowse$MFCFontComboBox$MFCLink$MFCMaskedEdit$MFCMenuButton$MFCPropertyGrid$MFCShellList$MFCShellTree$MFCVSListBox
                        • API String ID: 431132790-2110171958
                        • Opcode ID: 435c82ce17c7172859c494bcb57b0e26638a45dec66f2cb050563144c4322da5
                        • Instruction ID: e799e14502792753643d8d926ef0f7e3ea40ea5d5940ee809740b6a9e10f3853
                        • Opcode Fuzzy Hash: 435c82ce17c7172859c494bcb57b0e26638a45dec66f2cb050563144c4322da5
                        • Instruction Fuzzy Hash: 2E61A12190925999EF28DBFD9B40BBD77F95F3525CF200C2AA460EBEC5EF34C6098611
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8EE245
                        • GetWindowRect.USER32(?,?), ref: 6C8EE32B
                          • Part of subcall function 6C868E82: GetDlgCtrlID.USER32(?), ref: 6C868E8D
                          • Part of subcall function 6C8EBA69: GetWindowRect.USER32(?,?), ref: 6C8EBA77
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: RectWindow$CtrlH_prolog3
                        • String ID: %TsPane-%d$%TsPane-%d%x$IsFloating$MRUWidth$Panes$PinState$RecentFrameAlignment$RecentRowIndex$RectRecentDocked$RectRecentFloat
                        • API String ID: 3396713241-2628993547
                        • Opcode ID: d33a9a160f110c1a13cba9ca0bc7a750c80db7c3fe54f329952b1e0630bf2e41
                        • Instruction ID: d8d2cba698dce4b1132e35e132c4b946e756a1c6466e8995cf642b15fb3e823e
                        • Opcode Fuzzy Hash: d33a9a160f110c1a13cba9ca0bc7a750c80db7c3fe54f329952b1e0630bf2e41
                        • Instruction Fuzzy Hash: F9816A7560050ADFCF05EFA5C8949BDB772BF8D314F194969E916AB7A0CB30A842CF90
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C8C9679
                        • GetWindowRect.USER32(?,?), ref: 6C8C970D
                        • SetRect.USER32(?,00000000,00000000,?,?), ref: 6C8C972E
                        • CreateCompatibleDC.GDI32(?), ref: 6C8C973A
                        • CreateCompatibleBitmap.GDI32(?,?,00000128), ref: 6C8C9764
                        • GetWindowRect.USER32(?,?), ref: 6C8C97B9
                        • GetClientRect.USER32(?,?), ref: 6C8C97C6
                        • OffsetRect.USER32(?,?,?), ref: 6C8C97E7
                        • IsRectEmpty.USER32(?), ref: 6C8C9817
                        • SetRectEmpty.USER32(?), ref: 6C8C98AA
                        • InflateRect.USER32(?,000000FE,00000000), ref: 6C8C9B2A
                        • CreateRectRgnIndirect.GDI32(?), ref: 6C8C9822
                          • Part of subcall function 6C8729C0: SelectClipRgn.GDI32(?,00000000), ref: 6C8729E0
                          • Part of subcall function 6C8729C0: SelectClipRgn.GDI32(?,00000000), ref: 6C8729F6
                        • BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 6C8C9C0C
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Create$ClipCompatibleEmptySelectWindow$BitmapClientH_prolog3_IndirectInflateOffset
                        • String ID:
                        • API String ID: 3231449308-0
                        • Opcode ID: 99975c68b7d570e6a42d1bdb9e89fd692462791b161cd81eb533e5705dd1825f
                        • Instruction ID: 84febbe8f7cd344ae23f9a4d309622a0ed0dd558350d18c614a9d1b8b4fac1d5
                        • Opcode Fuzzy Hash: 99975c68b7d570e6a42d1bdb9e89fd692462791b161cd81eb533e5705dd1825f
                        • Instruction Fuzzy Hash: 51022371A00529DFCF25DB68C944BEDB7B9BF49314F1046AAE90AB3650DB30AE85CF50
                        APIs
                        • GetMessageW.USER32(?,00000000,0000000F,0000000F), ref: 6C8A5226
                        • DispatchMessageW.USER32(?), ref: 6C8A5234
                        • PeekMessageW.USER32(?,00000000,0000000F,0000000F,00000000), ref: 6C8A5242
                        • GetCapture.USER32 ref: 6C8A524C
                        • SetCapture.USER32(?), ref: 6C8A5260
                        • GetWindowRect.USER32(?,?), ref: 6C8A527D
                        • GetCapture.USER32 ref: 6C8A52F0
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 6C8A530D
                        • DispatchMessageW.USER32(?), ref: 6C8A5333
                        • GetScrollPos.USER32(00000000,00000002), ref: 6C8A5450
                        • RedrawWindow.USER32(?,00000000,00000000,00000581), ref: 6C8A546D
                        • ReleaseCapture.USER32 ref: 6C8A550F
                        • IsWindow.USER32(?), ref: 6C8A5518
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Message$Capture$Window$Dispatch$PeekRectRedrawReleaseScroll
                        • String ID:
                        • API String ID: 1873598099-0
                        • Opcode ID: 7d7226e37e2f3036af1f22f69d32424e5d6c3993b78b1538f624858cb0cee2d1
                        • Instruction ID: e1b12d1d1fc2a05cfc26dbe7c81ed0106114a12d04398bf95abcafae0d575a08
                        • Opcode Fuzzy Hash: 7d7226e37e2f3036af1f22f69d32424e5d6c3993b78b1538f624858cb0cee2d1
                        • Instruction Fuzzy Hash: 4BA1D270A01A14CFCF14CFA5C998BEE77B5FF49704F144579E806ABA45CB70A886CB50
                        APIs
                        • GlobalAlloc.KERNEL32(00000040,00000004,?), ref: 6C88034E
                        • GlobalLock.KERNEL32(00000000), ref: 6C88035B
                        • GlobalUnlock.KERNEL32(00000000), ref: 6C88036C
                        • SetPropW.USER32(?,00000000), ref: 6C88037C
                        • GlobalFree.KERNEL32(00000000), ref: 6C880387
                        • IsWindowEnabled.USER32(00000000), ref: 6C88042F
                        • EnableWindow.USER32(00000000,00000000), ref: 6C88043B
                        • GetCapture.USER32 ref: 6C880448
                        • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6C880457
                        • EnableWindow.USER32(00000000,00000001), ref: 6C880534
                        • GetActiveWindow.USER32 ref: 6C88053E
                        • SetActiveWindow.USER32(00000000), ref: 6C880549
                        • EnableWindow.USER32(00000000,00000001), ref: 6C880588
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$Global$Enable$Active$AllocCaptureEnabledFreeLockMessagePropSendUnlock
                        • String ID:
                        • API String ID: 2841214920-0
                        • Opcode ID: 6d7252b25680fae96e7c5f994f2bea1ae34af10f5076973e6dda04bc107113e3
                        • Instruction ID: 55ce659870856d2d7ee3cf8ed69dfd6101ade1aaeb0fe770e49afb834b3fd55d
                        • Opcode Fuzzy Hash: 6d7252b25680fae96e7c5f994f2bea1ae34af10f5076973e6dda04bc107113e3
                        • Instruction Fuzzy Hash: B9919170703A069BDB249F79CA48BADB7B4BF05318F204A69E615E7F80DF74A541CB90
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C89D53B
                        • GetParent.USER32(?), ref: 6C89D5B7
                        • SendMessageW.USER32(?,00000117,?,?), ref: 6C89D660
                        • GetMenuItemCount.USER32(?), ref: 6C89D66F
                        • GetMenuItemInfoW.USER32(00000000,00000000,00000001,?), ref: 6C89D755
                        • GetMenuState.USER32(00000000,00000000,00000400), ref: 6C89D776
                        • CharUpperW.USER32(?,?), ref: 6C89D8EA
                        • GetMenuDefaultItem.USER32(?,00000000,00000001), ref: 6C89DB0E
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Menu$Item$CharCountDefaultH_prolog3_InfoMessageParentSendStateUpper
                        • String ID: 0$7$@
                        • API String ID: 3317760994-3997377745
                        • Opcode ID: 5fa3de75b7faf079091cc7b8954bf0ce4ec37f3d1ca0e272487555862f87e238
                        • Instruction ID: f9a2880a668b1f2b641867707ec0c2adc678719b54a1617da076dd7f08cc0461
                        • Opcode Fuzzy Hash: 5fa3de75b7faf079091cc7b8954bf0ce4ec37f3d1ca0e272487555862f87e238
                        • Instruction Fuzzy Hash: 55F18F70A052299FDF25CF68CE54BE9B7B4BF09318F1045AAD91DA7680DB309E84CF54
                        APIs
                        • LoadResource.KERNEL32(?,?,?,?,00000000), ref: 6C8731A1
                        • LockResource.KERNEL32(00000000), ref: 6C8731B0
                          • Part of subcall function 6C86D16A: _memcpy_s.LIBCMT ref: 6C86D179
                        • GetSysColor.USER32 ref: 6C873234
                        • GetSysColor.USER32 ref: 6C873247
                        • GetSysColor.USER32 ref: 6C873262
                        • GetDC.USER32(00000000), ref: 6C873298
                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 6C8732A8
                        • CreateCompatibleDC.GDI32(00000000), ref: 6C8732B6
                        • SelectObject.GDI32(00000000,?), ref: 6C8732C2
                        • StretchDIBits.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,?,?,00000008,00000000,00000000,00CC0020), ref: 6C8732F5
                        • SelectObject.GDI32(00000000,00000000), ref: 6C8732FD
                        • DeleteDC.GDI32(00000000), ref: 6C873304
                        • ReleaseDC.USER32(00000000,00000000), ref: 6C873310
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Color$CompatibleCreateObjectResourceSelect$BitmapBitsDeleteLoadLockReleaseStretch_memcpy_s
                        • String ID:
                        • API String ID: 367613035-0
                        • Opcode ID: 80df5d6cec1f3ec7768f92f13715133c3a0c4fe63790b443ed03500a1ef19d44
                        • Instruction ID: 32ca35741d2203b3c368d08fc673f431aceac24e3a4fd0bf1c8e7ef37e99c88b
                        • Opcode Fuzzy Hash: 80df5d6cec1f3ec7768f92f13715133c3a0c4fe63790b443ed03500a1ef19d44
                        • Instruction Fuzzy Hash: CA41C276A04114AFDB209F98CD44E7EBBBAFF86301B248559F515E3640DB30AE41CBB1
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8ECBBE
                          • Part of subcall function 6C868E82: GetDlgCtrlID.USER32(?), ref: 6C868E8D
                          • Part of subcall function 6C8EA328: __EH_prolog3.LIBCMT ref: 6C8EA32F
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: H_prolog3$Ctrl
                        • String ID: %TsPane-%d$%TsPane-%d%x$IsFloating$MRUWidth$Panes$PinState$RecentFrameAlignment$RecentRowIndex$RectRecentDocked$RectRecentFloat
                        • API String ID: 3879667756-2628993547
                        • Opcode ID: 22f6b3ca647a0fb3bacce55f7a909aa08ffd8284fb5a4b5874381ba1e42a0dac
                        • Instruction ID: b9eee61355a1f0487747898421885225cc3b2c9c7c34cf5ad75e557e7ca6b9db
                        • Opcode Fuzzy Hash: 22f6b3ca647a0fb3bacce55f7a909aa08ffd8284fb5a4b5874381ba1e42a0dac
                        • Instruction Fuzzy Hash: F8519075A0051AABCF04DF64C8849EDBB75BF8E318B144969E812AB781CF35AD06CB91
                        APIs
                        • GetCurrentProcess.KERNEL32 ref: 6C88E542
                        • GetCurrentProcess.KERNEL32 ref: 6C88E54D
                        • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000,00000000,00000002), ref: 6C88E560
                        • GetLastError.KERNEL32 ref: 6C88E5AA
                        • FlushFileBuffers.KERNEL32(000000FF,00000000,00000000,00000000), ref: 6C88E5C4
                        • GetLastError.KERNEL32 ref: 6C88E5DA
                        • GetFileSize.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000), ref: 6C88E5F7
                        • GetLastError.KERNEL32(?,?,?,00000000,00000000), ref: 6C88E605
                        • GetLastError.KERNEL32(?,?,?,00000000,00000000), ref: 6C88E622
                        • SetFilePointer.KERNEL32(000000FF,00000000,?,00000001,00000000,?,?,?,00000000,00000000,?,?,?,00000000,00000000), ref: 6C88E64B
                        • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,?,?,00000000,00000000), ref: 6C88E659
                        • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,?,?,00000000,00000000), ref: 6C88E676
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ErrorLast$File$CurrentProcess$BuffersDuplicateFlushHandlePointerSize
                        • String ID:
                        • API String ID: 3214111443-0
                        • Opcode ID: 05997b64d176b2cbb036005fbdb9cf415e848134d22444258b0dd27f18186a45
                        • Instruction ID: 65617967ef9a6396bed754888be800a353f5c7e52977ec9e67af56240d315f0b
                        • Opcode Fuzzy Hash: 05997b64d176b2cbb036005fbdb9cf415e848134d22444258b0dd27f18186a45
                        • Instruction Fuzzy Hash: 3341A775A05608AFDB24DFB4C94899A7BB8EF05325F204969E512E7A80EB70ED40C790
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C863C7E
                        • SendMessageW.USER32(?,00000000,00000000,00000080), ref: 6C863CC5
                        • SendMessageW.USER32(?,00000000,00000000,?), ref: 6C863CF1
                        • ValidateRect.USER32(?,00000000), ref: 6C863D04
                          • Part of subcall function 6C87D53E: GetClientRect.USER32(?,?), ref: 6C87D5A2
                        • GetClientRect.USER32(?,?), ref: 6C863D75
                        • BeginPaint.USER32(?,?), ref: 6C863D82
                        • SendMessageW.USER32(?,00000000,00000000,?), ref: 6C863DB8
                        • SendMessageW.USER32(?,00000000,00000000), ref: 6C863DDA
                        • EndPaint.USER32(?,?), ref: 6C863DF2
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageSend$Rect$ClientPaint$BeginH_prolog3_Validate
                        • String ID: W
                        • API String ID: 3883544035-655174618
                        • Opcode ID: f6496748a5e7c1501750673b66b900040dc1a0ad23fe4ef7b8cb5bb120a29f98
                        • Instruction ID: 53f8d74ee8905fcf65ec524c68925af03739f3e884b0eabbef5616614608962f
                        • Opcode Fuzzy Hash: f6496748a5e7c1501750673b66b900040dc1a0ad23fe4ef7b8cb5bb120a29f98
                        • Instruction Fuzzy Hash: 13419571A00605DBDF319F65CD54AAEBA75FF48308F10892EE156A3E20EF31A954CB60
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C87C0AF
                        • GetObjectW.GDI32(?,00000018,?), ref: 6C87C0CC
                        • GetSystemMetrics.USER32(00000032), ref: 6C87C0DF
                        • GetSystemMetrics.USER32(00000031), ref: 6C87C0EA
                        • GetMenuItemInfoW.USER32(00000000,?,00000000,00000030), ref: 6C87C12C
                        • GetMenuItemInfoW.USER32(00000000,?,00000000,00000030), ref: 6C87C157
                        • GetSystemMetrics.USER32(0000000F), ref: 6C87C1BF
                        • GetSystemMetrics.USER32(0000000F), ref: 6C87C1CB
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MetricsSystem$InfoItemMenu$H_prolog3Object
                        • String ID: 0$@
                        • API String ID: 414968830-1545510068
                        • Opcode ID: 495411aea562d6bc194700ca2e8a78b3c4dd6778f42917e9fe52596c82b9ce6c
                        • Instruction ID: a0e68af1cffa793d3b7ffb110b3f24e5cab662df966e2c582855e53cfd4791af
                        • Opcode Fuzzy Hash: 495411aea562d6bc194700ca2e8a78b3c4dd6778f42917e9fe52596c82b9ce6c
                        • Instruction Fuzzy Hash: 4D417F71D10219ABCF20DFA4CD45BEEB7B8FF14748F144825E915BB691EB70AA08CB61
                        APIs
                        • CoInitialize.OLE32(00000000), ref: 6C87D6AD
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID: D2D1.dll$D2D1CreateFactory$D2D1MakeRotateMatrix$DWrite.dll$DWriteCreateFactory
                        • API String ID: 2538663250-1403614551
                        • Opcode ID: bf8a5eadf80a7d3bc574ad8d7db020db3114472ecb23f4094d4ba6f06070ba36
                        • Instruction ID: 4fd6f760866dfafdb6f28399ee4fb466d92e410e5a092f452cb91a022f2370f0
                        • Opcode Fuzzy Hash: bf8a5eadf80a7d3bc574ad8d7db020db3114472ecb23f4094d4ba6f06070ba36
                        • Instruction Fuzzy Hash: F321B571205B01AFD7319F35CE44B5B77B8EF9A299F104E2AE456D2D40FB70E804CA60
                        APIs
                        • EnableMenuItem.USER32(?,0000420F,00000001), ref: 6C8929E5
                        • EnableMenuItem.USER32(?,0000420E,00000001), ref: 6C892A00
                        • CheckMenuItem.USER32(?,00004214,00000008), ref: 6C892A34
                        • CheckMenuItem.USER32(?,00004212,00000008), ref: 6C892A46
                        • CheckMenuItem.USER32(?,00004213,00000008), ref: 6C892A59
                        • EnableMenuItem.USER32(?,00004212,00000001), ref: 6C892A7B
                        • EnableMenuItem.USER32(?,00004212,00000001), ref: 6C892AAA
                        • EnableMenuItem.USER32(?,00004213,00000001), ref: 6C892AB9
                        • EnableMenuItem.USER32(?,00004214,00000001), ref: 6C892AC8
                        • EnableMenuItem.USER32(?,00004215,00000001), ref: 6C892B1A
                        • CheckMenuItem.USER32(?,00004215,00000008), ref: 6C892B32
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ItemMenu$Enable$Check
                        • String ID:
                        • API String ID: 1852492618-0
                        • Opcode ID: 4be5e3f67861fc41e82eef33174e9b57e456113fefb95bd0ffa80e6248406ade
                        • Instruction ID: 024351956b9902c592e47694cfe1d7f3d01be9889e43ce867014ee40d6fcecd9
                        • Opcode Fuzzy Hash: 4be5e3f67861fc41e82eef33174e9b57e456113fefb95bd0ffa80e6248406ade
                        • Instruction Fuzzy Hash: 6151BC30A41615EFDF21CF18CA48E99BBB1FF05B14F1086A5F915ABA91C774E990CB90
                        APIs
                        • __EH_prolog3_catch_GS.LIBCMT ref: 6C8671FC
                        • GetPropW.USER32(?,AfxOldWndProc423), ref: 6C867213
                        • CallWindowProcW.USER32(?,?,00000110,?,?), ref: 6C867273
                          • Part of subcall function 6C867729: GetWindowRect.USER32(?,?), ref: 6C867762
                          • Part of subcall function 6C867729: GetWindow.USER32(?,00000004), ref: 6C86777F
                        • SetWindowLongW.USER32(?,000000FC,?), ref: 6C867296
                        • RemovePropW.USER32(?,AfxOldWndProc423), ref: 6C8672A2
                        • GlobalFindAtomW.KERNEL32(AfxOldWndProc423), ref: 6C8672AD
                        • GlobalDeleteAtom.KERNEL32(?), ref: 6C8672B7
                          • Part of subcall function 6C8677CC: GetWindowRect.USER32(?,00000360), ref: 6C8677D9
                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 6C8672FF
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$AtomCallGlobalProcPropRect$DeleteFindH_prolog3_catch_LongRemove
                        • String ID: AfxOldWndProc423
                        • API String ID: 3351853316-1060338832
                        • Opcode ID: b7129fda379c2435312adbe5f15cf5bcbd87d3005a98fcad4b7e200b6c6e7a40
                        • Instruction ID: c56b7904429d26e09c530f7d477d432465debc8789c10c5a0e56d4b5bf2d472f
                        • Opcode Fuzzy Hash: b7129fda379c2435312adbe5f15cf5bcbd87d3005a98fcad4b7e200b6c6e7a40
                        • Instruction Fuzzy Hash: 75317F71905208ABCB149FBA9E48CEE7A79EF5E314F141919F512B7E00DF34ED808BA0
                        APIs
                        • GetDC.USER32(00000000), ref: 6C87482E
                        • GetSystemMetrics.USER32(00000048), ref: 6C874850
                        • CreateFontW.GDI32(00000000,?,?,6C8739B9,00001000,?,?,?), ref: 6C874857
                        • SelectObject.GDI32(00000000,00000000), ref: 6C874865
                        • GetCharWidthW.GDI32(00000000,00000036,00000036,6CA313BC,?,?,6C8739B9,00001000,?,?,?), ref: 6C874877
                        • SelectObject.GDI32(00000000,00000000), ref: 6C874883
                        • DeleteObject.GDI32(00000000), ref: 6C87488A
                        • ReleaseDC.USER32(00000000,00000000), ref: 6C874893
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Object$Select$CharCreateDeleteFontMetricsReleaseSystemWidth
                        • String ID: Marlett
                        • API String ID: 1397664628-3688754224
                        • Opcode ID: 643f425f1939e72db469ae6afe1dd33e84eeed54140b03652514896ad8681191
                        • Instruction ID: eb18472a7476af92933641065b0ab9d1fd5dfd0fa880aabf3834b9525a6746d0
                        • Opcode Fuzzy Hash: 643f425f1939e72db469ae6afe1dd33e84eeed54140b03652514896ad8681191
                        • Instruction Fuzzy Hash: EA014F35304A907BDB711A668C9CF6F2E7CEBC7F51F20851CF618E6580DA60A841D734
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0f20ff727bfb296a4682751e27015d8dde5f67d2a39181cf627dc2b71d30aa43
                        • Instruction ID: 6884bcd3ba05fd04bc15e9cd1c17aaa0420e19705ea306f84949b95ad5c38bad
                        • Opcode Fuzzy Hash: 0f20ff727bfb296a4682751e27015d8dde5f67d2a39181cf627dc2b71d30aa43
                        • Instruction Fuzzy Hash: 5D02B475A00A19DFCB21CF5AC984A9EB7B5FF4A315F248958E901ABB10C731FD85CB90
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C8A04F4
                        • LoadCursorW.USER32(00000000,00007F00), ref: 6C8A0522
                        • GetClientRect.USER32(?,?), ref: 6C8A0564
                        • IsWindowVisible.USER32(?), ref: 6C8A079D
                        • SetTimer.USER32(00000000,0000EC15,00000000), ref: 6C8A07C0
                        • InvalidateRect.USER32(?,00000000,00000001,6CA38428,00000000,00000000,00000000,00000000,00000053), ref: 6C8A082F
                        • UpdateWindow.USER32(?), ref: 6C8A0838
                        • __EH_prolog3_GS.LIBCMT ref: 6C8A0861
                        • LoadCursorW.USER32(00000000,00007F00), ref: 6C8A0888
                        • GetParent.USER32(?), ref: 6C8A08D1
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CursorH_prolog3_LoadRectWindow$ClientInvalidateParentTimerUpdateVisible
                        • String ID:
                        • API String ID: 706703367-0
                        • Opcode ID: 1102b242542699869b7a7078da8c72f1604003fbe1b0122818553084d4ff201d
                        • Instruction ID: 82aa87dd4e6f35e516a999dee406e4dac6396d699e4cab8c46386f15ce66d822
                        • Opcode Fuzzy Hash: 1102b242542699869b7a7078da8c72f1604003fbe1b0122818553084d4ff201d
                        • Instruction Fuzzy Hash: 42D1CF70A016059FDF248FA8CA94BED77B5FF49318F244579EC0AABB90CB70A945CB50
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: UpdateWindow$BeepClientH_prolog3H_prolog3_MessageScreen
                        • String ID:
                        • API String ID: 786914320-0
                        • Opcode ID: 67e38a98decbcc4cd0a085a63005f2a4a6519a66bc41d36de0c3b1c13e31becc
                        • Instruction ID: 4e20e761e6767500a634cf0522b262a084bd347a56672248899d6c1b87b96c5c
                        • Opcode Fuzzy Hash: 67e38a98decbcc4cd0a085a63005f2a4a6519a66bc41d36de0c3b1c13e31becc
                        • Instruction Fuzzy Hash: 7991C570701716EFCF249F6CCA94AADB7B1BF49319F144A29E825A7B90DB30A841CF50
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C8E8F9B
                          • Part of subcall function 6C871A91: __EH_prolog3.LIBCMT ref: 6C871A98
                          • Part of subcall function 6C871A91: GetWindowDC.USER32(00000000,00000004,6C88AE60,00000000), ref: 6C871AC4
                        • GetClientRect.USER32(?,?), ref: 6C8E8FC5
                        • GetWindowRect.USER32(?,?), ref: 6C8E8FDC
                          • Part of subcall function 6C872981: ScreenToClient.USER32(?,?), ref: 6C872990
                          • Part of subcall function 6C872981: ScreenToClient.USER32(?,?), ref: 6C87299D
                        • OffsetRect.USER32(?,?,?), ref: 6C8E8FFE
                          • Part of subcall function 6C87258F: ExcludeClipRect.GDI32(?,?,?,?,?), ref: 6C8725C6
                          • Part of subcall function 6C87258F: ExcludeClipRect.GDI32(00000000,?,?,?,?), ref: 6C8725E3
                          • Part of subcall function 6C868F23: GetWindowLongW.USER32(?,000000EC), ref: 6C868F30
                        • GetWindowRect.USER32(?,?), ref: 6C8E9052
                        • GetRgnBox.GDI32(?,?), ref: 6C8E906D
                        • OffsetRect.USER32(?,?,?), ref: 6C8E9087
                        • CreateRectRgnIndirect.GDI32(?), ref: 6C8E90A1
                          • Part of subcall function 6C872A03: ExtSelectClipRgn.GDI32(?,00000000,?), ref: 6C872A26
                          • Part of subcall function 6C872A03: ExtSelectClipRgn.GDI32(?,00000000,?), ref: 6C872A3F
                        • OffsetRgn.GDI32(?,?,?), ref: 6C8E90DC
                        • OffsetRect.USER32(?,?,?), ref: 6C8E90FD
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$ClipOffsetWindow$Client$ExcludeScreenSelect$CreateH_prolog3H_prolog3_IndirectLong
                        • String ID:
                        • API String ID: 3148124242-0
                        • Opcode ID: 2c81ae53834d3a9a678cbb16b9ecfb69838a80357a21eb425f1e0a75560cec6b
                        • Instruction ID: 8bbf01b16ae94ef5d69f2935a204990dc03cdc22c8c73a2686746000cec191f0
                        • Opcode Fuzzy Hash: 2c81ae53834d3a9a678cbb16b9ecfb69838a80357a21eb425f1e0a75560cec6b
                        • Instruction Fuzzy Hash: FF916071E006199FCF11DFA8C984AEEBBB9FF0A308F144619F806BB650DB75A944CB50
                        APIs
                        • GetCursorPos.USER32(?), ref: 6C8A3506
                        • ScreenToClient.USER32(?,?), ref: 6C8A3513
                        • PtInRect.USER32(?,?,?), ref: 6C8A3552
                        • PtInRect.USER32(?,?,?), ref: 6C8A3577
                        • KillTimer.USER32(0000EC16,0000EC16), ref: 6C8A35AA
                        • InvalidateRect.USER32(00000001,?,00000001), ref: 6C8A35C2
                        • InvalidateRect.USER32(00000001,?,00000001), ref: 6C8A35D4
                        • KillTimer.USER32(?,0000EC15), ref: 6C8A373B
                        • ValidateRect.USER32(?,00000000), ref: 6C8A3768
                        • RedrawWindow.USER32(00000185,00000000,00000000,00000185), ref: 6C8A37A5
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$InvalidateKillTimer$ClientCursorRedrawScreenValidateWindow
                        • String ID:
                        • API String ID: 1459077570-0
                        • Opcode ID: 232df87fea1109fe4a02eab918304d5a0bac2e6d4caa273e8fd49b6d53fe85be
                        • Instruction ID: 5e412a192d20d8370f3d07845fb047c6837b04ceb9cb4888b34636efde1885e4
                        • Opcode Fuzzy Hash: 232df87fea1109fe4a02eab918304d5a0bac2e6d4caa273e8fd49b6d53fe85be
                        • Instruction Fuzzy Hash: 00915071A00A06AFDB15DFB8CA849ADF7B8FF09314F144669E519A3A50DB30BD92DF40
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Cursor$Window$CaptureKillLoadParentRectReleaseTimerUpdate
                        • String ID:
                        • API String ID: 2135910768-0
                        • Opcode ID: 8402bc758081ef09d77666b7ef8bda58d88a0789f4dbbc1220c7cdd50cd93998
                        • Instruction ID: 2a0217dc12f9909e1ddc3327e0f66a7c3b35730dccb266c5777bf33c25df1d9f
                        • Opcode Fuzzy Hash: 8402bc758081ef09d77666b7ef8bda58d88a0789f4dbbc1220c7cdd50cd93998
                        • Instruction Fuzzy Hash: DE71F235F056099FEF248FA4CA94ABEB775FF49314F244929E807A7E41CB34AC418B90
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C8E50FE
                        • GetObjectW.GDI32(?,00000018,?), ref: 6C8E5123
                        • GetObjectW.GDI32(?,00000054,?), ref: 6C8E5168
                        • CreateCompatibleDC.GDI32(00000000), ref: 6C8E5254
                        • SelectObject.GDI32(?,?), ref: 6C8E5276
                        • GetPixel.GDI32(?,00000000,00000000), ref: 6C8E52D5
                        • GetPixel.GDI32(?,?,00000000), ref: 6C8E52E7
                        • SetPixel.GDI32(?,00000000,00000000,00000000), ref: 6C8E52F6
                        • SetPixel.GDI32(?,?,00000000,00000000), ref: 6C8E5308
                        • SelectObject.GDI32(?,00000000), ref: 6C8E5356
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ObjectPixel$Select$CompatibleCreateH_prolog3_
                        • String ID:
                        • API String ID: 1266819874-0
                        • Opcode ID: d523077776a85f8cac1e2152ec5046c7efdfebd42a47ab24190a882e53994972
                        • Instruction ID: 75518bf82d1a84b3bd4679455c00baba8c8f2561feffc9fa4a2f70a44af170a5
                        • Opcode Fuzzy Hash: d523077776a85f8cac1e2152ec5046c7efdfebd42a47ab24190a882e53994972
                        • Instruction Fuzzy Hash: C3811775E003299BDF20CFA9C984A9DBBB5FF4A304F248569E858A7701DB70AD85CF50
                        APIs
                        • GetCursorPos.USER32(?), ref: 6C89F1BD
                        • ScreenToClient.USER32(?,?), ref: 6C89F1CA
                        • KillTimer.USER32(?,0000EC17), ref: 6C89F1E2
                        • PtInRect.USER32(?,?,?), ref: 6C89F211
                        • KillTimer.USER32(?,0000EC18), ref: 6C89F2A0
                        • GetParent.USER32(?), ref: 6C89F2B5
                        • PtInRect.USER32(?,?,?), ref: 6C89F2E1
                        • KillTimer.USER32(?,0000EC07), ref: 6C89F340
                        • GetClientRect.USER32(?,?), ref: 6C89F354
                        • PtInRect.USER32(?,?,?), ref: 6C89F364
                          • Part of subcall function 6C86931F: ShowWindow.USER32(?,?,00000000,?,6C86CF2F,00000000,?,?,?,?,?,?,?,6C86CA7A,00000000,000000FF), ref: 6C869330
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$KillTimer$Client$CursorParentScreenShowWindow
                        • String ID:
                        • API String ID: 966434589-0
                        • Opcode ID: 4f4c609e78edbcc371f5776985317d326802fc0738e58dd779b4516cc9f21aba
                        • Instruction ID: 284143e82a5acf2bffab40a49bfc6e321888797fdc9eb57d10b05480fd19fd41
                        • Opcode Fuzzy Hash: 4f4c609e78edbcc371f5776985317d326802fc0738e58dd779b4516cc9f21aba
                        • Instruction Fuzzy Hash: 9351B331B00616DFDF198F69C944AAEBB79FF48708F10461AF805E3A50DB34E851DB90
                        APIs
                        • __EH_prolog3_catch.LIBCMT ref: 6C87A026
                        • FindResourceW.KERNEL32(?,00000000,00000005,00000024,6C85F62E), ref: 6C87A067
                        • LoadResource.KERNEL32(?,00000000), ref: 6C87A073
                        • LockResource.KERNEL32(?,00000024,6C85F62E), ref: 6C87A083
                        • GetDesktopWindow.USER32 ref: 6C87A0BA
                        • IsWindowEnabled.USER32(00000000), ref: 6C87A0C5
                        • EnableWindow.USER32(00000000,00000000), ref: 6C87A0D1
                        • EnableWindow.USER32(00000000,00000001), ref: 6C87A1B5
                        • GetActiveWindow.USER32 ref: 6C87A1BF
                        • SetActiveWindow.USER32(00000000,?,00000024,6C85F62E), ref: 6C87A1CB
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$Resource$ActiveEnable$DesktopEnabledFindH_prolog3_catchLoadLock
                        • String ID:
                        • API String ID: 723642982-0
                        • Opcode ID: f4d47bf5cb719ae9eecfe544ad85d5b791f207422e504fc6e4ad117679a1fa6d
                        • Instruction ID: 07fa0383d9cac945f0a2e0e3e62714b1a5cea4a8de49e6e6531ea6d0c974d2a6
                        • Opcode Fuzzy Hash: f4d47bf5cb719ae9eecfe544ad85d5b791f207422e504fc6e4ad117679a1fa6d
                        • Instruction Fuzzy Hash: F9517F30B01615DBDF309BA5CA88AEDBAB5AF08719F145915E811B7B81EB78D840CBB1
                        APIs
                        • DefWindowProcW.USER32(?,00000046,00000000,?,?), ref: 6C8875BA
                        • GetWindowRect.USER32(?,?), ref: 6C8875D9
                        • SetRect.USER32(?,?,00000000,?,?), ref: 6C887618
                        • InvalidateRect.USER32(?,?,00000001), ref: 6C887627
                        • SetRect.USER32(?,?,00000000,?,?), ref: 6C88763F
                        • InvalidateRect.USER32(?,?,00000001), ref: 6C88764E
                        • SetRect.USER32(?,00000000,?,?,?), ref: 6C887676
                        • InvalidateRect.USER32(?,?,00000001), ref: 6C887685
                        • SetRect.USER32(?,00000000,?,00000001,?), ref: 6C88769C
                        • InvalidateRect.USER32(?,?,00000001), ref: 6C8876AB
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Invalidate$Window$Proc
                        • String ID:
                        • API String ID: 570070710-0
                        • Opcode ID: 7f756bedf09bbd550d5d8bf1f6266f450e71844371f74a3589e44e0f27429fa8
                        • Instruction ID: 682ab869540b8763db26e8ac3aff711ff50867242d016759c3897b51179c7f74
                        • Opcode Fuzzy Hash: 7f756bedf09bbd550d5d8bf1f6266f450e71844371f74a3589e44e0f27429fa8
                        • Instruction Fuzzy Hash: 7C41F972A0164AAFDB10CFA4CD89FAFBBB8FF49714F600519F645A2590D770A980CB61
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8E3D5A
                        • CopyImage.USER32(?,00000000,00000000,00000000,00002000), ref: 6C8E3DCB
                        • SelectObject.GDI32(00000000,?), ref: 6C8E3CA7
                          • Part of subcall function 6C87C329: DeleteObject.GDI32(?), ref: 6C87C33B
                        • SelectObject.GDI32(?,?), ref: 6C8E3CBC
                        • DeleteObject.GDI32(00000000), ref: 6C8E3D1D
                        • DeleteDC.GDI32(00000000), ref: 6C8E3D2C
                        • LeaveCriticalSection.KERNEL32(6CA3A080), ref: 6C8E3D43
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Object$Delete$Select$CopyCriticalH_prolog3ImageLeaveSection
                        • String ID:
                        • API String ID: 1753285881-3916222277
                        • Opcode ID: 9629c66ccb637ac421802b7397bc595bd3ae3057ac6459854d1aec880b556227
                        • Instruction ID: b88ef1ae354a27ccc9ed279c2b865afa62024c54d4d83def5ad96a96ef91a994
                        • Opcode Fuzzy Hash: 9629c66ccb637ac421802b7397bc595bd3ae3057ac6459854d1aec880b556227
                        • Instruction Fuzzy Hash: A851A134600605AFDF319F64CE84AAE7775EF0B318F208925EA14ABD61D770AD85CBA0
                        APIs
                        • LoadLibraryW.KERNEL32(Comctl32.dll), ref: 6C861B4E
                          • Part of subcall function 6C861914: GetProcAddress.KERNEL32(00000000,6C868C62), ref: 6C861942
                        • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6C861A68
                        • SetLastError.KERNEL32(0000006F), ref: 6C861A7C
                        • GetLastError.KERNEL32 ref: 6C861AD3
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ErrorLast$AddressFileLibraryLoadModuleNameProc
                        • String ID: $@$Comctl32.dll$GetModuleHandleExW
                        • API String ID: 3640817601-4183358198
                        • Opcode ID: 51dd73b7a8e16db2b0c3581674ed1b847d2cd407523bb0fb5045cdfcc4ef0638
                        • Instruction ID: 166a559fe2b5fb3eab7a0a96931437f69cbd4969e33d184a9884e005a37bc9bb
                        • Opcode Fuzzy Hash: 51dd73b7a8e16db2b0c3581674ed1b847d2cd407523bb0fb5045cdfcc4ef0638
                        • Instruction Fuzzy Hash: B1410D71A05618ABDB30CB76CD88FDD7278EB45755F200AA6E118E2EE1EB74D980CF50
                        APIs
                        • EnterCriticalSection.KERNEL32(6CA3A104,?,?,?,6C898FBA,00000001), ref: 6C8F8F71
                        • SetThreadPriority.KERNEL32(00000000,000000FF), ref: 6C8F8FA2
                        • LeaveCriticalSection.KERNEL32(6CA3A104), ref: 6C8F8FB8
                        • PlaySoundW.WINMM(MenuCommand,00000000,00012002), ref: 6C8F9009
                        • Sleep.KERNEL32(00000005,?,6CA3A104,?,?,?,?,6C898FBA,00000001), ref: 6C8F9034
                        • PlaySoundW.WINMM(00000000,00000000,00000040), ref: 6C8F9049
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CriticalPlaySectionSound$EnterLeavePrioritySleepThread
                        • String ID: MenuCommand$MenuPopup
                        • API String ID: 2370138168-2036262055
                        • Opcode ID: 150b92553a2c5557626d7f671527b7d4ee36d4b9d2b82476534145aaa154bb9e
                        • Instruction ID: 3b4a7e8443d9a42c8c6a1d4746d7b22348ce47556ca55793067dbb7a1bfac292
                        • Opcode Fuzzy Hash: 150b92553a2c5557626d7f671527b7d4ee36d4b9d2b82476534145aaa154bb9e
                        • Instruction Fuzzy Hash: 4431C5316046056FDB344A6A8E49B1677B5E7933B8F305B16F638D2AC0D77098838F60
                        APIs
                        • GetStockObject.GDI32(00000011), ref: 6C88F490
                        • GetStockObject.GDI32(0000000D), ref: 6C88F49C
                        • GetObjectW.GDI32(00000000,0000005C,?), ref: 6C88F4AD
                        • GetDC.USER32(00000000), ref: 6C88F4BC
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6C88F4D3
                        • MulDiv.KERNEL32(?,00000048,00000000), ref: 6C88F4DF
                        • ReleaseDC.USER32(00000000,00000000), ref: 6C88F4EB
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Object$Stock$CapsDeviceRelease
                        • String ID: System
                        • API String ID: 46613423-3470857405
                        • Opcode ID: 6d3131b26a868ed3e3b5f6e660fdb14a47cb91e57511abb121270a601b311463
                        • Instruction ID: 7786ea34ffa6bb14a8a5184c01a329086bc8322b997057a17d86380747d44751
                        • Opcode Fuzzy Hash: 6d3131b26a868ed3e3b5f6e660fdb14a47cb91e57511abb121270a601b311463
                        • Instruction Fuzzy Hash: C811AC30705308ABEB209FA5CD49FAF7BB9EF56705F20411AF606EB680DA609900CA24
                        APIs
                        • GetStockObject.GDI32(00000011), ref: 6C88F490
                        • GetStockObject.GDI32(0000000D), ref: 6C88F49C
                        • GetObjectW.GDI32(00000000,0000005C,?), ref: 6C88F4AD
                        • GetDC.USER32(00000000), ref: 6C88F4BC
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6C88F4D3
                        • MulDiv.KERNEL32(?,00000048,00000000), ref: 6C88F4DF
                        • ReleaseDC.USER32(00000000,00000000), ref: 6C88F4EB
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Object$Stock$CapsDeviceRelease
                        • String ID: System
                        • API String ID: 46613423-3470857405
                        • Opcode ID: c0bf6c0f9c368209d11875d3912fe4bb25569994bb11a6022ac2fb99ba0331df
                        • Instruction ID: 09dec003140ffc61d4420f29c0da399f7be5ccf6730c1ba05c0a504c28d28831
                        • Opcode Fuzzy Hash: c0bf6c0f9c368209d11875d3912fe4bb25569994bb11a6022ac2fb99ba0331df
                        • Instruction Fuzzy Hash: AE11AF30705308ABEB109FA5CD49FAF7BB9EF55705F20401AF606EB680DE6099008624
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$ActiveFocus$MessageSend
                        • String ID: u
                        • API String ID: 1556911595-4067256894
                        • Opcode ID: e9ce4c46d02fc87d4de42f3bd5f4c8f6462a600471f3327760a5258b750087d8
                        • Instruction ID: 9dc90339c54569b59b097a74afb3d7c3f62d46db8cd530196b9d29930b5830d2
                        • Opcode Fuzzy Hash: e9ce4c46d02fc87d4de42f3bd5f4c8f6462a600471f3327760a5258b750087d8
                        • Instruction Fuzzy Hash: D0110832209604ABFF219E76CA58A6E37B5EBCA719F208D20F511D5D84DF35CC548B40
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C979C67
                          • Part of subcall function 6C87F682: EnterCriticalSection.KERNEL32(6CA38B60,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6B3
                          • Part of subcall function 6C87F682: InitializeCriticalSection.KERNEL32(00000000,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6C9
                          • Part of subcall function 6C87F682: LeaveCriticalSection.KERNEL32(6CA38B60,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6D7
                          • Part of subcall function 6C87F682: EnterCriticalSection.KERNEL32(00000000,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498,00000120), ref: 6C87F6E4
                        • GetProfileIntW.KERNEL32(windows,DragScrollInset,0000000B), ref: 6C979CB2
                        • GetProfileIntW.KERNEL32(windows,DragScrollDelay,00000032), ref: 6C979CC5
                        • GetProfileIntW.KERNEL32(windows,DragScrollInterval,00000032), ref: 6C979CD8
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CriticalSection$Profile$Enter$H_prolog3InitializeLeave
                        • String ID: DragScrollDelay$DragScrollInset$DragScrollInterval$windows
                        • API String ID: 4229786687-1024936294
                        • Opcode ID: 96cb987124badf8b6c3e1dd0f2b6d884a2674f0bea1162ca011a67244dc7e363
                        • Instruction ID: e8cd4e190f488ef0dd5aa9bf6785cb9ca16338d32d33a0230319518b4ed2ea44
                        • Opcode Fuzzy Hash: 96cb987124badf8b6c3e1dd0f2b6d884a2674f0bea1162ca011a67244dc7e363
                        • Instruction Fuzzy Hash: D501D8B1740741DFCF30DF68890570DB6F0FB29B08F004829F24ADBA81D37494818B14
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C915F3F
                        • UnionRect.USER32(?,?,?), ref: 6C915F97
                        • EqualRect.USER32(?,?), ref: 6C915FA5
                        • CreateCompatibleDC.GDI32(00000000), ref: 6C915FDF
                        • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C916010
                        • SelectObject.GDI32(?,00000000), ref: 6C916070
                        • BitBlt.GDI32(?,00000000,00000000,?,?,00000001,?,?,00CC0020), ref: 6C916098
                        • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 6C9161E9
                        • DeleteObject.GDI32(?), ref: 6C916203
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CompatibleCreateObjectRect$BitmapDeleteEqualH_prolog3_SelectUnion
                        • String ID:
                        • API String ID: 1408062871-0
                        • Opcode ID: e2b1b6d765358aeb89613bfbeffc2657af242133d8c7c1a3ff18b6ec61f316a6
                        • Instruction ID: 16ddb9746963c2a37ad5beacf4b33011d8b48d2d74cf0e49d7b06148aaa91e0e
                        • Opcode Fuzzy Hash: e2b1b6d765358aeb89613bfbeffc2657af242133d8c7c1a3ff18b6ec61f316a6
                        • Instruction Fuzzy Hash: F2B10375E046199FCF14CF98C985A8DBBBAFF48314F25812AE819EB750DB30E945CB80
                        APIs
                          • Part of subcall function 6C87C25D: GetFocus.USER32 ref: 6C87C261
                          • Part of subcall function 6C87C25D: GetParent.USER32(00000000), ref: 6C87C282
                          • Part of subcall function 6C87C25D: GetWindowLongW.USER32(?,000000F0), ref: 6C87C2A1
                          • Part of subcall function 6C87C25D: GetParent.USER32(?), ref: 6C87C2AF
                          • Part of subcall function 6C87C25D: GetDesktopWindow.USER32 ref: 6C87C2B7
                          • Part of subcall function 6C87C25D: SendMessageW.USER32(00000000,0000014F,00000000,00000000), ref: 6C87C2CB
                        • GetMenu.USER32(?), ref: 6C86B9F6
                        • GetMenuItemCount.USER32(?), ref: 6C86BA34
                        • GetSubMenu.USER32(?,00000000), ref: 6C86BA4A
                        • GetMenuItemCount.USER32(?), ref: 6C86BA6F
                        • GetMenuItemID.USER32(?,00000000), ref: 6C86BA89
                        • GetSubMenu.USER32(?,?), ref: 6C86BAA5
                        • GetMenuItemID.USER32(?,00000000), ref: 6C86BABD
                        • GetMenuItemCount.USER32(?), ref: 6C86BADE
                        • GetMenuItemID.USER32(?,?), ref: 6C86BB14
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Menu$Item$Count$ParentWindow$DesktopFocusLongMessageSend
                        • String ID:
                        • API String ID: 4186786570-0
                        • Opcode ID: 100891ea34ebe25a8b28c3a997e359cb0a17e92cd435b102d41c97da4656df05
                        • Instruction ID: f4fd6637bb4aab84429a9d8b723cdb734d2528d6e4a16bd036767d40a27c8caa
                        • Opcode Fuzzy Hash: 100891ea34ebe25a8b28c3a997e359cb0a17e92cd435b102d41c97da4656df05
                        • Instruction Fuzzy Hash: 0D61BE70A01515AFCF20CF66CA84BBDBBB5FF44719F208929E815A7E54EB30A940DB60
                        APIs
                        • ClientToScreen.USER32 ref: 6C88425A
                        • GetSystemMetrics.USER32(00000025), ref: 6C884262
                        • GetSystemMetrics.USER32(00000025), ref: 6C884278
                        • GetSystemMetrics.USER32(00000024), ref: 6C88428C
                        • GetSystemMetrics.USER32(00000024), ref: 6C8842A0
                        • CreateEllipticRgn.GDI32(00000000,00000000,00000020,00000020,?,?,00000020,00000020,00000000,00000000,00000000,00000800,00000000,00000000,00000000), ref: 6C884319
                        • SetWindowRgn.USER32(?,00000000,00000001), ref: 6C884330
                        • SetCapture.USER32(?,?,?,00000020,00000020,00000000,00000000,00000000,00000800,00000000,00000000,00000000), ref: 6C884339
                        • SetTimer.USER32(?,0000EC08,00000032,00000000), ref: 6C884352
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MetricsSystem$CaptureClientCreateEllipticScreenTimerWindow
                        • String ID:
                        • API String ID: 47050291-0
                        • Opcode ID: 94df90f951d6238b94b9f94e49d110b0e4c911be7255b58b6aa249e38eef3dc0
                        • Instruction ID: bf33d9e512208209b07031869a44dd3f44c8090be7112da172ba0bd06ff6f88c
                        • Opcode Fuzzy Hash: 94df90f951d6238b94b9f94e49d110b0e4c911be7255b58b6aa249e38eef3dc0
                        • Instruction Fuzzy Hash: 3E317C71704B01AFEB189F74CC4AFAEBB74FF48704F10452CE64AA7681DB71A8408B90
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C86D660
                        • GetMenuItemCount.USER32(?), ref: 6C86D6A6
                        • GetMenuItemCount.USER32(8007000E), ref: 6C86D6B2
                        • GetSubMenu.USER32(8007000E,-00000001), ref: 6C86D6C9
                        • GetMenuItemCount.USER32(00000000), ref: 6C86D6DC
                        • GetSubMenu.USER32(00000000,00000000), ref: 6C86D6ED
                        • RemoveMenu.USER32(00000000,00000000,00000400,?,?,?,?,8007000E,6CA1FE58,0000000C,00000004,6C841E5D), ref: 6C86D707
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Menu$CountItem$H_prolog3Remove
                        • String ID:
                        • API String ID: 3061525546-0
                        • Opcode ID: 8a196584eaea21427c47ce3bb1d50ac4ed420582fc5b640da0c4edb6ca26439d
                        • Instruction ID: c1059d4111c7991442c10e04a42999ef8411b4c9a970c1ee212170a2b90bfdbf
                        • Opcode Fuzzy Hash: 8a196584eaea21427c47ce3bb1d50ac4ed420582fc5b640da0c4edb6ca26439d
                        • Instruction Fuzzy Hash: F221D571600208EFDF208F66CE48B9EBB79FF42744F308926F519A6D40DB30DA41CA51
                        APIs
                        • GetPropW.USER32(?,?), ref: 6C881219
                        • GlobalLock.KERNEL32(00000000), ref: 6C881226
                        • SendMessageW.USER32(?,00000476,00000000,00000000), ref: 6C881241
                        • GlobalUnlock.KERNEL32(00000000), ref: 6C88124C
                        • RemovePropW.USER32(?), ref: 6C88125B
                        • GlobalFree.KERNEL32(00000000), ref: 6C881266
                        • GlobalUnlock.KERNEL32(00000000), ref: 6C881288
                        • GetAsyncKeyState.USER32(00000011), ref: 6C881299
                        • SendMessageW.USER32(?,00000475,00000000,?), ref: 6C8812C1
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Global$MessagePropSendUnlock$AsyncFreeLockRemoveState
                        • String ID:
                        • API String ID: 723318029-0
                        • Opcode ID: 032a884229afe2ec6c481a14b08b0a92db3dba3cb9a6d33743b7ba301664e90a
                        • Instruction ID: 9b4ee5f5e653f6fef5871039526b491337f120fea716fd0c04e4133972056419
                        • Opcode Fuzzy Hash: 032a884229afe2ec6c481a14b08b0a92db3dba3cb9a6d33743b7ba301664e90a
                        • Instruction Fuzzy Hash: F7218031306B05ABDF30AB62CE48B567679BB06759F208A2DF626E2D50DF70E480DB50
                        APIs
                        • GetDlgItem.USER32(?,?), ref: 6C880FD9
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 6C880FE8
                        • IsWindowEnabled.USER32(00000000), ref: 6C880FF6
                        • GetDlgItem.USER32(?,00003024), ref: 6C88100D
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 6C881019
                        • IsWindowEnabled.USER32(?), ref: 6C881029
                        • GetFocus.USER32 ref: 6C88104A
                        • IsWindowEnabled.USER32(00000000), ref: 6C881051
                        • SetFocus.USER32(?), ref: 6C88105E
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$Enabled$FocusItemLong
                        • String ID:
                        • API String ID: 1558694495-0
                        • Opcode ID: 475fe47081b4373c8fb0bd35d505f2d92214cfef37c093709c789c31987f01bd
                        • Instruction ID: 7a4d4804f7cdfba177de7f183cbdcec04667b36387576a7f5e458cd249637c45
                        • Opcode Fuzzy Hash: 475fe47081b4373c8fb0bd35d505f2d92214cfef37c093709c789c31987f01bd
                        • Instruction Fuzzy Hash: 27112731709915ABDF215F65CD48B9D7A78FF0A769F200524F925E2960DF31E880EB80
                        APIs
                          • Part of subcall function 6C8E3ECE: GdipGetImagePixelFormat.GDIPLUS(?,6CA3A080,00000000,00000000,?,6C8E2B3B,7CCA8F6A,?,00000000,6CA3A080), ref: 6C8E3EDC
                          • Part of subcall function 6C8E3E86: GdipGetImagePalette.GDIPLUS(?,00000000,?,?,?,6C8E2C5A,00000000,?,00000000,00000000,00000000,?,00000000,00000000,00000000,7CCA8F6A), ref: 6C8E3E95
                        • GdipBitmapLockBits.GDIPLUS(?,?,00000001,?,?,00000000,00000000,?,00000000,00000000,00000000,7CCA8F6A,?,00000000,6CA3A080), ref: 6C8E2D4F
                        • GdipBitmapUnlockBits.GDIPLUS(?,?,?,?,00000001,?,?,00000000,00000000,?,00000000,00000000,00000000,7CCA8F6A,?,00000000), ref: 6C8E2DFF
                        • GdipDrawImageI.GDIPLUS(?,00000000,00000000,00000000,?,?,00000082,00000000,00022009,?,00000000,00000000,?,00000000,00000000,00000000), ref: 6C8E2E51
                        • GdipDeleteGraphics.GDIPLUS(?,?,00000000,00000000,00000000,?,?,00000082,00000000,00022009,?,00000000,00000000,?,00000000,00000000), ref: 6C8E2E5C
                        • GdipDisposeImage.GDIPLUS(?,?,?,00000000,00000000,00000000,?,?,00000082,00000000,00022009,?,00000000,00000000,?,00000000), ref: 6C8E2E67
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Gdip$Image$BitmapBits$DeleteDisposeDrawFormatGraphicsLockPalettePixelUnlock
                        • String ID: &$ &
                        • API String ID: 1665940520-360661826
                        • Opcode ID: ac0883faaf32932929c1b7994a582a1c6ad9a5ce667ec2930d54cea1529c1a38
                        • Instruction ID: f68b1115e4b7e0b4e4fe9b2b3c203d6d82e3a8992e68fa36ea1278337c6a9b18
                        • Opcode Fuzzy Hash: ac0883faaf32932929c1b7994a582a1c6ad9a5ce667ec2930d54cea1529c1a38
                        • Instruction Fuzzy Hash: 80A1B7B1A0012A9BCB24CF14CD80BDDB7B9EF89318F5545E9EA19A7701C7349E85CF98
                        APIs
                        • GetModuleHandleW.KERNEL32(user32.dll), ref: 6C864EC1
                        • GetProcAddress.KERNEL32(00000000,GetGestureInfo), ref: 6C864EF6
                        • GetProcAddress.KERNEL32(00000000,CloseGestureInfoHandle), ref: 6C864F1E
                        • ScreenToClient.USER32(?,?), ref: 6C864FAA
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AddressProc$ClientHandleModuleScreen
                        • String ID: CloseGestureInfoHandle$GetGestureInfo$user32.dll
                        • API String ID: 471820996-2905070798
                        • Opcode ID: b36aae35823106cf78e2d630e758192dd0a40a9d5fdc89cdddaa1c2745185cf2
                        • Instruction ID: 8d1abe0f73e314c12e6523fcb4f7668e8b8a8cb4f9af074c249d67ab80df2d68
                        • Opcode Fuzzy Hash: b36aae35823106cf78e2d630e758192dd0a40a9d5fdc89cdddaa1c2745185cf2
                        • Instruction Fuzzy Hash: D4816A74704A06EFCB29CF6ACA549A9BBB0FF49314B10496AE805E7F51DB31E951CF80
                        APIs
                        • __EH_prolog3_catch.LIBCMT ref: 6C8998DC
                        • IsWindow.USER32(?), ref: 6C899A0F
                          • Part of subcall function 6C868E82: GetDlgCtrlID.USER32(?), ref: 6C868E8D
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CtrlH_prolog3_catchWindow
                        • String ID: %TsMFCToolBar-%d$%TsMFCToolBar-%d%x$Buttons$MFCToolBars$Name
                        • API String ID: 2286275402-190999575
                        • Opcode ID: 85ee47c6d10debcac96df21e649a69e87aeada6aae2e43438cc1fe3fd618b69d
                        • Instruction ID: 53f8ccae99c2bca9d93bbb040078e6b617525a23469a16b372b280f2b086bb63
                        • Opcode Fuzzy Hash: 85ee47c6d10debcac96df21e649a69e87aeada6aae2e43438cc1fe3fd618b69d
                        • Instruction Fuzzy Hash: E5719F70A01219DFCF11DFA8CA44AEDBBB5EF59318F244469E805B7790DB34AE05CBA1
                        APIs
                        • SystemTimeToVariantTime.OLEAUT32(?,?), ref: 6C88F605
                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 6C88F631
                        • __EH_prolog3.LIBCMT ref: 6C88F69D
                        • VarBstrFromDate.OLEAUT32(?,?,?,?,?), ref: 6C88F739
                        • SysFreeString.OLEAUT32(?), ref: 6C88F78C
                        • SysFreeString.OLEAUT32(?), ref: 6C88F7C9
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Time$FreeStringSystemVariant$BstrDateFromH_prolog3
                        • String ID: Invalid DateTime
                        • API String ID: 4133050923-2190634649
                        • Opcode ID: a816bfab2270ae368026816fddca4f3f4850d3bd6514506d55f4d0c7fd874b01
                        • Instruction ID: bfe314fb957dade90792f86c19b2b5ce4ce28173e81a65aa1f6eeaf3a6228a2c
                        • Opcode Fuzzy Hash: a816bfab2270ae368026816fddca4f3f4850d3bd6514506d55f4d0c7fd874b01
                        • Instruction Fuzzy Hash: B051E835901509ABCF10EFA8CB409FEB774AF11758F644A18F911A7F94EB30AD45CBA4
                        APIs
                        • CheckMenuItem.USER32(?,?,00000400), ref: 6C8716D5
                          • Part of subcall function 6C87C382: GetWindowTextW.USER32(00000104,?,00000100), ref: 6C87C3E0
                          • Part of subcall function 6C87C382: lstrcmpW.KERNEL32(?,?), ref: 6C87C3F2
                          • Part of subcall function 6C87C382: SetWindowTextW.USER32(00000104,?), ref: 6C87C3FE
                        • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 6C8716F0
                        • SendMessageW.USER32(?,000000F1,?,00000000), ref: 6C87170D
                        • SetMenuItemBitmaps.USER32(?,?,00000400,00000000,00000000), ref: 6C87177A
                        • SetMenuItemInfoW.USER32(?,?,00000001,?), ref: 6C8717CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ItemMenu$MessageSendTextWindow$BitmapsCheckInfolstrcmp
                        • String ID: 0$@
                        • API String ID: 72408025-1545510068
                        • Opcode ID: 0d1a5f54103db23fddfee6ee39c3b57e346a1703d94d7c0719dbd936a719092d
                        • Instruction ID: 563a530314e51dabfa471362ae2910ad3c45a2d091a34f44a22d42a502ff474a
                        • Opcode Fuzzy Hash: 0d1a5f54103db23fddfee6ee39c3b57e346a1703d94d7c0719dbd936a719092d
                        • Instruction Fuzzy Hash: 0041D171600205AFDB348F55C954F9ABBB9FF01794F208A29F508ABE50E775E841CBE0
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C995CFF
                        • IsAppThemed.UXTHEME(0000003C,6C995E74,?), ref: 6C995D41
                        • OpenThemeData.UXTHEME(?,Button), ref: 6C995D6C
                        • GetThemePartSize.UXTHEME(?,00000005,00000003,00000005,00000000,00000001,00000000,00000000,00000000), ref: 6C995DB3
                        • CloseThemeData.UXTHEME(?,?), ref: 6C995DD4
                        • GetObjectW.GDI32(?,00000018,?), ref: 6C995DFD
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Theme$Data$CloseH_prolog3ObjectOpenPartSizeThemed
                        • String ID: Button
                        • API String ID: 1633685699-1034594571
                        • Opcode ID: 5afb3f4c6e1eeb968b0a25efbee7bd7e41fe3c478d19238c7ca728dc584f0c0c
                        • Instruction ID: 310f96059ccb39bef27500a08abfe89119015f44c19b65d955c74522b11b0552
                        • Opcode Fuzzy Hash: 5afb3f4c6e1eeb968b0a25efbee7bd7e41fe3c478d19238c7ca728dc584f0c0c
                        • Instruction Fuzzy Hash: BA318F71A0020AABEB14CFA4CC55BAFB7B8FF54705F244429E501FA690EB70EA45CB60
                        APIs
                        • GetModuleHandleW.KERNEL32(uxtheme.dll), ref: 6C87EABC
                        • GetProcAddress.KERNEL32(00000000,DrawThemeTextEx), ref: 6C87EACC
                        • EncodePointer.KERNEL32(00000000), ref: 6C87EAD5
                        • DecodePointer.KERNEL32(00000000), ref: 6C87EAE3
                        • DrawThemeText.UXTHEME(?,?,?,?,?,?,?,00000000,?), ref: 6C87EB30
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeDrawEncodeHandleModuleProcTextTheme
                        • String ID: DrawThemeTextEx$uxtheme.dll
                        • API String ID: 1727381832-3035683158
                        • Opcode ID: 028156293967d3928033da55dfc31be4b824696ff62cda6bff3c6f549ae7d607
                        • Instruction ID: 7842d292183890123ad357f7b6101944cf56b8cc71e0dcc5e13c4899f5ac05ed
                        • Opcode Fuzzy Hash: 028156293967d3928033da55dfc31be4b824696ff62cda6bff3c6f549ae7d607
                        • Instruction Fuzzy Hash: 4911D33260561ABFCF229FA0CD04DDE3F76FF0D395B148514FA05A1121D732D861ABA0
                        APIs
                        • GetParent.USER32(?), ref: 6C89DB50
                        • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 6C89DB8C
                          • Part of subcall function 6C89F751: GetParent.USER32(?), ref: 6C89F761
                        • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 6C89DBAB
                        • GetParent.USER32(?), ref: 6C89DC64
                        • PostMessageW.USER32(?,?,?,00000000), ref: 6C89DD18
                        • GetParent.USER32(?), ref: 6C89DD82
                        • InvalidateRect.USER32(?,?,00000001,?,?,00000000,00000000), ref: 6C89DDFB
                        • UpdateWindow.USER32(?), ref: 6C89DE07
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Parent$Message$Send$InvalidatePostRectUpdateWindow
                        • String ID:
                        • API String ID: 4048132615-0
                        • Opcode ID: 5e210ac5dc8ab9a90c71e7c7533e81a5c9367b41ad2d0ae6c47741023ed8c0df
                        • Instruction ID: cd9dfb54517f10eceb033570bc71d6348f60536d639016d75d5a92eadd41bf72
                        • Opcode Fuzzy Hash: 5e210ac5dc8ab9a90c71e7c7533e81a5c9367b41ad2d0ae6c47741023ed8c0df
                        • Instruction Fuzzy Hash: 3991F331B046169FDF248F6CCA44AAE77B9BF49318B11496AE801E7B50DF30EC40CB94
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C86D8B8
                        • OleDuplicateData.OLE32(?,?,00000000), ref: 6C86D949
                        • GlobalLock.KERNEL32(00000000), ref: 6C86D96B
                        • CopyMetaFileW.GDI32(?,00000000), ref: 6C86D979
                        • GlobalUnlock.KERNEL32(00000000), ref: 6C86D987
                        • GlobalFree.KERNEL32(00000000), ref: 6C86D98E
                        • GlobalUnlock.KERNEL32(00000000), ref: 6C86D99B
                          • Part of subcall function 6C86D33C: __EH_prolog3.LIBCMT ref: 6C86D343
                        • CopyFileW.KERNEL32(?,?,00000000,?,?,00000054), ref: 6C86DB47
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Global$CopyFileUnlock$DataDuplicateFreeH_prolog3H_prolog3_LockMeta
                        • String ID:
                        • API String ID: 4039237054-0
                        • Opcode ID: 065ac5b0bb02861c56cbc681cc3193da79bf6447beed0d7452185971c2a8dd81
                        • Instruction ID: 9d8cbd159c6a226c84b24fa63c2121723081899a9d9835550a252ed9626c52ad
                        • Opcode Fuzzy Hash: 065ac5b0bb02861c56cbc681cc3193da79bf6447beed0d7452185971c2a8dd81
                        • Instruction Fuzzy Hash: 918173B1505511EFDB259F76CE4892ABBB5FF89708724C61AE4169BE54DB30FC00CB60
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$CaptureDestroyEmptyMessageParentPointsRectReleaseSendVisible
                        • String ID:
                        • API String ID: 3509494761-0
                        • Opcode ID: 3848e2803fb122ddc584d79331c3fca4b4e964ad6b38cd0ee3613b43a7ae3604
                        • Instruction ID: cc8b20745db06026efefb244c7c8cb27d2197e7dcaa3767b9f088aa416eed4b6
                        • Opcode Fuzzy Hash: 3848e2803fb122ddc584d79331c3fca4b4e964ad6b38cd0ee3613b43a7ae3604
                        • Instruction Fuzzy Hash: 7951DF307016159FDF119F24C999BAA37B5AF4A308F1444BAEC0AAF691DF30AD49CB90
                        APIs
                        • GetClientRect.USER32(?,?), ref: 6C866779
                        • BeginDeferWindowPos.USER32(00000008), ref: 6C86678F
                        • GetTopWindow.USER32(?), ref: 6C8667A0
                        • GetDlgCtrlID.USER32(00000000), ref: 6C8667A9
                        • SendMessageW.USER32(00000000,00000361,00000000,00000000), ref: 6C8667E1
                        • GetWindow.USER32(00000000,00000002), ref: 6C8667EA
                        • CopyRect.USER32(?,?), ref: 6C866805
                        • EndDeferWindowPos.USER32(00000000), ref: 6C866895
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$DeferRect$BeginClientCopyCtrlMessageSend
                        • String ID:
                        • API String ID: 1228040700-0
                        • Opcode ID: 190d2c7f069874867bb67734514e8b6027c23e62d941353c6c52a4ac427061a7
                        • Instruction ID: 0abcf53bb1a0e53463dd002df311c56898abb6e29e27f2128d48eeee86991f74
                        • Opcode Fuzzy Hash: 190d2c7f069874867bb67734514e8b6027c23e62d941353c6c52a4ac427061a7
                        • Instruction Fuzzy Hash: D651F571E01258DFDF10CFAAC984ADEB7B4BF0A315F148A59E805FBA40C735A944CBA4
                        APIs
                        • __EH_prolog3_catch_GS.LIBCMT ref: 6C8DF6F7
                          • Part of subcall function 6C871A91: __EH_prolog3.LIBCMT ref: 6C871A98
                          • Part of subcall function 6C871A91: GetWindowDC.USER32(00000000,00000004,6C88AE60,00000000), ref: 6C871AC4
                        • CreateCompatibleDC.GDI32(00000000), ref: 6C8DF737
                        • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C8DF759
                          • Part of subcall function 6C872A4C: SelectObject.GDI32(00000048,?), ref: 6C872A55
                        • FillRect.USER32(?,?,?), ref: 6C8DF7A3
                        • OpenClipboard.USER32(?), ref: 6C8DF7D3
                        • EmptyClipboard.USER32 ref: 6C8DF811
                        • SetClipboardData.USER32(00000002,00000000), ref: 6C8DF835
                        • CloseClipboard.USER32 ref: 6C8DF84F
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Clipboard$CompatibleCreate$BitmapCloseDataEmptyFillH_prolog3H_prolog3_catch_ObjectOpenRectSelectWindow
                        • String ID:
                        • API String ID: 2940850299-0
                        • Opcode ID: 7a3731a31488ad2454c53ceb809fb40ba265515ec47f5daa4539ee71fa2f97a7
                        • Instruction ID: 90227958e9d3ce5d06382b83d00767613f348102c4977357bd28a071728e3fa1
                        • Opcode Fuzzy Hash: 7a3731a31488ad2454c53ceb809fb40ba265515ec47f5daa4539ee71fa2f97a7
                        • Instruction Fuzzy Hash: 7C418F71904528EBCF20DFE8CA44ADDBB78AF19718F104569E415B7B90EB30AA48CB70
                        APIs
                        • __EH_prolog3_catch.LIBCMT ref: 6C87CF4A
                        • EnterCriticalSection.KERNEL32(?,00000010,6C87CE73,?,00000000,?,6C876CE6,00000004,6C877498,00000120,6C85F296,00000000,6CA3B478,?,Function_0018AEC0,000000FF), ref: 6C87CF5B
                        • TlsGetValue.KERNEL32(?,?,00000000,?,6C876CE6,00000004,6C877498,00000120,6C85F296,00000000,6CA3B478,?,Function_0018AEC0,000000FF,?,6C84114D), ref: 6C87CF77
                        • LocalAlloc.KERNEL32(00000000,00000000,00000010,?,?,00000000,?,6C876CE6,00000004,6C877498,00000120,6C85F296,00000000,6CA3B478,?,Function_0018AEC0), ref: 6C87CFE0
                        • LocalReAlloc.KERNEL32(?,00000000,00000002,00000010,?,?,00000000,?,6C876CE6,00000004,6C877498,00000120,6C85F296,00000000,6CA3B478), ref: 6C87CFEE
                        • TlsSetValue.KERNEL32(?,00000000), ref: 6C87D01F
                        • LeaveCriticalSection.KERNEL32(?,?,00000000,?,6C876CE6,00000004,6C877498,00000120,6C85F296,00000000,6CA3B478,?,Function_0018AEC0,000000FF,?,6C84114D), ref: 6C87D03D
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AllocCriticalLocalSectionValue$EnterH_prolog3_catchLeave
                        • String ID:
                        • API String ID: 1707010094-0
                        • Opcode ID: 4881f0342ed17812898f74930d92253d45ae056c3ff7d57abd0ca8563623f20e
                        • Instruction ID: 280fcf4e16e3ca4ba9a285ee7e38282c624b0116535c0b2eaba0b0da54a33c12
                        • Opcode Fuzzy Hash: 4881f0342ed17812898f74930d92253d45ae056c3ff7d57abd0ca8563623f20e
                        • Instruction Fuzzy Hash: A231B231601705DFCB35DF19C588A5EBBB0EF41315B20C82EE859ABA55EB70E845CB61
                        APIs
                        • ScreenToClient.USER32(?,?), ref: 6C89D1FE
                        • GetParent.USER32(?), ref: 6C89D20E
                        • GetClientRect.USER32(?,?), ref: 6C89D252
                        • MapWindowPoints.USER32(?,?,?,00000002), ref: 6C89D264
                        • PtInRect.USER32(?,?,?), ref: 6C89D274
                        • GetClientRect.USER32(?,?), ref: 6C89D2A1
                        • MapWindowPoints.USER32(?,?,?,00000002), ref: 6C89D2B3
                        • PtInRect.USER32(?,?,?), ref: 6C89D2C3
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Client$PointsWindow$ParentScreen
                        • String ID:
                        • API String ID: 1944725958-0
                        • Opcode ID: 4335a8a839b2c12ed278e1b80dde4901d65ae7a26312eeabdcfb6e538a5467f2
                        • Instruction ID: c82800f4466b259f6395a2127021ee42185e14ea6553a1e582ec21a5c6b5fbca
                        • Opcode Fuzzy Hash: 4335a8a839b2c12ed278e1b80dde4901d65ae7a26312eeabdcfb6e538a5467f2
                        • Instruction Fuzzy Hash: 7731A136A04519AFCF119FE4CD449EEB7B9FF093147204529F906E7910DB30ED448B91
                        APIs
                        • GlobalAlloc.KERNEL32(00000002,00000000,00000000,00000000,?,?,6C8E49A9,00000000,00000000,?,6C9EDEF0,?,6C8E5767,?,?,?), ref: 6C8E49C5
                        • GlobalLock.KERNEL32(00000000), ref: 6C8E49D2
                        • GlobalUnlock.KERNEL32(00000000), ref: 6C8E49DD
                        • GlobalFree.KERNEL32(00000000), ref: 6C8E49E4
                        • GlobalUnlock.KERNEL32(00000000), ref: 6C8E4A02
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,00000000), ref: 6C8E4A0F
                        • EnterCriticalSection.KERNEL32(6CA3A080,00000000), ref: 6C8E4A28
                        • LeaveCriticalSection.KERNEL32(6CA3A080,00000000), ref: 6C8E4A8F
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Global$CriticalSectionUnlock$AllocCreateEnterFreeLeaveLockStream
                        • String ID:
                        • API String ID: 295443201-0
                        • Opcode ID: 719dc6f199f5da71e89352d09e9c2d5ea617480d9ac587a146f3dd17d14533b2
                        • Instruction ID: 0e993c04fde542ce296292c9b04c723cb2b5000ac78cdb28f35fc9df4e019a1e
                        • Opcode Fuzzy Hash: 719dc6f199f5da71e89352d09e9c2d5ea617480d9ac587a146f3dd17d14533b2
                        • Instruction Fuzzy Hash: A1214831302621ABDF20ABA4CE58A5E37B9AF8B31DB104425E509F2A40DB38D941C754
                        APIs
                        • GetSystemMetrics.USER32(00000031), ref: 6C88A4BC
                        • GetSystemMetrics.USER32(00000032), ref: 6C88A4CA
                        • SetRectEmpty.USER32(?), ref: 6C88A4DD
                        • EnumDisplayMonitors.USER32(00000000,00000000,6C88A2C4,?,?,00000000,6C88A3EA), ref: 6C88A4ED
                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 6C88A4FC
                        • SystemParametersInfoW.USER32(00001002,00000000,?,00000000), ref: 6C88A529
                        • SystemParametersInfoW.USER32(00001012,00000000,?,00000000), ref: 6C88A53D
                        • SystemParametersInfoW.USER32 ref: 6C88A563
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: System$InfoParameters$Metrics$DisplayEmptyEnumMonitorsRect
                        • String ID:
                        • API String ID: 2614369430-0
                        • Opcode ID: 83ed334246815cd53ad8b9773ed03e0fbf9e5621aff7214b0f89c5f6cbc359b2
                        • Instruction ID: eb36d0848509eb8e159a476239e6ce4c9bd0b416304d177fa87dc8f1117f599a
                        • Opcode Fuzzy Hash: 83ed334246815cd53ad8b9773ed03e0fbf9e5621aff7214b0f89c5f6cbc359b2
                        • Instruction Fuzzy Hash: 70211AB0306616BFE7154F718C88AE7BBBCFF0A785F100529E959D6180D7706995CBA0
                        APIs
                        • GlobalLock.KERNEL32(00000000), ref: 6C877A88
                        • lstrcmpW.KERNEL32(00000000,?), ref: 6C877AA1
                        • OpenPrinterW.WINSPOOL.DRV(?,?,00000000), ref: 6C877AB6
                        • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6C877AD6
                        • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 6C877ADE
                        • GlobalLock.KERNEL32(00000000), ref: 6C877AEC
                        • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 6C877AFD
                        • ClosePrinter.WINSPOOL.DRV(?), ref: 6C877B15
                          • Part of subcall function 6C87C34F: GlobalFlags.KERNEL32(?), ref: 6C87C35C
                          • Part of subcall function 6C87C34F: GlobalUnlock.KERNEL32(?), ref: 6C87C36A
                          • Part of subcall function 6C87C34F: GlobalFree.KERNEL32(?), ref: 6C87C376
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                        • String ID:
                        • API String ID: 168474834-0
                        • Opcode ID: 6263b7255a1f3164095bcaacccee12ee6b0255f6b4f65e803b85157deaab7f9b
                        • Instruction ID: 1ea678ee31778ef2e6125afcc1ba211ce1b789a018334b45cafbe8e1f2012544
                        • Opcode Fuzzy Hash: 6263b7255a1f3164095bcaacccee12ee6b0255f6b4f65e803b85157deaab7f9b
                        • Instruction Fuzzy Hash: 6C116371201604FEEF325FA5CE84DAFBABDEF04748B10082AB65291921EB71D950E770
                        APIs
                        • _set_app_type.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000002), ref: 0085101E
                        • _set_fmode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000002), ref: 00851029
                        • __p__commode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000002), ref: 00851035
                        • __RTC_Initialize.LIBCMT ref: 0085104D
                        • _configure_narrow_argv.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,008517FA), ref: 00851062
                          • Part of subcall function 0085155C: InitializeSListHead.KERNEL32(008530C0,00851072), ref: 00851561
                        • __setusermatherr.API-MS-WIN-CRT-MATH-L1-1-0(Function_0000154F), ref: 00851080
                        • _configthreadlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(00000000), ref: 0085109B
                        • _initialize_narrow_environment.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 008510AA
                        Memory Dump Source
                        • Source File: 00000003.00000002.1695694382.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                        • Associated: 00000003.00000002.1695648911.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695714101.0000000000852000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695732256.0000000000853000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000854000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000896000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_850000_Update.jbxd
                        Similarity
                        • API ID: Initialize$HeadList__p__commode__setusermatherr_configthreadlocale_configure_narrow_argv_initialize_narrow_environment_set_app_type_set_fmode
                        • String ID:
                        • API String ID: 1933938900-0
                        • Opcode ID: 26e29243da49eb86b892576594a5934a49baa3da5db62cf68a58265543559884
                        • Instruction ID: 142f43561a09945192a02d693474c0e584f3223c0c5875b200987e4a915b5dac
                        • Opcode Fuzzy Hash: 26e29243da49eb86b892576594a5934a49baa3da5db62cf68a58265543559884
                        • Instruction Fuzzy Hash: 50013C49A80A4214DD1037FD094FB5E025AFF807A7F510955FD12DA1C7FEBA898C45B3
                        APIs
                        • GlobalSize.KERNEL32(?), ref: 6C86D83B
                        • GlobalAlloc.KERNEL32(00002002,00000000), ref: 6C86D853
                        • GlobalLock.KERNEL32(?), ref: 6C86D863
                        • GlobalLock.KERNEL32(?), ref: 6C86D86C
                        • GlobalSize.KERNEL32(?), ref: 6C86D879
                          • Part of subcall function 6C86D16A: _memcpy_s.LIBCMT ref: 6C86D179
                        • GlobalUnlock.KERNEL32(?), ref: 6C86D88A
                        • GlobalUnlock.KERNEL32(?), ref: 6C86D893
                        • GlobalSize.KERNEL32(?), ref: 6C86D8A3
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Global$Size$LockUnlock$Alloc_memcpy_s
                        • String ID:
                        • API String ID: 3833998449-0
                        • Opcode ID: c7825721c72703e771786d8cf7675c534f434cb543404f77a3855c41978a5e54
                        • Instruction ID: 9875bfefa3886ad510349f5d75f4eddcfec56649b92bdb4be23b3630fd4f8673
                        • Opcode Fuzzy Hash: c7825721c72703e771786d8cf7675c534f434cb543404f77a3855c41978a5e54
                        • Instruction Fuzzy Hash: E4018471606714BFDB112B66CDCCC9EBE7CEB0A6A17244926FD05E2A01DB70AD409760
                        APIs
                        • GetSystemMetrics.USER32(0000000B), ref: 6C87F600
                        • GetSystemMetrics.USER32(0000000C), ref: 6C87F60B
                        • GetSystemMetrics.USER32(00000002), ref: 6C87F616
                        • GetSystemMetrics.USER32(00000003), ref: 6C87F624
                        • GetDC.USER32(00000000), ref: 6C87F632
                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 6C87F63D
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 6C87F649
                        • ReleaseDC.USER32(00000000,00000000), ref: 6C87F655
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MetricsSystem$CapsDevice$Release
                        • String ID:
                        • API String ID: 1151147025-0
                        • Opcode ID: 0be2b8b9febbaebf1a5aaf1158de289de3157149d513448a87361160a0ab0fe8
                        • Instruction ID: cf480150e123fe8bdfb65dc1b4135342e6ddc5b1d6c1d5e708d73fc8f326f547
                        • Opcode Fuzzy Hash: 0be2b8b9febbaebf1a5aaf1158de289de3157149d513448a87361160a0ab0fe8
                        • Instruction Fuzzy Hash: 46F04971B58B10ABEF105FB1880DB467B70FB46B42F104556F20AEA1C0DBB5E1818F80
                        APIs
                        • OffsetRect.USER32(?,00000000,?), ref: 6C870ADC
                        • OffsetRect.USER32(?,?,00000000), ref: 6C870AFC
                        • SetCapture.USER32(?), ref: 6C870B6F
                        • RedrawWindow.USER32(?,00000000,00000000,00000180,00000000), ref: 6C870B8E
                        • ReleaseCapture.USER32 ref: 6C870C1C
                        • OffsetRect.USER32(?,000000FF,000000FF), ref: 6C870C92
                        • OffsetRect.USER32(?,000000FF,000000FF), ref: 6C870CA3
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: OffsetRect$Capture$RedrawReleaseWindow
                        • String ID:
                        • API String ID: 1110970518-0
                        • Opcode ID: 332114d16337108d322e9c01a0205fa993fe1d1531d02425b74a245ac85527fe
                        • Instruction ID: 30f37915dbc682b6217d9a2bc4f2b32355d85f795915dbd94464ba2d89d15f0c
                        • Opcode Fuzzy Hash: 332114d16337108d322e9c01a0205fa993fe1d1531d02425b74a245ac85527fe
                        • Instruction Fuzzy Hash: D1D1B1357009159FCF148F28C998BAD77B5AF49324F1446BAED0AAF785DF70AC418BA0
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: _strrchr
                        • String ID:
                        • API String ID: 3213747228-0
                        • Opcode ID: dcf6de6983ba25cf7fb2a1e790eb05696bef74ce987331217bebaa3cc46a5552
                        • Instruction ID: 719b3e8419f0f1b271d83cd5fdfa0efda035ecb4584875dafc6fcaf15c4ddeab
                        • Opcode Fuzzy Hash: dcf6de6983ba25cf7fb2a1e790eb05696bef74ce987331217bebaa3cc46a5552
                        • Instruction Fuzzy Hash: 46B15132A15259AFDB018F69C880BEF7BB9EFB6314F164165E804BB781D774D901C7A0
                        APIs
                        • __EH_prolog3_catch.LIBCMT ref: 6C9799C1
                          • Part of subcall function 6C97992B: OleGetClipboard.OLE32(?), ref: 6C979941
                        • ReleaseStgMedium.OLE32(?), ref: 6C979A45
                        • ReleaseStgMedium.OLE32(?), ref: 6C979A8C
                        • ReleaseStgMedium.OLE32(?), ref: 6C979A9B
                        • CoTaskMemFree.OLE32(?,?,00000000,?,?,?,?,?,?,?,00000040,6C8E6F31,?,00000000,00000000,00000000), ref: 6C979B4B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MediumRelease$ClipboardFreeH_prolog3_catchTask
                        • String ID: '
                        • API String ID: 3213536121-1997036262
                        • Opcode ID: 996de991b4f4f6c0141e96e673a676870233a036d39c0a3a60896c516889e542
                        • Instruction ID: 804ab63d4abe54d9ce0ee650b7680c519ed95562010ffaff18cf76d243894c31
                        • Opcode Fuzzy Hash: 996de991b4f4f6c0141e96e673a676870233a036d39c0a3a60896c516889e542
                        • Instruction Fuzzy Hash: B951A131A062499BDF14DFA9C544AEDBBB9EF59318F258029E900B7B80DB70D9458B70
                        APIs
                          • Part of subcall function 6C8A18AB: IsWindow.USER32(?), ref: 6C8A18B7
                        • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C87B1B3
                          • Part of subcall function 6C8A029F: GetClientRect.USER32(?,?), ref: 6C8A02C7
                          • Part of subcall function 6C8A029F: PtInRect.USER32(?,00000000,?), ref: 6C8A02E1
                        • ScreenToClient.USER32(?,?), ref: 6C87B080
                        • PtInRect.USER32(?,?,?), ref: 6C87B093
                        • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C87B0C5
                        • GetParent.USER32(?), ref: 6C87B0F5
                        • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C87B173
                        • GetFocus.USER32 ref: 6C87B179
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageRectSend$Client$FocusParentScreenWindow
                        • String ID:
                        • API String ID: 1639644240-0
                        • Opcode ID: b0ea07a143bf029c99ce242ff3fd07998641268173ebb36b2d038ec2c7447b1c
                        • Instruction ID: 7a0f6003da2f6bea6c5690a90cdd6afd34646dcd1864e1733dd9869e35078608
                        • Opcode Fuzzy Hash: b0ea07a143bf029c99ce242ff3fd07998641268173ebb36b2d038ec2c7447b1c
                        • Instruction Fuzzy Hash: 21516D71A00619AFDF30DFA9CA449AE7BB5FF49318B204969E815E7750EB30E900CB70
                        APIs
                        • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002000), ref: 6C8E4B8D
                        • GetObjectW.GDI32(00000000,00000018,?), ref: 6C8E4BAA
                        • DeleteObject.GDI32(00000000), ref: 6C8E4BB5
                        • DeleteObject.GDI32(00000000), ref: 6C8E4C5A
                          • Part of subcall function 6C8E589E: GetObjectW.GDI32(?,00000054,?), ref: 6C8E58B8
                        • __EH_prolog3.LIBCMT ref: 6C8E4AB1
                          • Part of subcall function 6C87C329: DeleteObject.GDI32(?), ref: 6C87C33B
                          • Part of subcall function 6C8E4950: FindResourceW.KERNEL32(00000000,?,PNG,?,?,?,6C9EDEF0,?,6C8E5767,?,?,?,00000038,6C8E4425), ref: 6C8E4972
                          • Part of subcall function 6C8E4950: LoadResource.KERNEL32(00000000,00000000,?,6C9EDEF0,?,6C8E5767,?,?,?,00000038,6C8E4425), ref: 6C8E4980
                          • Part of subcall function 6C8E4950: LockResource.KERNEL32(00000000,?,6C9EDEF0,?,6C8E5767,?,?,?,00000038,6C8E4425), ref: 6C8E498B
                          • Part of subcall function 6C8E4950: SizeofResource.KERNEL32(00000000,00000000,?,6C9EDEF0,?,6C8E5767,?,?,?,00000038,6C8E4425), ref: 6C8E4999
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Object$Resource$Delete$Load$FindH_prolog3ImageLockSizeof
                        • String ID:
                        • API String ID: 1337615151-3916222277
                        • Opcode ID: d60ca4229b1bb1df707b28a83e2e4b8e56194b3e6b9d78b75654363a35c9240f
                        • Instruction ID: ccbe971145c38f5ff2016cf2aa6b7ed8daf76215a4b49db8fae254288c0af348
                        • Opcode Fuzzy Hash: d60ca4229b1bb1df707b28a83e2e4b8e56194b3e6b9d78b75654363a35c9240f
                        • Instruction Fuzzy Hash: DB518871901616EFDB24EFE4CA84BEEB374BFC9308F114939E519A3A40DB34A554CBA0
                        APIs
                          • Part of subcall function 6C8E6EE9: __EH_prolog3_catch.LIBCMT ref: 6C8E6EF0
                        • UpdateWindow.USER32(?), ref: 6C895FFE
                        • EqualRect.USER32(?,?), ref: 6C89603E
                        • InflateRect.USER32(?,00000002,00000002), ref: 6C896056
                        • InvalidateRect.USER32(?,?,00000001), ref: 6C896065
                        • InflateRect.USER32(?,00000002,00000002), ref: 6C89607C
                        • InvalidateRect.USER32(?,?,00000001), ref: 6C89608E
                        • UpdateWindow.USER32(?), ref: 6C896097
                          • Part of subcall function 6C893BEA: InvalidateRect.USER32(?,?,00000001,?), ref: 6C893C61
                          • Part of subcall function 6C893BEA: InflateRect.USER32(?,00000000,?), ref: 6C893CA7
                          • Part of subcall function 6C893BEA: RedrawWindow.USER32(?,?,00000000,00000401), ref: 6C893CBB
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$InflateInvalidateWindow$Update$EqualH_prolog3_catchRedraw
                        • String ID:
                        • API String ID: 1041772997-0
                        • Opcode ID: b9d9111457c973ce8af26d260bff4f9a3c10147629f176a2d6c6ab2dfe493b5c
                        • Instruction ID: aeedee07384fc0ba92a54250df2e7f709ec62bfe99d240013e963c72dd8934e5
                        • Opcode Fuzzy Hash: b9d9111457c973ce8af26d260bff4f9a3c10147629f176a2d6c6ab2dfe493b5c
                        • Instruction Fuzzy Hash: 4B51A271A00615DFCF11CF68C884AAE77B5FF49324F244679ED1AEB281DB71A941CBA0
                        APIs
                        • GetParent.USER32(?), ref: 6C8668FA
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 6C86691C
                        • UpdateWindow.USER32(?), ref: 6C866936
                        • SendMessageW.USER32(00000000,00000121,00000001,?), ref: 6C86695C
                        • SendMessageW.USER32(?,0000036A,00000000,00000000), ref: 6C866974
                        • UpdateWindow.USER32(?), ref: 6C8669C1
                          • Part of subcall function 6C868F77: GetWindowLongW.USER32(?,000000F0), ref: 6C868F84
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 6C866A0B
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Message$Window$PeekSendUpdate$LongParent
                        • String ID:
                        • API String ID: 2853195852-0
                        • Opcode ID: e2402d9173557084a184cf6eb8695aa12d81112b0629e7f39f1c74802a535bf1
                        • Instruction ID: 4d6350edd2a4ec3b962bc45d87fcee76a35d09306ebf492a2eadcb3fe11a95ad
                        • Opcode Fuzzy Hash: e2402d9173557084a184cf6eb8695aa12d81112b0629e7f39f1c74802a535bf1
                        • Instruction Fuzzy Hash: 7C41A771B05655ABEB148F76CA44B6E7BB8FF01758F148928EC12E7E90D770E940C750
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C9204EC
                          • Part of subcall function 6C8A8EEE: __EH_prolog3.LIBCMT ref: 6C8A8EF5
                          • Part of subcall function 6C98A894: SetRectEmpty.USER32(?), ref: 6C98A8C9
                        • SetRectEmpty.USER32(?), ref: 6C92061C
                        • SetRectEmpty.USER32 ref: 6C92062D
                        • SetRectEmpty.USER32(?), ref: 6C920634
                          • Part of subcall function 6C85FC40: _wmemcpy_s.LIBCPMTD ref: 6C85FCBD
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: EmptyRect$H_prolog3$_wmemcpy_s
                        • String ID: False$True
                        • API String ID: 3178944079-1895882422
                        • Opcode ID: 2ad507bc9b0b248898e9311efbc28a3d3d970877b2faffdeba3fd3ce11556237
                        • Instruction ID: a1930b65b5d2848c0f04e6d3928ea709ef62de40196fd244ef97e7082f2ba522
                        • Opcode Fuzzy Hash: 2ad507bc9b0b248898e9311efbc28a3d3d970877b2faffdeba3fd3ce11556237
                        • Instruction Fuzzy Hash: 1B51E2B09053419FCB0ACF29C5847E8BBE8BF18304F1981BEA81C9F796CBB456448B64
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C8EBC97
                        • CopyRect.USER32(?,?), ref: 6C8EBD45
                        • IsRectEmpty.USER32(?), ref: 6C8EBD5D
                        • IsRectEmpty.USER32(?), ref: 6C8EBD75
                        • IsRectEmpty.USER32(?), ref: 6C8EBD8A
                          • Part of subcall function 6C88A57A: __EH_prolog3.LIBCMT ref: 6C88A581
                          • Part of subcall function 6C88A57A: LoadCursorW.USER32(00000000,00007F00), ref: 6C88A5A5
                          • Part of subcall function 6C88A57A: GetClassInfoW.USER32(?,?,?), ref: 6C88A5E0
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Empty$ClassCopyCursorH_prolog3H_prolog3_InfoLoad
                        • String ID: Afx:ControlBar
                        • API String ID: 685170547-4244778371
                        • Opcode ID: dbb25ae9a1b23b88450e16420041ba29e1582e0e468b2b2a4f9cc3c84d129e77
                        • Instruction ID: 34eaad367ff342d376d3cc58cf78425d319358289c7fa5ac22f3ce232abd81a0
                        • Opcode Fuzzy Hash: dbb25ae9a1b23b88450e16420041ba29e1582e0e468b2b2a4f9cc3c84d129e77
                        • Instruction Fuzzy Hash: 38414E31A006199FCF15CFA8C984AEE77B5BF5A305F144869FC05BB680DB75E909CB60
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C884BCA
                        • CreateCompatibleDC.GDI32(?), ref: 6C884BF9
                        • GetClientRect.USER32(?,?), ref: 6C884C16
                        • SelectObject.GDI32(?,?), ref: 6C884C4F
                        • BitBlt.GDI32(?,00000000,00000000,?,?,00000001,00000000,00000000,00CC0020), ref: 6C884C76
                        • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 6C884CFC
                        • SelectObject.GDI32(?,00000000), ref: 6C884D0A
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ObjectSelect$ClientCompatibleCreateH_prolog3_Rect
                        • String ID:
                        • API String ID: 1651110115-0
                        • Opcode ID: 60d3edc77c569351d5941e4d1fbd2fae1f0e1e4f8ed9d65211eef05ac3d09c97
                        • Instruction ID: a81ea93488ada4dc0a13a22278ff0aae3cc66750d3905cd060f7544751416940
                        • Opcode Fuzzy Hash: 60d3edc77c569351d5941e4d1fbd2fae1f0e1e4f8ed9d65211eef05ac3d09c97
                        • Instruction Fuzzy Hash: 9141F471A01109AFDF14DBA4CE95EEEBBB9FF98704F208129B505B3690DB706A44CB60
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 6C9A2BB7
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 6C9A2BBF
                        • _ValidateLocalCookies.LIBCMT ref: 6C9A2C48
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 6C9A2C73
                        • _ValidateLocalCookies.LIBCMT ref: 6C9A2CC8
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: csm
                        • API String ID: 1170836740-1018135373
                        • Opcode ID: 3cfed2e649bbf7df256bd22f17871808c035d2e9b9838a5add644e9243d62928
                        • Instruction ID: 63679dab979d249334cf9d9f7bdaff47fd800d3f1ff41be538028f239c598cbc
                        • Opcode Fuzzy Hash: 3cfed2e649bbf7df256bd22f17871808c035d2e9b9838a5add644e9243d62928
                        • Instruction Fuzzy Hash: BF41A634A00609AFCF04DFAAC888ADEBBB5BF56328F148195D8189BB51D731D947CB91
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C8798A1
                        • RegOpenKeyExW.ADVAPI32(80000001,?,00000000,00000008,?), ref: 6C8799A6
                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C8799C3
                        • RegCloseKey.ADVAPI32(?), ref: 6C8799E4
                        • RegQueryValueW.ADVAPI32(80000001,?,?,?), ref: 6C8799FF
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CloseEnumH_prolog3_OpenQueryValue
                        • String ID: Software\
                        • API String ID: 1666054129-964853688
                        • Opcode ID: 0ff2b7054252fbab51276fb8440ad47e8f1f76f27e403ce4fc0f318cceed3c6f
                        • Instruction ID: 3e9ebfd6b0f0740768e069349a1ad1311280938ad95d42f1d13e108c664b9aa3
                        • Opcode Fuzzy Hash: 0ff2b7054252fbab51276fb8440ad47e8f1f76f27e403ce4fc0f318cceed3c6f
                        • Instruction Fuzzy Hash: 5F416671901529BBDF309BA4DD88EEEB77CEF05318F1049E9A515A3650EB349E84CF60
                        APIs
                        • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 6C88E937
                        • GetLastError.KERNEL32 ref: 6C88E953
                        • SetFilePointer.KERNEL32(?,?,?,?,00000000,?,?,?,00000000,00000000), ref: 6C88E980
                        • GetLastError.KERNEL32(?,?,?,00000000,00000000), ref: 6C88E98E
                        • GetLastError.KERNEL32(?,?,?,00000000,00000000), ref: 6C88E9AD
                        • SetEndOfFile.KERNEL32(?,?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000), ref: 6C88EA0A
                        • GetLastError.KERNEL32(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000), ref: 6C88EA24
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ErrorLast$File$PointerRead
                        • String ID:
                        • API String ID: 839530781-0
                        • Opcode ID: 9fb20c9cb83436ce73edfadc8c54ed26c3fa0f2e249e117cd5b38401db674445
                        • Instruction ID: c556164a514f454de7b6ab12ecfc5091ad9c13b3449944ec02d0ab7955d0bda0
                        • Opcode Fuzzy Hash: 9fb20c9cb83436ce73edfadc8c54ed26c3fa0f2e249e117cd5b38401db674445
                        • Instruction Fuzzy Hash: 6031A035504518BBCF209F65DD08EDEBBB8EF05369F208929F91997A50DB74EA40CBD0
                        APIs
                        • __EH_prolog3_catch_GS.LIBCMT ref: 6C879605
                        • RegOpenKeyExW.ADVAPI32(?,00000010,00000000,0002001F,?,00000228), ref: 6C8796AB
                          • Part of subcall function 6C879598: __EH_prolog3.LIBCMT ref: 6C87959F
                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000104), ref: 6C8796CF
                        • RegCloseKey.ADVAPI32(?), ref: 6C879784
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CloseEnumH_prolog3H_prolog3_catch_Open
                        • String ID: Software\Classes\
                        • API String ID: 854624316-1121929649
                        • Opcode ID: e515b5ceb1c90bb63761d887920050167236a63f82196ec4db865bbcfee9e132
                        • Instruction ID: d0a8afc844b68d32448f207e85e8341b304b63583583caec04901a7fbc5e2887
                        • Opcode Fuzzy Hash: e515b5ceb1c90bb63761d887920050167236a63f82196ec4db865bbcfee9e132
                        • Instruction Fuzzy Hash: C541F631901118ABCB31DFA8DE88BDDB7B8AF59354F2049A9D40963740EF349E88CF20
                        APIs
                        • GetModuleHandleW.KERNEL32(user32.dll), ref: 6C865795
                        • GetProcAddress.KERNEL32(00000000,GetTouchInputInfo), ref: 6C8657CA
                        • GetProcAddress.KERNEL32(00000000,CloseTouchInputHandle), ref: 6C8657F2
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule
                        • String ID: CloseTouchInputHandle$GetTouchInputInfo$user32.dll
                        • API String ID: 667068680-1853737257
                        • Opcode ID: 436805767d3157eb59c2f83c642e58bf88ab19d80a9f67ab5151c0216d5330af
                        • Instruction ID: a592ea750b5c8d2b268c82206828d04603f400bee7eec393751f884a32650ca1
                        • Opcode Fuzzy Hash: 436805767d3157eb59c2f83c642e58bf88ab19d80a9f67ab5151c0216d5330af
                        • Instruction Fuzzy Hash: 9031D6317017119BCF388F2ACD5599E3BB9EB86768710892BE805D7F51EB30D801CB50
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C869AAC
                        • GetDesktopWindow.USER32 ref: 6C869AF2
                        • GetWindow.USER32(00000000), ref: 6C869AF9
                        • IsWindowEnabled.USER32(00000000), ref: 6C869B09
                        • SendMessageW.USER32(00000000,0000036C,00000000,00000000), ref: 6C869B34
                        • EnableWindow.USER32(00000000,00000000), ref: 6C869B40
                        • GetWindow.USER32(00000000,00000002), ref: 6C869B55
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$DesktopEnableEnabledH_prolog3MessageSend
                        • String ID:
                        • API String ID: 1052513496-0
                        • Opcode ID: 4a19272d8c248368d26f82a2514122cf1378a2a912123d02239fee30b4d09465
                        • Instruction ID: eef03d7b0246c89e88c502754e37d7dfb164a58af8fdae235d5430df23fd8f6a
                        • Opcode Fuzzy Hash: 4a19272d8c248368d26f82a2514122cf1378a2a912123d02239fee30b4d09465
                        • Instruction Fuzzy Hash: 6431B471912A25BADB325F768E05BEF7674AF01714F204939E914BBFC0EB34D9058BA0
                        APIs
                        • SetFocus.USER32(00000000,00000000), ref: 6C86B6BB
                        • GetParent.USER32(?), ref: 6C86B6C9
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 6C86B6E4
                        • GetCurrentProcessId.KERNEL32 ref: 6C86B6EA
                        • GetActiveWindow.USER32 ref: 6C86B749
                        • SendMessageW.USER32(?,00000006,00000001,00000000), ref: 6C86B75A
                        • SendMessageW.USER32(?,00000086,00000001,00000000), ref: 6C86B774
                          • Part of subcall function 6C868E3F: EnableWindow.USER32(?,00000024), ref: 6C868E50
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$MessageProcessSend$ActiveCurrentEnableFocusParentThread
                        • String ID:
                        • API String ID: 2169720751-0
                        • Opcode ID: 5f61fd5bfe3f0496341d8a6deeddc271e97a15bf1d588c02c34065b281265b6d
                        • Instruction ID: b827e3d16dd8b74878f7bd5b045879cff846d1c338cd1680dbe3d01b6a1f56ef
                        • Opcode Fuzzy Hash: 5f61fd5bfe3f0496341d8a6deeddc271e97a15bf1d588c02c34065b281265b6d
                        • Instruction Fuzzy Hash: 4931C331704604ABDF259B21CD88BACB7B5FF06759F244554F501ABDD0CBB4A880DB94
                        APIs
                        • LockWindowUpdate.USER32(00000000,00000004,00000004), ref: 6C8CF1D0
                        • ValidateRect.USER32(?,00000000,0000E800), ref: 6C8CF20C
                        • UpdateWindow.USER32(?), ref: 6C8CF215
                        • LockWindowUpdate.USER32(00000000), ref: 6C8CF226
                        • ValidateRect.USER32(?,00000000,0000E800), ref: 6C8CF254
                        • UpdateWindow.USER32(?), ref: 6C8CF25D
                        • LockWindowUpdate.USER32(00000000), ref: 6C8CF26E
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: UpdateWindow$Lock$RectValidate
                        • String ID:
                        • API String ID: 797752328-0
                        • Opcode ID: 7c2015e7aaea352737efc06ce4f380f0d6f2bd4b4715ab2703f6bab63f6b86c7
                        • Instruction ID: 21a083fac97a9ab6a036fd7750bc814bb6365349ccdfcf77bca83c1c59c3d689
                        • Opcode Fuzzy Hash: 7c2015e7aaea352737efc06ce4f380f0d6f2bd4b4715ab2703f6bab63f6b86c7
                        • Instruction Fuzzy Hash: 1631D176705A08DFEF218F64CA44B9A7BB5FF48754F20496EE85AA3A50D730E940CB11
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C876958
                        • GetClassNameW.USER32(?,?,000000FF), ref: 6C8769B2
                        • IsAppThemed.UXTHEME(?,?,?,?), ref: 6C876A43
                        • GetStockObject.GDI32(00000005), ref: 6C876A54
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ClassH_prolog3_NameObjectStockThemed
                        • String ID: Button$Static
                        • API String ID: 2434646892-2498952662
                        • Opcode ID: 4fddd7bdaaf17951c9ef08f225b573276a6300d8df795f1c335d9d55ff2b8c42
                        • Instruction ID: b00c31f4fe14e05e116b86b10a636b08cc570931f29d47ef94683de954feff22
                        • Opcode Fuzzy Hash: 4fddd7bdaaf17951c9ef08f225b573276a6300d8df795f1c335d9d55ff2b8c42
                        • Instruction Fuzzy Hash: 2831C431A80219DBCF34CF58CA88BDDB374AF54318F1049A9D519E7A80EB70A984CF71
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C8E0C80
                          • Part of subcall function 6C8E0B9E: __EH_prolog3.LIBCMT ref: 6C8E0BA5
                          • Part of subcall function 6C8E0B9E: GetProfileIntW.KERNEL32(windows,DragMinDist,00000002), ref: 6C8E0BF8
                          • Part of subcall function 6C8E0B9E: GetProfileIntW.KERNEL32(windows,DragDelay,000000C8), ref: 6C8E0C0E
                        • CopyRect.USER32(?,?), ref: 6C8E0CB5
                        • GetCursorPos.USER32(?), ref: 6C8E0CC7
                        • SetRect.USER32(?,?,?,?,?), ref: 6C8E0CDA
                        • IsRectEmpty.USER32(?), ref: 6C8E0CF5
                        • InflateRect.USER32(?,00000002,00000002), ref: 6C8E0D07
                        • DoDragDrop.OLE32(00000000,00000000,?,?), ref: 6C8E0D4F
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Profile$CopyCursorDragDropEmptyH_prolog3H_prolog3_Inflate
                        • String ID:
                        • API String ID: 1837043813-0
                        • Opcode ID: c03118d6f66a21bc0875bafba4ce4cb314f4dc537e2f86b510d214387036dede
                        • Instruction ID: d1a3032494dcc06b85e57401ccbc5a0c05fe822fb7a665ef229fe533600f5543
                        • Opcode Fuzzy Hash: c03118d6f66a21bc0875bafba4ce4cb314f4dc537e2f86b510d214387036dede
                        • Instruction Fuzzy Hash: 12316D71A016989FCF10DFE4C9449EDBBB9FF4A308B104819E815BB704DB34AD49DB60
                        APIs
                        • RegOpenKeyExW.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 6C87876E
                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6C87879A
                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6C8787C6
                        • RegCloseKey.ADVAPI32(00000000), ref: 6C8787D8
                        • RegCloseKey.ADVAPI32(00000000), ref: 6C8787E7
                          • Part of subcall function 6C878C4A: GetModuleHandleW.KERNEL32(Advapi32.dll,0002001F,?,?,6C87876C,80000001,software,00000000,0002001F,?), ref: 6C878C5B
                          • Part of subcall function 6C878C4A: GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 6C878C6B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CloseCreate$AddressHandleModuleOpenProc
                        • String ID: software
                        • API String ID: 550756860-2010147023
                        • Opcode ID: fe10e827ca22e382b2b4cfd0deeab165d366c1e7180e0c1a3eb3a0f46aa600c3
                        • Instruction ID: dfbba3787b9251276af3104555a7530ff0594bd2722b6fee2fd5016cfff71eb3
                        • Opcode Fuzzy Hash: fe10e827ca22e382b2b4cfd0deeab165d366c1e7180e0c1a3eb3a0f46aa600c3
                        • Instruction Fuzzy Hash: A7218E72A05519FFDB219A94CE44EBF7BBDEB46B44F10446AF912F2600E7349A40CBB4
                        APIs
                        • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,7CCA8F6A,?,6C9BC681,6C9A5A34,?,00000000), ref: 6C9BC633
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 3664257935-537541572
                        • Opcode ID: 8c083d05e9c7f65f40d4a349449c2d2bddac32677fcce3c1d0b128ffc8d9541d
                        • Instruction ID: ff229fbac820d8042dfa42449681705626da51493d4fe187760f8bc5ff2bbdff
                        • Opcode Fuzzy Hash: 8c083d05e9c7f65f40d4a349449c2d2bddac32677fcce3c1d0b128ffc8d9541d
                        • Instruction Fuzzy Hash: E7210232B0961BFBDB11AE65DD44A4B3B7DAF427A8F250210E915B7681DB70ED01CAE0
                        APIs
                        • GetModuleHandleW.KERNEL32(?,?,?,?,user32.dll,?,?,00000000,?,6C864CD3,00000000,00000000), ref: 6C8665E0
                        • GetProcAddress.KERNEL32(00000000,RegisterTouchWindow), ref: 6C8665F2
                        • GetProcAddress.KERNEL32(00000000,UnregisterTouchWindow), ref: 6C866600
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule
                        • String ID: RegisterTouchWindow$UnregisterTouchWindow$user32.dll
                        • API String ID: 667068680-2470269259
                        • Opcode ID: 252ceedccfd965084159f78a2e66697886902dff0ff42f3bef1175763ecfca6b
                        • Instruction ID: e0efb50169a3c10b70b35ec30f38e4e348d6b10a9afdcd9929c8839ba8184b86
                        • Opcode Fuzzy Hash: 252ceedccfd965084159f78a2e66697886902dff0ff42f3bef1175763ecfca6b
                        • Instruction Fuzzy Hash: E311E932705915EBCB105B6BE948559BB78FF49379F208526F905E3E00DB71EC508AD0
                        APIs
                        • SendMessageW.USER32(00000000,00000407,00000000,?), ref: 6C8A3A41
                        • IsRectEmpty.USER32(?), ref: 6C8A3A5D
                        • IsRectEmpty.USER32(?), ref: 6C8A3A68
                        • GetCursorPos.USER32(00000000), ref: 6C8A3A7E
                        • ScreenToClient.USER32(?,00000000), ref: 6C8A3A8B
                        • PtInRect.USER32(?,00000000,00000000), ref: 6C8A3A9E
                        • PtInRect.USER32(?,00000000,00000000), ref: 6C8A3AAF
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Empty$ClientCursorMessageScreenSend
                        • String ID:
                        • API String ID: 703117857-0
                        • Opcode ID: 06343ae998c69fa2422a6785e0549e9fb1303d5a82ccf4cb97c9f852a5aac052
                        • Instruction ID: f04610df41f89281a83b8c4097eef68bab118cea11e86d95227714bbc2a935e6
                        • Opcode Fuzzy Hash: 06343ae998c69fa2422a6785e0549e9fb1303d5a82ccf4cb97c9f852a5aac052
                        • Instruction Fuzzy Hash: FF217C71604A09BFDF208FA1CD48F9ABBBDFB04349F104829B115E2450DB70F955DB10
                        APIs
                        • GetMessageW.USER32(?,00000000,0000000F,0000000F), ref: 6C888A8E
                        • DispatchMessageW.USER32(?), ref: 6C888AA0
                        • PeekMessageW.USER32(?,00000000,0000000F,0000000F,00000000), ref: 6C888AAE
                        • SetRectEmpty.USER32(?), ref: 6C888AD6
                        • GetDesktopWindow.USER32 ref: 6C888AEE
                        • LockWindowUpdate.USER32(?,00000000), ref: 6C888AFF
                        • GetDCEx.USER32(?,00000000,00000003), ref: 6C888B16
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Message$Window$DesktopDispatchEmptyLockPeekRectUpdate
                        • String ID:
                        • API String ID: 1192691108-0
                        • Opcode ID: 815a25c2a7a462802a7be27a74dc7379d1e5a6e921dd960d04e97330780df815
                        • Instruction ID: 8c6b8318c389051bf7ea324b2fe00d5cebe58b6da3a0cde394fb864395da4369
                        • Opcode Fuzzy Hash: 815a25c2a7a462802a7be27a74dc7379d1e5a6e921dd960d04e97330780df815
                        • Instruction Fuzzy Hash: 3B215EB1A01709BBD7209FB6C988E97BBBCFB09754F50493AE115D6940EB34E411CBA0
                        APIs
                        • RealChildWindowFromPoint.USER32(?,?,?), ref: 6C87C637
                        • ClientToScreen.USER32(?,?), ref: 6C87C651
                        • GetWindow.USER32(?,00000005), ref: 6C87C6A3
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$ChildClientFromPointRealScreen
                        • String ID:
                        • API String ID: 2518355518-0
                        • Opcode ID: fb258a70402d11b00c547ff864f96f95719417ae6de97950fd2154fbea5ab6e0
                        • Instruction ID: c837bf14fdf66a5091c9b394a50733e7dfdb5a474d11ff5111bd42d42be411c3
                        • Opcode Fuzzy Hash: fb258a70402d11b00c547ff864f96f95719417ae6de97950fd2154fbea5ab6e0
                        • Instruction Fuzzy Hash: EB11B431B05619AFCB21EF68CD48AAF77B9EF4A710F604519F801E3140EB30AE418BA4
                        APIs
                        • GetParent.USER32(?), ref: 6C862A50
                        • GetWindowRect.USER32(?,?), ref: 6C862A6E
                        • ScreenToClient.USER32(?,?), ref: 6C862A7B
                        • ScreenToClient.USER32(?,?), ref: 6C862A88
                        • EqualRect.USER32(?,?), ref: 6C862A93
                        • DeferWindowPos.USER32(?,?,00000000,?,?,?,?,00000014), ref: 6C862ABA
                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014), ref: 6C862AC4
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$ClientRectScreen$DeferEqualParent
                        • String ID:
                        • API String ID: 443303494-0
                        • Opcode ID: e8df68d6fd4f1f7761c68ba431e8253a225fb0e1be9052e38c13ecb01050f63e
                        • Instruction ID: 17742498bfe000456155a553868bc3798be4f0faba32c834047bbbbaf10ef036
                        • Opcode Fuzzy Hash: e8df68d6fd4f1f7761c68ba431e8253a225fb0e1be9052e38c13ecb01050f63e
                        • Instruction Fuzzy Hash: 6F219335A00609EFDF10DFA4C988EBEBBB8FF09705F244569F901EA510D770A980CBA0
                        APIs
                        • IsWindow.USER32(00000000), ref: 6C8649BC
                        • FindResourceW.KERNEL32(?,00000000,AFX_DIALOG_LAYOUT), ref: 6C8649E4
                        • SizeofResource.KERNEL32(?,00000000), ref: 6C8649F6
                        • LoadResource.KERNEL32(?,00000000), ref: 6C864A02
                        • LockResource.KERNEL32(00000000), ref: 6C864A0D
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Resource$FindLoadLockSizeofWindow
                        • String ID: AFX_DIALOG_LAYOUT
                        • API String ID: 2582447065-2436846380
                        • Opcode ID: aa32e896b27864afd7d82bff29870dffadd5aa002394f1a734871c657546ea48
                        • Instruction ID: 7d8de65f1daee6bf77b8c69041966b3351149a4c4f802fc3a6ec48abd1125751
                        • Opcode Fuzzy Hash: aa32e896b27864afd7d82bff29870dffadd5aa002394f1a734871c657546ea48
                        • Instruction Fuzzy Hash: 7C11C671241604BBDB21CBB68D58E7E7ABCEBC5656B200834A801E3E00EB74D8408764
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8B678F
                          • Part of subcall function 6C86D33C: __EH_prolog3.LIBCMT ref: 6C86D343
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: H_prolog3
                        • String ID: AQUA_$BLACK_$BLUE_$IDX_OFFICE2007_STYLE$SILVER_
                        • API String ID: 431132790-2717817858
                        • Opcode ID: 4ff6507392054a6280b1a1bc5a3d9d277cd6cda595c59d860ee7223d756a30ef
                        • Instruction ID: e528e4701a9cd983bd0476b8bab62d87bab4013d98cf4422e2b0a2e3c056185d
                        • Opcode Fuzzy Hash: 4ff6507392054a6280b1a1bc5a3d9d277cd6cda595c59d860ee7223d756a30ef
                        • Instruction Fuzzy Hash: EF11B67280011997DB25DFACCA40AFEB779AFA1328F140A19E110E7F85DB70DA49C756
                        APIs
                        • GetModuleHandleW.KERNEL32(uxtheme.dll), ref: 6C87E951
                        • GetProcAddress.KERNEL32(00000000,BeginBufferedPaint), ref: 6C87E961
                        • EncodePointer.KERNEL32(00000000), ref: 6C87E96A
                        • DecodePointer.KERNEL32(00000000), ref: 6C87E978
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                        • String ID: BeginBufferedPaint$uxtheme.dll
                        • API String ID: 2061474489-1632326970
                        • Opcode ID: f9c80ff86ebc1fb86bb393c6ffa23d5c905314427e318c1259cb15cacfb54ebb
                        • Instruction ID: 56a1b37bf3836a86b3c8ecbaaa7c560129ec8f2a230a785bf7566e7798e0983b
                        • Opcode Fuzzy Hash: f9c80ff86ebc1fb86bb393c6ffa23d5c905314427e318c1259cb15cacfb54ebb
                        • Instruction Fuzzy Hash: B1F0623660AA16EF8F619FB48D089AE3F78EF4A6557104821FC05E2511E730E4609BE0
                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6C878293,?,?,?,?), ref: 6C87F0DB
                        • GetProcAddress.KERNEL32(00000000,RegisterApplicationRecoveryCallback), ref: 6C87F0EB
                        • EncodePointer.KERNEL32(00000000,?,?,6C878293,?,?,?,?), ref: 6C87F0F4
                        • DecodePointer.KERNEL32(00000000,?,?,6C878293,?,?,?,?), ref: 6C87F102
                        Strings
                        • RegisterApplicationRecoveryCallback, xrefs: 6C87F0E5
                        • kernel32.dll, xrefs: 6C87F0D6
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                        • String ID: RegisterApplicationRecoveryCallback$kernel32.dll
                        • API String ID: 2061474489-202725706
                        • Opcode ID: 3f661e40e5e1d23f897f4e49af629b73d51ea0b2ee3fa40c9457d32d70ed5e93
                        • Instruction ID: 190680d2f7539c04828663e5e889d071646c502da821753fbf435bad0aa2fa93
                        • Opcode Fuzzy Hash: 3f661e40e5e1d23f897f4e49af629b73d51ea0b2ee3fa40c9457d32d70ed5e93
                        • Instruction Fuzzy Hash: B2F09631B09A16AB8F329FA5CD0885D3B78EF19695B108421FD05F2600E730D8418BB0
                        APIs
                        • GetModuleHandleW.KERNEL32(shell32.dll), ref: 6C87F19F
                        • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 6C87F1AF
                        • EncodePointer.KERNEL32(00000000), ref: 6C87F1B8
                        • DecodePointer.KERNEL32(00000000), ref: 6C87F1C6
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                        • String ID: SHCreateItemFromParsingName$shell32.dll
                        • API String ID: 2061474489-2320870614
                        • Opcode ID: 49f400237353bec729171e23f19ed606fdf829869e4a8834ed8a257900aa7cf1
                        • Instruction ID: 088918af8805f8ab758dbefb17ed8dde59c72fe5868c53311248e4eb6e731276
                        • Opcode Fuzzy Hash: 49f400237353bec729171e23f19ed606fdf829869e4a8834ed8a257900aa7cf1
                        • Instruction Fuzzy Hash: 96F0903160561AABCF326F66CD0885E3FB8AF1A756B108826FC05E2610EB30D8408FB0
                        APIs
                        • GetModuleHandleW.KERNEL32(shell32.dll), ref: 6C87F204
                        • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 6C87F214
                        • EncodePointer.KERNEL32(00000000), ref: 6C87F21D
                        • DecodePointer.KERNEL32(00000000), ref: 6C87F22B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                        • String ID: SHGetKnownFolderPath$shell32.dll
                        • API String ID: 2061474489-2936008475
                        • Opcode ID: a495480124b169ada5f8122b77a2533a3ca79d7c14f73afff6b17198109b3406
                        • Instruction ID: 9f39d37fb13a0327a8357b7b9038d91ed2092c48fc304cde0f89fe85f2d2fc6c
                        • Opcode Fuzzy Hash: a495480124b169ada5f8122b77a2533a3ca79d7c14f73afff6b17198109b3406
                        • Instruction Fuzzy Hash: 27F0BB75619616ABCF319FA5CD0885D3B78AF5A7957104419FC15E3600E730EC428BB0
                        APIs
                        • GetModuleHandleW.KERNEL32(uxtheme.dll), ref: 6C87ED97
                        • GetProcAddress.KERNEL32(00000000,EndBufferedPaint), ref: 6C87EDA7
                        • EncodePointer.KERNEL32(00000000), ref: 6C87EDB0
                        • DecodePointer.KERNEL32(00000000), ref: 6C87EDBE
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                        • String ID: EndBufferedPaint$uxtheme.dll
                        • API String ID: 2061474489-2993015961
                        • Opcode ID: 324c2d8b64fa91ebec25beb0b67f5a194421746b1cbcde19a8975c9aed79535e
                        • Instruction ID: 0ee6b9db850d2aab114885e684e0ccb2ac6477e2c338243d65977bd9c7c15690
                        • Opcode Fuzzy Hash: 324c2d8b64fa91ebec25beb0b67f5a194421746b1cbcde19a8975c9aed79535e
                        • Instruction Fuzzy Hash: 7EF01975749615AF8F319B698E0899D3F78DF0A7967104962FC05F7611EB30D8418BF0
                        APIs
                        • GetModuleHandleW.KERNEL32(user32.dll), ref: 6C87EA60
                        • GetProcAddress.KERNEL32(00000000,ChangeWindowMessageFilter), ref: 6C87EA70
                        • EncodePointer.KERNEL32(00000000), ref: 6C87EA79
                        • DecodePointer.KERNEL32(00000000), ref: 6C87EA87
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                        • String ID: ChangeWindowMessageFilter$user32.dll
                        • API String ID: 2061474489-2498399450
                        • Opcode ID: 9bd465524f24abecffae5b71f195b02f15562ac6111df50a364719813f6a6a7f
                        • Instruction ID: 63844d0a4b08c1d797cb82d2e51059207c031cd31c4081fbf56486bdadc1325b
                        • Opcode Fuzzy Hash: 9bd465524f24abecffae5b71f195b02f15562ac6111df50a364719813f6a6a7f
                        • Instruction Fuzzy Hash: 65F0F43570961A9F9F319B759D4889E7B78AF5B6963104971FC05F2600EA30D84157E0
                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6C878277,?,?), ref: 6C87F140
                        • GetProcAddress.KERNEL32(00000000,RegisterApplicationRestart), ref: 6C87F150
                        • EncodePointer.KERNEL32(00000000,?,?,6C878277,?,?), ref: 6C87F159
                        • DecodePointer.KERNEL32(00000000,?,?,6C878277,?,?), ref: 6C87F167
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                        • String ID: RegisterApplicationRestart$kernel32.dll
                        • API String ID: 2061474489-1259503209
                        • Opcode ID: 9d3174c861685f91d5fec863882dcbab7bb003d3dbc4b1079c6a743a7c3a9e3f
                        • Instruction ID: cd36cf1377e88ae0d74fd52c7ff73892da5d93c197e632cd7cc02cc1912a02c9
                        • Opcode Fuzzy Hash: 9d3174c861685f91d5fec863882dcbab7bb003d3dbc4b1079c6a743a7c3a9e3f
                        • Instruction Fuzzy Hash: 04F05431A09A16AB8B325B75CD5885E3B78DF5A6A57108525FC05F7601EA30D9418AF0
                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6C877A27,00000000), ref: 6C87E8F5
                        • GetProcAddress.KERNEL32(00000000,ApplicationRecoveryInProgress), ref: 6C87E905
                        • EncodePointer.KERNEL32(00000000,?,?,6C877A27,00000000), ref: 6C87E90E
                        • DecodePointer.KERNEL32(00000000,?,?,6C877A27,00000000), ref: 6C87E91C
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                        • String ID: ApplicationRecoveryInProgress$kernel32.dll
                        • API String ID: 2061474489-2899047487
                        • Opcode ID: 81d1546cc694df5e545d2b2dcb5d9b03e38ee582d0b872e31c696a29f8d7844e
                        • Instruction ID: ffe31a91db05f9eba554206f2fd9650b0d75209ff2e7ff2353689e138c71ee2a
                        • Opcode Fuzzy Hash: 81d1546cc694df5e545d2b2dcb5d9b03e38ee582d0b872e31c696a29f8d7844e
                        • Instruction Fuzzy Hash: B3F08232609E16AFCF315B748D18A6E3BB8AF0A6957114825FC05F3601EB30F8414BF1
                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6C877A6A,00000001), ref: 6C87E8A0
                        • GetProcAddress.KERNEL32(00000000,ApplicationRecoveryFinished), ref: 6C87E8B0
                        • EncodePointer.KERNEL32(00000000,?,6C877A6A,00000001), ref: 6C87E8B9
                        • DecodePointer.KERNEL32(00000000,?,?,6C877A6A,00000001), ref: 6C87E8C7
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                        • String ID: ApplicationRecoveryFinished$kernel32.dll
                        • API String ID: 2061474489-1962646049
                        • Opcode ID: fb873a9c53432c0c45682eb0f73b2d4455de5364f6a9e4f1f65a625aad81372b
                        • Instruction ID: 5e4e627b2a81bbebb7c46625574321da4483c88f135691f43139720928febccf
                        • Opcode Fuzzy Hash: fb873a9c53432c0c45682eb0f73b2d4455de5364f6a9e4f1f65a625aad81372b
                        • Instruction Fuzzy Hash: 3CF03731B06A269F9B315B749D0895D3BB89F4A6963104831FD15F3611EB30E4415BF5
                        APIs
                        • GetModuleHandleW.KERNEL32(uxtheme.dll), ref: 6C87E9B3
                        • GetProcAddress.KERNEL32(00000000,BufferedPaintInit), ref: 6C87E9C3
                        • EncodePointer.KERNEL32(00000000), ref: 6C87E9CC
                        • DecodePointer.KERNEL32(00000000), ref: 6C87E9DA
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                        • String ID: BufferedPaintInit$uxtheme.dll
                        • API String ID: 2061474489-1331937065
                        • Opcode ID: 5a9529805c78673d7057e04bdd275e8472136f95d670b441081b3e40a00e6868
                        • Instruction ID: d727a58a29dd3d28509a540405b34e8ddcba39e2d6ba1f45dc5383dec8abb954
                        • Opcode Fuzzy Hash: 5a9529805c78673d7057e04bdd275e8472136f95d670b441081b3e40a00e6868
                        • Instruction Fuzzy Hash: D6E06572B0AD329F8F71A77599086DD37B49F4669A3118926F801F3601EB20EC814BF0
                        APIs
                        • GetModuleHandleW.KERNEL32(uxtheme.dll), ref: 6C87EA08
                        • GetProcAddress.KERNEL32(00000000,BufferedPaintUnInit), ref: 6C87EA18
                        • EncodePointer.KERNEL32(00000000), ref: 6C87EA21
                        • DecodePointer.KERNEL32(00000000), ref: 6C87EA2F
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                        • String ID: BufferedPaintUnInit$uxtheme.dll
                        • API String ID: 2061474489-1501038116
                        • Opcode ID: 84fa0aa256625dade66891be5a8c0ffe0bd14658c4f96db7d78e359021ab3504
                        • Instruction ID: fb28b6930df2006a79fa2878159b50bf7a6bd548483d6f8a5b190e28b0bf4d1c
                        • Opcode Fuzzy Hash: 84fa0aa256625dade66891be5a8c0ffe0bd14658c4f96db7d78e359021ab3504
                        • Instruction Fuzzy Hash: 18E0A031B0AA229B8F31D774A90899D27B8AF5B6967154821F801F3A01EB20D8814AE0
                        APIs
                        • GetModuleHandleW.KERNEL32(shell32.dll,?,6C86285E,?,?,6C879D80,000FC000,00000010,00000048,6C879F7B,00000000,?), ref: 6C87F03B
                        • GetProcAddress.KERNEL32(00000000,InitNetworkAddressControl), ref: 6C87F04B
                        • EncodePointer.KERNEL32(00000000,?,?,6C879D80,000FC000,00000010,00000048,6C879F7B,00000000,?), ref: 6C87F054
                        • DecodePointer.KERNEL32(00000000,?,6C86285E,?,?,6C879D80,000FC000,00000010,00000048,6C879F7B,00000000,?), ref: 6C87F062
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                        • String ID: InitNetworkAddressControl$shell32.dll
                        • API String ID: 2061474489-1950653938
                        • Opcode ID: 339442c6b344bb3c93bd8d0d5984372a4f0915f0cf74f1b39d7ee8b498399602
                        • Instruction ID: d0b1749a6e8407188a0d8d699020ca318372ae6e2053d004fc574194de1da4dc
                        • Opcode Fuzzy Hash: 339442c6b344bb3c93bd8d0d5984372a4f0915f0cf74f1b39d7ee8b498399602
                        • Instruction Fuzzy Hash: 6FE06531B0AA229B8F31AB759D0C95D3774AF676D63154961F802E2700EB20D88146B0
                        APIs
                        • GetModuleHandleW.KERNEL32(comctl32.dll), ref: 6C87F08D
                        • GetProcAddress.KERNEL32(00000000,TaskDialogIndirect), ref: 6C87F09D
                        • EncodePointer.KERNEL32(00000000), ref: 6C87F0A6
                        • DecodePointer.KERNEL32(00000000), ref: 6C87F0B8
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeHandleModuleProc
                        • String ID: TaskDialogIndirect$comctl32.dll
                        • API String ID: 2061474489-2809879075
                        • Opcode ID: 9f933982f860035aa987676869ce22dbeda2dbed9b4438c0944585279b7d8fa3
                        • Instruction ID: 5dd601167c30fcb831615817cc6bf5a6f82c9c52696299eac3d934d91542455d
                        • Opcode Fuzzy Hash: 9f933982f860035aa987676869ce22dbeda2dbed9b4438c0944585279b7d8fa3
                        • Instruction Fuzzy Hash: 04E0D832B096129F8F70ABB55F0C95E36B89F571D63154C22FC00F3600FB20C8809AB1
                        APIs
                        • GetSysColor.USER32(0000000F), ref: 6C87F5AD
                        • GetSysColor.USER32(00000010), ref: 6C87F5B8
                        • GetSysColor.USER32(00000014), ref: 6C87F5C3
                        • GetSysColor.USER32(00000012), ref: 6C87F5CE
                        • GetSysColor.USER32(00000006), ref: 6C87F5D9
                        • GetSysColorBrush.USER32(0000000F), ref: 6C87F5E4
                        • GetSysColorBrush.USER32(00000006), ref: 6C87F5EF
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Color$Brush
                        • String ID:
                        • API String ID: 2798902688-0
                        • Opcode ID: 6ca66f3b66a924791530490af26bb9be6f6beb56977c3d4e098f86bdfb54842e
                        • Instruction ID: 8e6ae312aa45518d2221a5a7140fc6b83e245235a6e8df071114ae1d8d8f720d
                        • Opcode Fuzzy Hash: 6ca66f3b66a924791530490af26bb9be6f6beb56977c3d4e098f86bdfb54842e
                        • Instruction Fuzzy Hash: 11F09EB1A55B009BDF205FB1854D7467AB0FB09B21F505A19F24A9B980DB75B0809F00
                        APIs
                        • GetParent.USER32(00000000), ref: 6C890E23
                        • GetClientRect.USER32(?,6C8907CC), ref: 6C890E36
                        • GetWindowRect.USER32(00000000,?), ref: 6C890E80
                        • GetParent.USER32(00000000), ref: 6C890E89
                        • GetParent.USER32(00000000), ref: 6C89111C
                        • RedrawWindow.USER32(?,00000000,00000000,00000105,?,?,00000000,?,?,?,?,?,?,?,6C8907CC,00000000), ref: 6C89114C
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Parent$RectWindow$ClientRedraw
                        • String ID:
                        • API String ID: 443302174-0
                        • Opcode ID: b2c314b4be239d35677ca354b82ee1b837253a2fb29072dfa59e4171060e4d50
                        • Instruction ID: c67b0d1364dff36436e8ac35962b5ac29a9c7a0996e18a1d05395477aebec354
                        • Opcode Fuzzy Hash: b2c314b4be239d35677ca354b82ee1b837253a2fb29072dfa59e4171060e4d50
                        • Instruction Fuzzy Hash: 38D18A31A056599FCF14CF68CA94BADBBB5AF4D314F248669E816BB780CB30A941CF50
                        APIs
                        • GetCursorPos.USER32(?), ref: 6C8A2719
                        • GetWindowRect.USER32(?,?), ref: 6C8A272D
                        • PtInRect.USER32(?,?,?), ref: 6C8A2756
                        • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C8A276A
                          • Part of subcall function 6C864227: GetParent.USER32(?), ref: 6C864231
                        • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C8A27CC
                        • GetFocus.USER32 ref: 6C8A28F3
                          • Part of subcall function 6C8C966F: __EH_prolog3_GS.LIBCMT ref: 6C8C9679
                          • Part of subcall function 6C8C966F: GetWindowRect.USER32(?,?), ref: 6C8C970D
                          • Part of subcall function 6C8C966F: SetRect.USER32(?,00000000,00000000,?,?), ref: 6C8C972E
                          • Part of subcall function 6C8C966F: CreateCompatibleDC.GDI32(?), ref: 6C8C973A
                          • Part of subcall function 6C8C966F: CreateCompatibleBitmap.GDI32(?,?,00000128), ref: 6C8C9764
                          • Part of subcall function 6C8C966F: GetWindowRect.USER32(?,?), ref: 6C8C97B9
                          • Part of subcall function 6C8C966F: GetClientRect.USER32(?,?), ref: 6C8C97C6
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Window$CompatibleCreateMessageSend$BitmapClientCursorFocusH_prolog3_Parent
                        • String ID:
                        • API String ID: 2914356772-0
                        • Opcode ID: 792eb4b183466040e7f4b9fdf5daa05e2a4d6a1a966da21919e30b0bb9599cb3
                        • Instruction ID: 266245033cd76435a44b2bd4212e9ee5db3d6cb0fde883ababdbaa3c7ba8737f
                        • Opcode Fuzzy Hash: 792eb4b183466040e7f4b9fdf5daa05e2a4d6a1a966da21919e30b0bb9599cb3
                        • Instruction Fuzzy Hash: C7A12830B016268FDF389FA6C958AAD77B5BF49318B14457ED809A7B40DF34AC42CB90
                        APIs
                        • GetParent.USER32(?), ref: 6C8962A3
                        • GetParent.USER32(?), ref: 6C8962C2
                        • GetParent.USER32(?), ref: 6C8962D1
                        • RedrawWindow.USER32(?,00000000,00000000,00000505,6C9F07A8,00000000), ref: 6C896337
                        • GetParent.USER32(?), ref: 6C896340
                        • RedrawWindow.USER32(?,00000000,00000000,00000505,00000000), ref: 6C896367
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Parent$RedrawWindow
                        • String ID:
                        • API String ID: 2946272266-0
                        • Opcode ID: 3d4762ff2739119ade71c2a6dfcf9c7e8f27cc20c7d9553ec203a4b7e4221a47
                        • Instruction ID: 7437a86f07e6903947c64b351e4ccd6bf7c8e00ba06fca80ee3b08719c8a932c
                        • Opcode Fuzzy Hash: 3d4762ff2739119ade71c2a6dfcf9c7e8f27cc20c7d9553ec203a4b7e4221a47
                        • Instruction Fuzzy Hash: F371B275B009159FCF099F64C998AAD77B9FF48314B108569E816E7B50DF30AC41CF90
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$ClientInflate
                        • String ID:
                        • API String ID: 256450704-0
                        • Opcode ID: e462714cb33a689c75dc6f7de7b2cd106dc0d2b25d685124c02e6797574b90c4
                        • Instruction ID: bdb12a1743574fb35152d2f1c2079b881ed4a985beabb6e7f897dd83889b99fb
                        • Opcode Fuzzy Hash: e462714cb33a689c75dc6f7de7b2cd106dc0d2b25d685124c02e6797574b90c4
                        • Instruction Fuzzy Hash: 0671FA71E016099FDB14CFA9C944ADEF7B6BF59304F24852AE819E7610D731EA42CF90
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C8A1946
                        • IsMenu.USER32(?), ref: 6C8A197A
                          • Part of subcall function 6C8B2A0D: __EH_prolog3_catch.LIBCMT ref: 6C8B2A14
                          • Part of subcall function 6C8B2A0D: SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,?,00000074,6C8A19A2,?,00000000), ref: 6C8B2A48
                        • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 6C8A1AA7
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CurrentDirectoryFileH_prolog3_H_prolog3_catchMenuPointer
                        • String ID: &%d %Ts$Recent File
                        • API String ID: 1008316149-993655659
                        • Opcode ID: 1b9fac960f7237f7e80b3b302c94918b31481baf78084825ec56b711695a3943
                        • Instruction ID: 5556c2ce001d40d7d28b69c95948346b6aa639eeaa5c308401eb674491dabfb5
                        • Opcode Fuzzy Hash: 1b9fac960f7237f7e80b3b302c94918b31481baf78084825ec56b711695a3943
                        • Instruction Fuzzy Hash: 59028F74A01629DBCF25CB64CA94B9CB3B9AF48318F1445E9D819A7781DB30EF86CF50
                        APIs
                        • CallNextHookEx.USER32(00000000,?,?), ref: 6C89BB03
                        • WindowFromPoint.USER32(?,?), ref: 6C89BB2D
                        • ScreenToClient.USER32(00000020,00000200), ref: 6C89BB63
                        • GetParent.USER32(00000020), ref: 6C89BBCA
                        • UpdateWindow.USER32(?), ref: 6C89BC30
                        • SendMessageW.USER32(?,00000100,00000024,00000000), ref: 6C89BCFE
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$CallClientFromHookMessageNextParentPointScreenSendUpdate
                        • String ID:
                        • API String ID: 4074787488-0
                        • Opcode ID: 3bab5017d1a03bee39f7bb0691999c3650467641fc3c8a6aa6bc5af2defd2afe
                        • Instruction ID: fee9c4251d68b389763842e3629d07bcb13e7769dc6348b76d5abd88f502dee6
                        • Opcode Fuzzy Hash: 3bab5017d1a03bee39f7bb0691999c3650467641fc3c8a6aa6bc5af2defd2afe
                        • Instruction Fuzzy Hash: A561A275A00209EFDF389FA8C954ABD7BB6FF49314F20856AE815E7690DB319901CB50
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?), ref: 6C9A1C5A
                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?,00000000,00000000), ref: 6C9A1CC5
                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6C9A1CE2
                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,?,?,00000000,00000000,00000000), ref: 6C9A1D21
                        • LCMapStringEx.KERNEL32(?,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 6C9A1D80
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6C9A1DA3
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ByteCharMultiStringWide
                        • String ID:
                        • API String ID: 2829165498-0
                        • Opcode ID: dc15c6e3ff964777e10e9a809d6dd626ead6e0871ca142189c51d3ed6e7749e3
                        • Instruction ID: 7244ff9cb396add20600227b482d6bfa238c690552e9fded6206843d559affe4
                        • Opcode Fuzzy Hash: dc15c6e3ff964777e10e9a809d6dd626ead6e0871ca142189c51d3ed6e7749e3
                        • Instruction Fuzzy Hash: CF51CD72A01206EBEF114EA0CC44FEA3BBEEF52748F204529F925AA590D730D8468B60
                        APIs
                        • GetParent.USER32(00000000), ref: 6C89068C
                        • SendMessageW.USER32(?,0000040C,00000000,00000000), ref: 6C8906C8
                        • SendMessageW.USER32(00000000,0000041C,00000000,?), ref: 6C8906FB
                        • SetRectEmpty.USER32(?), ref: 6C890761
                        • SendMessageW.USER32(00000000,0000040B,00000000,?), ref: 6C8907BD
                        • RedrawWindow.USER32(00000000,00000000,00000000,00000505), ref: 6C8907EC
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageSend$EmptyParentRectRedrawWindow
                        • String ID:
                        • API String ID: 3879113052-0
                        • Opcode ID: a7b46f8634d5ec644bdc49bbfbdaa82fd6206269b6636b5bf22b37ef8259efd8
                        • Instruction ID: c14b131ed938c0890c3b8bb2badf2c567a164a85370d7fbddced2494247d8a95
                        • Opcode Fuzzy Hash: a7b46f8634d5ec644bdc49bbfbdaa82fd6206269b6636b5bf22b37ef8259efd8
                        • Instruction Fuzzy Hash: E4518E70B016599FDB28CF68C994BADBBB5FF4D714F20452AE916A7781DB30A940CF80
                        APIs
                        • SendMessageW.USER32(?,00000362,-0000E001,00000000), ref: 6C86BC0F
                        • UpdateWindow.USER32(?), ref: 6C86BC30
                        • GetKeyState.USER32(00000079), ref: 6C86BC4E
                        • GetKeyState.USER32(00000012), ref: 6C86BC5F
                        • GetParent.USER32(?), ref: 6C86BD21
                        • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 6C86BD3B
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageState$ParentPostSendUpdateWindow
                        • String ID:
                        • API String ID: 3941036086-0
                        • Opcode ID: 75dc87f5900217b971a0f460abbc4c73ef49996f3bad2e6562fb8cb965469618
                        • Instruction ID: 1052d2f7535c035d300569b22d4770d7d21ff6e67116833ad59feb40ede07237
                        • Opcode Fuzzy Hash: 75dc87f5900217b971a0f460abbc4c73ef49996f3bad2e6562fb8cb965469618
                        • Instruction Fuzzy Hash: CB51E33030060AAFEB149F66C984BB9B775FF0535DF208979F9059BE80CB74A950DB90
                        APIs
                        • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C87AEAA
                        • IsWindow.USER32(?), ref: 6C87AF25
                        • ClientToScreen.USER32(?,?), ref: 6C87AF36
                        • IsWindow.USER32(?), ref: 6C87AF54
                        • ClientToScreen.USER32(?,?), ref: 6C87AF84
                        • SendMessageW.USER32(?,0000020A,?,?), ref: 6C87AFE2
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ClientMessageScreenSendWindow
                        • String ID:
                        • API String ID: 2093367132-0
                        • Opcode ID: 5ea9fd4a7d84fcb6a0a4050bd3e9ef5c5c631d29f95067c1486f9311f1b92592
                        • Instruction ID: 2f6eeb2695763154d276a846e8e2e92c85e4f39a3ca9b3210db5b128bfdfc653
                        • Opcode Fuzzy Hash: 5ea9fd4a7d84fcb6a0a4050bd3e9ef5c5c631d29f95067c1486f9311f1b92592
                        • Instruction Fuzzy Hash: D841B3B2608606ABDB315F79CB44FFE7AB5EB06709F205D29A461D2DA0F731D540CA70
                        APIs
                          • Part of subcall function 6C868F77: GetWindowLongW.USER32(?,000000F0), ref: 6C868F84
                        • SendMessageW.USER32(?,0000043D,00000000,00000000), ref: 6C87497B
                        • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 6C87498C
                        • SendMessageW.USER32(?,0000043C,00000001,00000000), ref: 6C8749A0
                        • SendMessageW.USER32(?,0000043C,00000000,00000000), ref: 6C8749B1
                        • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 6C8749C0
                        • InvalidateRect.USER32(?,00000000,00000001,00000000,?,00000000,?,?,?,?,?,6C87365E,00000000,?,?,?), ref: 6C874A53
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageSend$InvalidateLongRectWindow
                        • String ID:
                        • API String ID: 74886174-0
                        • Opcode ID: ee099489daaa695dc62bcc3021c8383f8f8496099f8d6b5c7a09c8e435910392
                        • Instruction ID: dd8b064744b3a9a82c72b64ac0be298692aef86d762c0af3796ccd6b9d8bd625
                        • Opcode Fuzzy Hash: ee099489daaa695dc62bcc3021c8383f8f8496099f8d6b5c7a09c8e435910392
                        • Instruction Fuzzy Hash: 04418E71700618ABDF208F61CC45FEEBB75EF89724F144125FA05BB691DB70A841CBA4
                        APIs
                        • GetClientRect.USER32(?,?), ref: 6C875F5D
                        • IsThemeBackgroundPartiallyTransparent.UXTHEME(?,00000006,00000000), ref: 6C875F78
                        • DrawThemeParentBackground.UXTHEME(?,?,?), ref: 6C875F8C
                        • SetRectEmpty.USER32(?), ref: 6C875F9D
                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 6C875FAB
                        • DrawThemeBackground.UXTHEME(?,?,00000006,00000000,?,00000000), ref: 6C875FE1
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: BackgroundTheme$DrawRect$ClientEmptyInfoParametersParentPartiallySystemTransparent
                        • String ID:
                        • API String ID: 3870343638-0
                        • Opcode ID: e2a87e3afe6d6317abfec358e5da24ab6641d7d5efcb6224ef3ea3eb2e82a017
                        • Instruction ID: 61f022b704462558d32f3c2b75cd7b40f59164c37e3074a9e901e66a17197f7e
                        • Opcode Fuzzy Hash: e2a87e3afe6d6317abfec358e5da24ab6641d7d5efcb6224ef3ea3eb2e82a017
                        • Instruction Fuzzy Hash: 54313071A00609AFDB20DFA5C984EAEBBBCEF09654F204525F515F2540EB30AA94CB60
                        APIs
                        • GetWindowRect.USER32(00000000,?), ref: 6C8A4CAF
                        • OffsetRect.USER32(?,?,?), ref: 6C8A4CD0
                        • SendMessageW.USER32(00000000,0000000B,00000000,00000000), ref: 6C8A4CDD
                        • IsWindowVisible.USER32(00000000), ref: 6C8A4CE6
                        • SendMessageW.USER32(00000000,0000000B,00000001,00000000), ref: 6C8A4D59
                        • RedrawWindow.USER32(00000000,00000000,00000000,00000105), ref: 6C8A4D69
                          • Part of subcall function 6C86931F: ShowWindow.USER32(?,?,00000000,?,6C86CF2F,00000000,?,?,?,?,?,?,?,6C86CA7A,00000000,000000FF), ref: 6C869330
                          • Part of subcall function 6C86926E: SetWindowPos.USER32(?,?,?,7CCA8F6A,6C86962D,?,6C869CCC,00000000,?,6C86CE6F,00000000,00000000,00000000,00000000,00000000,00000097), ref: 6C869296
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$MessageRectSend$OffsetRedrawShowVisible
                        • String ID:
                        • API String ID: 2359670889-0
                        • Opcode ID: 76ac42bb1bbe7a70e21c92aa0843bd442ed4ee46f7b3cde87c5636b5149e03cc
                        • Instruction ID: f3a04cbc409636ae9619fe50dd03dbf09d4f5a98d7627c13836308cb95c227e5
                        • Opcode Fuzzy Hash: 76ac42bb1bbe7a70e21c92aa0843bd442ed4ee46f7b3cde87c5636b5149e03cc
                        • Instruction Fuzzy Hash: 03314D72A04609BFDB11DBA8CD85EBFB7BDFB48714F100A19B556F2690DB70AD408B20
                        APIs
                        • PtInRect.USER32(?,?,?), ref: 6C8A2E5C
                        • ReleaseCapture.USER32 ref: 6C8A2E6A
                        • PtInRect.USER32(?,?,?), ref: 6C8A2EBF
                        • InvalidateRect.USER32(?,?,00000001), ref: 6C8A2F29
                        • SetTimer.USER32(?,0000EC16,00000050,00000000), ref: 6C8A2F4D
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$CaptureInvalidateReleaseTimer
                        • String ID:
                        • API String ID: 2903485716-0
                        • Opcode ID: 0878edb554195d0223726bf89b3bbcdd5b3a7c599303c01c380d2edd9330cd1d
                        • Instruction ID: 7932c63c54bc79f9fd54139062ca19e375d1074bebc662d479579bf140e214a5
                        • Opcode Fuzzy Hash: 0878edb554195d0223726bf89b3bbcdd5b3a7c599303c01c380d2edd9330cd1d
                        • Instruction Fuzzy Hash: 5C31B035305A07AFDF344FA5C948AA9BB74FF09314F104526F92C92A40DB34A862DB90
                        APIs
                        • IsWindowVisible.USER32(?), ref: 6C866A5F
                        • GetWindow.USER32(?,00000005), ref: 6C866A76
                        • GetWindowRect.USER32(00000000,?), ref: 6C866A91
                          • Part of subcall function 6C872981: ScreenToClient.USER32(?,?), ref: 6C872990
                          • Part of subcall function 6C872981: ScreenToClient.USER32(?,?), ref: 6C87299D
                        • SetWindowPos.USER32(00000000,00000000,?,?,00000000,00000000,00000015,?), ref: 6C866AB7
                        • GetWindow.USER32(00000000,00000002), ref: 6C866AC0
                        • ScrollWindow.USER32(?,?,?,?,?), ref: 6C866ADC
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$ClientScreen$RectScrollVisible
                        • String ID:
                        • API String ID: 1714389229-0
                        • Opcode ID: bb4b8cadcfbbd6f7af66105c9615f4ef58f7b8c3aa31f5c883d703485b736fd9
                        • Instruction ID: 3dd47bc3eb6969916501985648276d0432bf4806d65a9a77a787efa27f2cd256
                        • Opcode Fuzzy Hash: bb4b8cadcfbbd6f7af66105c9615f4ef58f7b8c3aa31f5c883d703485b736fd9
                        • Instruction Fuzzy Hash: C3218F76600609EBDB11CF65CD849AFBBB9FF89718B258529F905A7A10EB30ED408B50
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C889EF8
                        • CreateRectRgnIndirect.GDI32(00000000), ref: 6C889F18
                          • Part of subcall function 6C8729C0: SelectClipRgn.GDI32(?,00000000), ref: 6C8729E0
                          • Part of subcall function 6C8729C0: SelectClipRgn.GDI32(?,00000000), ref: 6C8729F6
                        • GetParent.USER32(00000000), ref: 6C889F38
                        • DrawThemeParentBackground.UXTHEME(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00000018), ref: 6C889F59
                        • MapWindowPoints.USER32(00000000,?,00000000,00000001), ref: 6C889F8D
                        • SendMessageW.USER32(?,00000014,00000000,00000000), ref: 6C889FB9
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ClipParentSelect$BackgroundCreateDrawH_prolog3IndirectMessagePointsRectSendThemeWindow
                        • String ID:
                        • API String ID: 935984306-0
                        • Opcode ID: 114ae40a41d87db617333c135f091d4e37fd0ade0de669705cda8b73f9148362
                        • Instruction ID: a7d8b56eb6e11cd95395cc21d17ba311c92ae12fa6a865bf380f4773aeb207f3
                        • Opcode Fuzzy Hash: 114ae40a41d87db617333c135f091d4e37fd0ade0de669705cda8b73f9148362
                        • Instruction Fuzzy Hash: 1E314E71A0020AEFCF15DFA4C958BEE7BB4FF18305F104828E615A7650DB759954CBA0
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C886D26
                          • Part of subcall function 6C871A91: __EH_prolog3.LIBCMT ref: 6C871A98
                          • Part of subcall function 6C871A91: GetWindowDC.USER32(00000000,00000004,6C88AE60,00000000), ref: 6C871AC4
                        • GetClientRect.USER32(?,?), ref: 6C886D48
                        • GetWindowRect.USER32(?,?), ref: 6C886D5C
                          • Part of subcall function 6C872981: ScreenToClient.USER32(?,?), ref: 6C872990
                          • Part of subcall function 6C872981: ScreenToClient.USER32(?,?), ref: 6C87299D
                        • OffsetRect.USER32(?,?,?), ref: 6C886D7D
                          • Part of subcall function 6C87258F: ExcludeClipRect.GDI32(?,?,?,?,?), ref: 6C8725C6
                          • Part of subcall function 6C87258F: ExcludeClipRect.GDI32(00000000,?,?,?,?), ref: 6C8725E3
                        • OffsetRect.USER32(?,?,?), ref: 6C886D9F
                          • Part of subcall function 6C8726D4: IntersectClipRect.GDI32(?,?,?,?,?), ref: 6C87270B
                          • Part of subcall function 6C8726D4: IntersectClipRect.GDI32(00000000,?,?,?,?), ref: 6C872728
                        • SendMessageW.USER32(?,00000014,?,00000000), ref: 6C886DD7
                          • Part of subcall function 6C871BEA: ReleaseDC.USER32(?,00000000), ref: 6C871C1E
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Clip$Client$ExcludeIntersectOffsetScreenWindow$H_prolog3H_prolog3_MessageReleaseSend
                        • String ID:
                        • API String ID: 3860140383-0
                        • Opcode ID: c2eb410bc4354f8f53b83b46931cf60671cb68a8016a3b4ba82f03a0e9f69d6b
                        • Instruction ID: 2602273fc67fccbe73a6c6989ee1ed0d358b1e5f9164dc507867ede5e228fc58
                        • Opcode Fuzzy Hash: c2eb410bc4354f8f53b83b46931cf60671cb68a8016a3b4ba82f03a0e9f69d6b
                        • Instruction Fuzzy Hash: A4311672A04519AFCF15DBA4CD98DFDB779FF59304F14022AF802B3650EB24AA49CB60
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C886D26
                          • Part of subcall function 6C871A91: __EH_prolog3.LIBCMT ref: 6C871A98
                          • Part of subcall function 6C871A91: GetWindowDC.USER32(00000000,00000004,6C88AE60,00000000), ref: 6C871AC4
                        • GetClientRect.USER32(?,?), ref: 6C886D48
                        • GetWindowRect.USER32(?,?), ref: 6C886D5C
                          • Part of subcall function 6C872981: ScreenToClient.USER32(?,?), ref: 6C872990
                          • Part of subcall function 6C872981: ScreenToClient.USER32(?,?), ref: 6C87299D
                        • OffsetRect.USER32(?,?,?), ref: 6C886D7D
                          • Part of subcall function 6C87258F: ExcludeClipRect.GDI32(?,?,?,?,?), ref: 6C8725C6
                          • Part of subcall function 6C87258F: ExcludeClipRect.GDI32(00000000,?,?,?,?), ref: 6C8725E3
                        • OffsetRect.USER32(?,?,?), ref: 6C886D9F
                          • Part of subcall function 6C8726D4: IntersectClipRect.GDI32(?,?,?,?,?), ref: 6C87270B
                          • Part of subcall function 6C8726D4: IntersectClipRect.GDI32(00000000,?,?,?,?), ref: 6C872728
                        • SendMessageW.USER32(?,00000014,?,00000000), ref: 6C886DD7
                          • Part of subcall function 6C871BEA: ReleaseDC.USER32(?,00000000), ref: 6C871C1E
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Clip$Client$ExcludeIntersectOffsetScreenWindow$H_prolog3H_prolog3_MessageReleaseSend
                        • String ID:
                        • API String ID: 3860140383-0
                        • Opcode ID: ef4213b68e1d571ffb449b7dc88d16fe95d82d4d21a01fe45f83e0e5e962e37a
                        • Instruction ID: 0c1a76ee67fff57684d11f1d8286360a84e8cfd5dc1ec1e551e14dbab2c8f9a9
                        • Opcode Fuzzy Hash: ef4213b68e1d571ffb449b7dc88d16fe95d82d4d21a01fe45f83e0e5e962e37a
                        • Instruction Fuzzy Hash: EA310772A04119AFCF15DBA4CD98DFDB779BF59304F140219F902B3650EB24AA49CB60
                        APIs
                        • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C8EEC01
                        • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C8EEC17
                        • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C8EEC22
                        • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C8EEC2D
                        • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C8EEC38
                        • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C8EEC43
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ContextExternal$BaseBase::~Concurrency::details::
                        • String ID:
                        • API String ID: 1690591649-0
                        • Opcode ID: e7e0a0789b20c071b6903ccaf66f6b06d83047949c3612fffd12cfe86726967f
                        • Instruction ID: 2c7b93d5e754df9dbded787f5e73de55fdc1417307cade570ffff95798aa3dcf
                        • Opcode Fuzzy Hash: e7e0a0789b20c071b6903ccaf66f6b06d83047949c3612fffd12cfe86726967f
                        • Instruction Fuzzy Hash: 03217F31300941ABC728EFA8C9A0BEDFB65FB45254F404A39C41647B80DF24691ACBD1
                        APIs
                        • GetLastError.KERNEL32(00000001,?,6C9A44E1,6C99F455,6C99F718,?,6C99F94E,?,00000001,?,?,00000001,?,6CA2CBE0,0000000C,6C99FA47), ref: 6C9A46A0
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6C9A46AE
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6C9A46C7
                        • SetLastError.KERNEL32(00000000,6C99F94E,?,00000001,?,?,00000001,?,6CA2CBE0,0000000C,6C99FA47,?,00000001,?), ref: 6C9A4719
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: dac564de83646f84c81d0df8fc1b10a17f4aa6873b5bc1a0ff4495946fea008a
                        • Instruction ID: 4afd196d4d62acc9b9f0f4dc63e33c780e38dd8c129090c3a8621337f4993cdd
                        • Opcode Fuzzy Hash: dac564de83646f84c81d0df8fc1b10a17f4aa6873b5bc1a0ff4495946fea008a
                        • Instruction Fuzzy Hash: 4701283230EB125EDB2809F96C9865637A9EB6373D7300329E114859E0EF51CC4B8A80
                        APIs
                        • GetDesktopWindow.USER32 ref: 6C86CF63
                        • GetWindow.USER32(00000000), ref: 6C86CF6A
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 6C86CF98
                        • ShowWindow.USER32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,6C86CA7A,00000000,000000FF), ref: 6C86CFB3
                        • ShowWindow.USER32(00000000,00000004,?,?,?,?,?,?,?,?,?,?,6C86CA7A,00000000,000000FF), ref: 6C86CFD4
                        • GetWindow.USER32(00000000,00000002), ref: 6C86CFE1
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$Show$DesktopLong
                        • String ID:
                        • API String ID: 3178490500-0
                        • Opcode ID: 84c8ff5babe7f0a7172e35566ad96310a92c3859e7bab3eb4a6e6adcfba045c8
                        • Instruction ID: 931225556178b84e1171629d4843108e906530c0622a110d2d280e7290bc3a22
                        • Opcode Fuzzy Hash: 84c8ff5babe7f0a7172e35566ad96310a92c3859e7bab3eb4a6e6adcfba045c8
                        • Instruction Fuzzy Hash: E111E931649E15B7DF312F268F09B4A7675EF02B69F200721F910A5D81DFA4E440C6E4
                        APIs
                        • ClientToScreen.USER32(?,?), ref: 6C87C4ED
                        • GetDlgCtrlID.USER32(00000000), ref: 6C87C4F8
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 6C87C508
                        • GetWindowRect.USER32(00000000,?), ref: 6C87C521
                        • PtInRect.USER32(?,?,?), ref: 6C87C531
                        • GetWindow.USER32(?,00000005), ref: 6C87C53E
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$Rect$ClientCtrlLongScreen
                        • String ID:
                        • API String ID: 1315500227-0
                        • Opcode ID: 13c60c45a04985b0c6f30d3bcf863dbfd45c9c80a312295a9da0fae8d5cb915e
                        • Instruction ID: 7b89ab2fd796ab90176151833d3dca443988ba1d640b9265946fb4bd356b41fd
                        • Opcode Fuzzy Hash: 13c60c45a04985b0c6f30d3bcf863dbfd45c9c80a312295a9da0fae8d5cb915e
                        • Instruction Fuzzy Hash: 3601C431605519ABDF21EF688D04EEE7B78FF0A718F604611F805F7440EB34AA81C7A0
                        APIs
                        • GetFocus.USER32 ref: 6C87C261
                          • Part of subcall function 6C87C5AB: GetWindowLongW.USER32(?,000000F0), ref: 6C87C5C6
                          • Part of subcall function 6C87C5AB: GetClassNameW.USER32(?,?,0000000A), ref: 6C87C5DB
                          • Part of subcall function 6C87C5AB: CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,combobox,000000FF), ref: 6C87C5F2
                        • GetParent.USER32(00000000), ref: 6C87C282
                        • GetWindowLongW.USER32(?,000000F0), ref: 6C87C2A1
                        • GetParent.USER32(?), ref: 6C87C2AF
                        • GetDesktopWindow.USER32 ref: 6C87C2B7
                        • SendMessageW.USER32(00000000,0000014F,00000000,00000000), ref: 6C87C2CB
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$LongParent$ClassCompareDesktopFocusMessageNameSendString
                        • String ID:
                        • API String ID: 1233893325-0
                        • Opcode ID: bbb5ac175dd9a08d19596b9a24a928c6b1ade04f013466cd4071010240f43436
                        • Instruction ID: e3c6fa290cde33ffdcbc493e14a40a3c330c5815e1106e1272a855952c0d9eed
                        • Opcode Fuzzy Hash: bbb5ac175dd9a08d19596b9a24a928c6b1ade04f013466cd4071010240f43436
                        • Instruction Fuzzy Hash: 6DF0F43234AA1023DB3236745E48B6E36389B92F75F704528FC11B3E81EFA0E84185B4
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C877FFF
                        • CoCreateGuid.OLE32(?,00000034), ref: 6C878054
                        • SysFreeString.OLEAUT32(?), ref: 6C87823E
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CreateFreeGuidH_prolog3_String
                        • String ID: %08lX-%04X-%04x-%02X%02X-%02X%02X%02X%02X%02X%02X$RestartByRestartManager
                        • API String ID: 1084067465-5890034
                        • Opcode ID: 5bfc65e70800c4c65d8bd642c00d674c1b64119fa2dcd19c43859106265e0913
                        • Instruction ID: ccfe24a207c56c083a8aa94c0f571261501a3214ca33da80ea1ca4b32792017b
                        • Opcode Fuzzy Hash: 5bfc65e70800c4c65d8bd642c00d674c1b64119fa2dcd19c43859106265e0913
                        • Instruction Fuzzy Hash: FFA1C371A00119AFCB25DFA8C994AFEB7B9EF59318F144469E401B7780EB74AD05CBB0
                        APIs
                        • __EH_prolog3_catch.LIBCMT ref: 6C89440F
                          • Part of subcall function 6C868E82: GetDlgCtrlID.USER32(?), ref: 6C868E8D
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CtrlH_prolog3_catch
                        • String ID: %TsMFCToolBar-%d$%TsMFCToolBar-%d%x$Buttons$MFCToolBars
                        • API String ID: 3893142374-3577816979
                        • Opcode ID: 454c5f85d54b47e08a0494365a3549e41681bf66cabe66f56cee0087a985372b
                        • Instruction ID: e1e220be0ee7c69d638509e88a5a4585ef44e5760a2cf4a2fb2e92b9cba810ed
                        • Opcode Fuzzy Hash: 454c5f85d54b47e08a0494365a3549e41681bf66cabe66f56cee0087a985372b
                        • Instruction Fuzzy Hash: FC919F75A00209DFDF10DF98CA84AEDB7B6AF89318F244569E915B7790CB30AD05CF61
                        APIs
                        • __EH_prolog3_catch.LIBCMT ref: 6C8B2BB8
                        • CloseHandle.KERNEL32(?,?,?,00000080,6C912735,?,00000000,?,?,00000000,?,00000000), ref: 6C8B2BF3
                          • Part of subcall function 6C881B60: __EH_prolog3.LIBCMT ref: 6C881B67
                        • GetTempPathW.KERNEL32(00000104,00000000,00000104,?,?,00000080,6C912735,?,00000000,?,?,00000000,?,00000000), ref: 6C8B2C14
                        • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000002,04000100,00000000,000000FF,000000FF,?,?,00000000,?,00000000), ref: 6C8B2C69
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CloseCreateFileH_prolog3H_prolog3_catchHandlePathTemp
                        • String ID: AFX
                        • API String ID: 775233504-1300893600
                        • Opcode ID: 1bb037f0529a54386e869c745899a840d180e51971815da7d0cc467c021e36f2
                        • Instruction ID: 81e730b593a701d25f485b8c2a0d6a62603e1dabcae24f94105af417d2d148dd
                        • Opcode Fuzzy Hash: 1bb037f0529a54386e869c745899a840d180e51971815da7d0cc467c021e36f2
                        • Instruction Fuzzy Hash: CD419070900149EBDB24DFA8CE94FEEB7B4AF59308F104968E416B76D0DB746E09CB60
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C86CFFE
                          • Part of subcall function 6C868F77: GetWindowLongW.USER32(?,000000F0), ref: 6C868F84
                        • swprintf.LIBCMT ref: 6C86D053
                        • swprintf.LIBCMT ref: 6C86D0F7
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: swprintf$H_prolog3_LongWindow
                        • String ID: - $:%d
                        • API String ID: 524023746-2359489159
                        • Opcode ID: ad669656f274feb8966b2ec08b1ac2e19e7584d089cc1603c1c5da60f248b226
                        • Instruction ID: c35300289ba320528fcc55464e0d6c0b46efc4eee6cc74d9ba4e879b080288a6
                        • Opcode Fuzzy Hash: ad669656f274feb8966b2ec08b1ac2e19e7584d089cc1603c1c5da60f248b226
                        • Instruction Fuzzy Hash: 78313671901519BBD7249BB5CE45FEFB36CEF14218F4008A5A50DBBE51DB34EE0A8B50
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: String$FreeH_prolog3
                        • String ID: @
                        • API String ID: 315669285-2766056989
                        • Opcode ID: da55c89e0c1ba86b9039c644e77db0ae42588492c12e64df2586aa868b21e575
                        • Instruction ID: c7ba566d3936fd6688291d1011950fd9b6ab245baade83ced492ce73b27fbe30
                        • Opcode Fuzzy Hash: da55c89e0c1ba86b9039c644e77db0ae42588492c12e64df2586aa868b21e575
                        • Instruction Fuzzy Hash: 15318D7190120AEFDF11CFA8CD849EEBB79EF04318F104529F925AA6D0EB30D955CB60
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8EAAB5
                          • Part of subcall function 6C868E82: GetDlgCtrlID.USER32(?), ref: 6C868E8D
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CtrlH_prolog3
                        • String ID: %TsBasePane-%d$%TsBasePane-%d%x$BasePanes$IsVisible
                        • API String ID: 3125906040-2169875744
                        • Opcode ID: 0fb57c173722843cd4428d7bc526890d95b11009c3b5a78217b41cea66922bb8
                        • Instruction ID: 51cbcc3557dc93b583448dcdf21ea742cc03f8542c876fcf94343b1ec3128280
                        • Opcode Fuzzy Hash: 0fb57c173722843cd4428d7bc526890d95b11009c3b5a78217b41cea66922bb8
                        • Instruction Fuzzy Hash: B431D431A002099BCF10EFA8CD849FEBB75AF9A318F144969E91177791DB30A905CB91
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8EA32F
                          • Part of subcall function 6C868E82: GetDlgCtrlID.USER32(?), ref: 6C868E8D
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CtrlH_prolog3
                        • String ID: %TsBasePane-%d$%TsBasePane-%d%x$BasePanes$IsVisible
                        • API String ID: 3125906040-2169875744
                        • Opcode ID: 429fa6d70c480d6be803c450ce755ceb67e2e82bdc3de03c4741c52f78ed6d93
                        • Instruction ID: dac07cb8c1596f27695461c5a1bbcf22000390c4bac450d27246dbdb86bdc566
                        • Opcode Fuzzy Hash: 429fa6d70c480d6be803c450ce755ceb67e2e82bdc3de03c4741c52f78ed6d93
                        • Instruction Fuzzy Hash: 9431C171A001099FCF10DFA8C9849EEBBB5BF59318F144968E911BB7C1DB71AE05CBA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID:
                        • String ID: Edit
                        • API String ID: 0-554135844
                        • Opcode ID: 97879ca3d6dc889e815477d013133c728fcf55a4c40ea45982b7871506cec392
                        • Instruction ID: f6ca87a031d4a10c78252f269f0daadccac3c4b9e9efc6f88eec164ed47a5d1c
                        • Opcode Fuzzy Hash: 97879ca3d6dc889e815477d013133c728fcf55a4c40ea45982b7871506cec392
                        • Instruction Fuzzy Hash: 2E11E931305601ABEF301A25CE45BDF76B8AF467AAF205C39E5A1E2DA0FB75E441C670
                        APIs
                        • GetModuleHandleW.KERNEL32(Advapi32.dll,7CCA8F6A,?,?,?,Function_0018C862,000000FF), ref: 6C88C012
                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 6C88C022
                          • Part of subcall function 6C879838: GetModuleHandleW.KERNEL32(Advapi32.dll,00000000,00000010,?,?,6C879742,?,00000010), ref: 6C87984B
                          • Part of subcall function 6C879838: GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 6C87985B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: Advapi32.dll$RegDeleteKeyExW
                        • API String ID: 1646373207-2191092095
                        • Opcode ID: 32baac9b20acdbc9369d8f7d46a1d0f2517f5d77df471989a79c97a217737a0f
                        • Instruction ID: 3454191b872626882399ee841d2436f8db7a8840d7017e7d085594bd5c003343
                        • Opcode Fuzzy Hash: 32baac9b20acdbc9369d8f7d46a1d0f2517f5d77df471989a79c97a217737a0f
                        • Instruction Fuzzy Hash: 1811B23560A605EBDF269F15CD04F89BB74FB4AB94F10862BF805E3E55DB31A840CB80
                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,?,?,00000000,00000000,?,?,6C88E1FC,7CCA8F6A), ref: 6C88E4AD
                        • GetProcAddress.KERNEL32(00000000,CreateFileTransactedW), ref: 6C88E4BD
                        • CreateFileW.KERNEL32(?,?,7CCA8F6A,6C88E1FC,?,?,00000000,?,00000000,?,?,00000000,00000000,?,?,6C88E1FC), ref: 6C88E506
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AddressCreateFileHandleModuleProc
                        • String ID: CreateFileTransactedW$kernel32.dll
                        • API String ID: 2580138172-2053874626
                        • Opcode ID: 697ade47b133298203b8be91dcd2d2c496d0da3d176b94b729243e5da991908a
                        • Instruction ID: bdd7e7f626e0cfdf34302c9c60689a28571a356702424e440f38f8ca93ed657a
                        • Opcode Fuzzy Hash: 697ade47b133298203b8be91dcd2d2c496d0da3d176b94b729243e5da991908a
                        • Instruction Fuzzy Hash: 69014C3610550EFFDF124F94CE48CAB3B7AFF493957208929FA2451860DB32C971ABA0
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C87E356
                        • GetClassNameW.USER32(?,00000000,00000400), ref: 6C87E387
                        • GetWindowLongW.USER32(?,000000F0), ref: 6C87E3C0
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ClassH_prolog3LongNameWindow
                        • String ID: ComboBox$ComboBoxEx32
                        • API String ID: 297531199-1907415764
                        • Opcode ID: e9f4bd66d884bba0a39e0e18e7ae1ebbb31c34a02a4282257a6618ff3455277d
                        • Instruction ID: 3ca4dc44f60c3782bb0b798f6b0646dafc0b86d0897a0fc780bbe2e2a0182914
                        • Opcode Fuzzy Hash: e9f4bd66d884bba0a39e0e18e7ae1ebbb31c34a02a4282257a6618ff3455277d
                        • Instruction Fuzzy Hash: DB016175819116ABDB20DB54CE04BEEB774BF2236CF640928E411A2ED0EF70E558CBA5
                        APIs
                        • _callnewh.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00851D85
                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00851D92
                        • _CxxThrowException.VCRUNTIME140(?,008527B4), ref: 00851E99
                        • _CxxThrowException.VCRUNTIME140(?,00852808), ref: 00851EB6
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1695694382.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                        • Associated: 00000003.00000002.1695648911.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695714101.0000000000852000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695732256.0000000000853000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000854000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000896000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_850000_Update.jbxd
                        Similarity
                        • API ID: ExceptionThrow$_callnewhmalloc
                        • String ID: Unknown exception
                        • API String ID: 4113974480-410509341
                        • Opcode ID: ab21df8cfabc4f333fe9ea6ccb5e5aed01d868abf8fba5465bcdff5d497715cb
                        • Instruction ID: 861541834ed4b629c51e7d906a25a0e051060367458a4768d0dab2e2f08d083c
                        • Opcode Fuzzy Hash: ab21df8cfabc4f333fe9ea6ccb5e5aed01d868abf8fba5465bcdff5d497715cb
                        • Instruction Fuzzy Hash: D5F0AD2450020C728F04AAE8D80EB6977ADFA00757BA04520ED15D2091EF60EA5DC2C1
                        APIs
                        • FindResourceW.KERNEL32(00000000,?,PNG,?,?,?,6C9EDEF0,?,6C8E5767,?,?,?,00000038,6C8E4425), ref: 6C8E4972
                        • LoadResource.KERNEL32(00000000,00000000,?,6C9EDEF0,?,6C8E5767,?,?,?,00000038,6C8E4425), ref: 6C8E4980
                        • LockResource.KERNEL32(00000000,?,6C9EDEF0,?,6C8E5767,?,?,?,00000038,6C8E4425), ref: 6C8E498B
                        • SizeofResource.KERNEL32(00000000,00000000,?,6C9EDEF0,?,6C8E5767,?,?,?,00000038,6C8E4425), ref: 6C8E4999
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Resource$FindLoadLockSizeof
                        • String ID: PNG
                        • API String ID: 3473537107-364855578
                        • Opcode ID: 8f7abc9fec684529a191bfb3883ceff3967c304355f5677d21cf3b1a95b04c45
                        • Instruction ID: 5b83a6ab57dfddd61581503a62d5a560661508aaa9a0ec2a8d422bd29cd76208
                        • Opcode Fuzzy Hash: 8f7abc9fec684529a191bfb3883ceff3967c304355f5677d21cf3b1a95b04c45
                        • Instruction Fuzzy Hash: A5F0C236605610BF9B11ABE6CA48C9F37BCDFCBA953140824B904B3310DBB0F9009679
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,7CCA8F6A,?,?,00000000,6C9CC862,000000FF,?,6C9AF9FE,6C9AFB15,?,6C9AF9D2,00000000), ref: 6C9AFA99
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6C9AFAAB
                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,6C9CC862,000000FF,?,6C9AF9FE,6C9AFB15,?,6C9AF9D2,00000000), ref: 6C9AFACD
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: cb6f6311137ee9106f617606588732fdf58cb61d03a2888e287ec3bc84270a04
                        • Instruction ID: d15da13ace3d8379ac21e4bad0adc58a8b7ee08a8cf8f92e126cd8e8474f2bca
                        • Opcode Fuzzy Hash: cb6f6311137ee9106f617606588732fdf58cb61d03a2888e287ec3bc84270a04
                        • Instruction Fuzzy Hash: 98016731A04A55FFDB119F94CC04BEEB7BCFB45719F104625F811A2A80DB749941CB50
                        APIs
                        • DecodePointer.KERNEL32(00000000), ref: 6C87EB72
                          • Part of subcall function 6C8633F4: GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 6C86341A
                          • Part of subcall function 6C8633F4: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6C86342A
                          • Part of subcall function 6C8633F4: EncodePointer.KERNEL32(00000000,?,00000000), ref: 6C863433
                        • GetProcAddress.KERNEL32(00000000,DwmDefWindowProc), ref: 6C87EB5B
                        • EncodePointer.KERNEL32(00000000), ref: 6C87EB64
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressEncodeProc$DecodeHandleModule
                        • String ID: DwmDefWindowProc$dwmapi.dll
                        • API String ID: 1102202064-234806475
                        • Opcode ID: 275f86a5bcb9494dc64332c14b0a24a0dc378efa96375f2a5079cf0afedd6f1e
                        • Instruction ID: 47dc77be585fa8293d12cc76d5beb3e3b4374d46789cb4bfb1616d490fb62934
                        • Opcode Fuzzy Hash: 275f86a5bcb9494dc64332c14b0a24a0dc378efa96375f2a5079cf0afedd6f1e
                        • Instruction Fuzzy Hash: BFF04F75605616BF8F315FB58E0489E3E78AF1A6657104821F805E2A40EB30D8508BE1
                        APIs
                        • DecodePointer.KERNEL32(00000000), ref: 6C87EC92
                          • Part of subcall function 6C8633F4: GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 6C86341A
                          • Part of subcall function 6C8633F4: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6C86342A
                          • Part of subcall function 6C8633F4: EncodePointer.KERNEL32(00000000,?,00000000), ref: 6C863433
                        • GetProcAddress.KERNEL32(00000000,DwmSetIconicLivePreviewBitmap), ref: 6C87EC7B
                        • EncodePointer.KERNEL32(00000000), ref: 6C87EC84
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressEncodeProc$DecodeHandleModule
                        • String ID: DwmSetIconicLivePreviewBitmap$dwmapi.dll
                        • API String ID: 1102202064-1757063745
                        • Opcode ID: bc941fd1907c4477d684e3cd7daccd8661f20b96f52e24806aa0d5866165e9b7
                        • Instruction ID: ce669b8bf05402c88c804134d7c3205d3f9bd3915b714bd3bab80735a5ee1ef8
                        • Opcode Fuzzy Hash: bc941fd1907c4477d684e3cd7daccd8661f20b96f52e24806aa0d5866165e9b7
                        • Instruction Fuzzy Hash: 05F0967960561AEF8F315F64CE0889D3AB8AF492693114815FD05F7601DB30D8118BE0
                        APIs
                        • DecodePointer.KERNEL32(00000000), ref: 6C87ED59
                          • Part of subcall function 6C8633F4: GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 6C86341A
                          • Part of subcall function 6C8633F4: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6C86342A
                          • Part of subcall function 6C8633F4: EncodePointer.KERNEL32(00000000,?,00000000), ref: 6C863433
                        • GetProcAddress.KERNEL32(00000000,DwmSetWindowAttribute), ref: 6C87ED42
                        • EncodePointer.KERNEL32(00000000), ref: 6C87ED4B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressEncodeProc$DecodeHandleModule
                        • String ID: DwmSetWindowAttribute$dwmapi.dll
                        • API String ID: 1102202064-3105884578
                        • Opcode ID: d8fc121b9cc62194fcd024abb6932bfaa0ab48a99c4dfcc8efe9522144d3bbbd
                        • Instruction ID: 9baa40a6a622ca06024effa05b7506de25d7b4e8bc3940cf4ecc4b251dbe5af9
                        • Opcode Fuzzy Hash: d8fc121b9cc62194fcd024abb6932bfaa0ab48a99c4dfcc8efe9522144d3bbbd
                        • Instruction Fuzzy Hash: 97F09675645617AF8F315FA9CF089AD3F78AF4A3563104821FD04E7610EB30D8508BE0
                        APIs
                        • DecodePointer.KERNEL32(00000000), ref: 6C87ECF7
                          • Part of subcall function 6C8633F4: GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 6C86341A
                          • Part of subcall function 6C8633F4: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6C86342A
                          • Part of subcall function 6C8633F4: EncodePointer.KERNEL32(00000000,?,00000000), ref: 6C863433
                        • GetProcAddress.KERNEL32(00000000,DwmSetIconicThumbnail), ref: 6C87ECE0
                        • EncodePointer.KERNEL32(00000000), ref: 6C87ECE9
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressEncodeProc$DecodeHandleModule
                        • String ID: DwmSetIconicThumbnail$dwmapi.dll
                        • API String ID: 1102202064-2331651847
                        • Opcode ID: 05cf44e79fb8152ade7a54465343ee31633748948c69b59e69b30147141fa769
                        • Instruction ID: da7c161151d8679bdafdadd8b484626758a204da0f39f235c44916021ef47ec3
                        • Opcode Fuzzy Hash: 05cf44e79fb8152ade7a54465343ee31633748948c69b59e69b30147141fa769
                        • Instruction Fuzzy Hash: 8FF0B47964561BAF8F315BA88F0889E3B78EF0A2963214C21FC04E7601EF30D8508BF1
                        APIs
                        • DecodePointer.KERNEL32(00000000), ref: 6C87EC33
                          • Part of subcall function 6C8633F4: GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 6C86341A
                          • Part of subcall function 6C8633F4: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6C86342A
                          • Part of subcall function 6C8633F4: EncodePointer.KERNEL32(00000000,?,00000000), ref: 6C863433
                        • GetProcAddress.KERNEL32(00000000,DwmIsCompositionEnabled), ref: 6C87EC1C
                        • EncodePointer.KERNEL32(00000000), ref: 6C87EC25
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressEncodeProc$DecodeHandleModule
                        • String ID: DwmIsCompositionEnabled$dwmapi.dll
                        • API String ID: 1102202064-1198327662
                        • Opcode ID: fb2112ee03953bc1d6c2796f58af07332401e642476ed2b706ab5a83f9ac6cd8
                        • Instruction ID: c96ea081bf731cf8c887375455e5e6df533bffb502f49ff93e7606a2c722f096
                        • Opcode Fuzzy Hash: fb2112ee03953bc1d6c2796f58af07332401e642476ed2b706ab5a83f9ac6cd8
                        • Instruction Fuzzy Hash: BEF0543961561A9FCB355BA4CF0459D3BB8AF4A6567164C21E804E7A00EF24D84147E5
                        APIs
                        • DecodePointer.KERNEL32(00000000), ref: 6C87EBD7
                          • Part of subcall function 6C8633F4: GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 6C86341A
                          • Part of subcall function 6C8633F4: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6C86342A
                          • Part of subcall function 6C8633F4: EncodePointer.KERNEL32(00000000,?,00000000), ref: 6C863433
                        • GetProcAddress.KERNEL32(00000000,DwmInvalidateIconicBitmaps), ref: 6C87EBC0
                        • EncodePointer.KERNEL32(00000000), ref: 6C87EBC9
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Pointer$AddressEncodeProc$DecodeHandleModule
                        • String ID: DwmInvalidateIconicBitmaps$dwmapi.dll
                        • API String ID: 1102202064-1901905683
                        • Opcode ID: 798c59e75b659516d3ba62b7bc03e43ecc772e0cf3b0a633ede730fc55ade906
                        • Instruction ID: 44e9dbee1c681bd0d926bf3a71ab7bceefc5f3fd6f34db2a2f62b830e9c44a18
                        • Opcode Fuzzy Hash: 798c59e75b659516d3ba62b7bc03e43ecc772e0cf3b0a633ede730fc55ade906
                        • Instruction Fuzzy Hash: E9F08935609A27AF4B315A698A08C9D3A789F0A7593108C21FC05F7A40EF20D8414BE1
                        APIs
                          • Part of subcall function 6C888A74: PeekMessageW.USER32(?,00000000,0000000F,0000000F,00000000), ref: 6C888AAE
                          • Part of subcall function 6C888A74: SetRectEmpty.USER32(?), ref: 6C888AD6
                          • Part of subcall function 6C888A74: GetDesktopWindow.USER32 ref: 6C888AEE
                          • Part of subcall function 6C888A74: LockWindowUpdate.USER32(?,00000000), ref: 6C888AFF
                          • Part of subcall function 6C888A74: GetDCEx.USER32(?,00000000,00000003), ref: 6C888B16
                          • Part of subcall function 6C87264C: GetLayout.GDI32(?,6C888BFC), ref: 6C87264F
                        • GetWindowRect.USER32(?,?), ref: 6C888C2D
                          • Part of subcall function 6C872BC8: SetLayout.GDI32(?,?), ref: 6C872BD1
                          • Part of subcall function 6C887ECA: AdjustWindowRectEx.USER32(?,?,00000000,00000188), ref: 6C887EDA
                        • InflateRect.USER32(?,00000002,00000002), ref: 6C888F4B
                        • InflateRect.USER32(00000000,00000002,00000002), ref: 6C888F62
                          • Part of subcall function 6C88957E: OffsetRect.USER32(?,00000000,00000000), ref: 6C8895B7
                          • Part of subcall function 6C888B2D: OffsetRect.USER32(?,?,?), ref: 6C888B47
                          • Part of subcall function 6C888B2D: OffsetRect.USER32(?,?,?), ref: 6C888B53
                          • Part of subcall function 6C888B2D: OffsetRect.USER32(?,?,?), ref: 6C888B5F
                          • Part of subcall function 6C888B2D: OffsetRect.USER32(?,?,?), ref: 6C888B6B
                          • Part of subcall function 6C8893F6: GetCapture.USER32 ref: 6C889400
                          • Part of subcall function 6C8893F6: SetCapture.USER32(?), ref: 6C889414
                          • Part of subcall function 6C8893F6: GetCapture.USER32 ref: 6C889420
                          • Part of subcall function 6C8893F6: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 6C88943E
                          • Part of subcall function 6C8893F6: DispatchMessageW.USER32(?), ref: 6C88947A
                          • Part of subcall function 6C8893F6: GetCapture.USER32 ref: 6C8894D8
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Offset$CaptureWindow$Message$InflateLayout$AdjustDesktopDispatchEmptyLockPeekUpdate
                        • String ID:
                        • API String ID: 2444846054-0
                        • Opcode ID: 668cbed1d8bfe0425078be975e39f18b7af2982d34dcc95099249ccae02b1519
                        • Instruction ID: ee88e78078897c526c141f2928032c0359c12468fc30ab6072a677d2a8b746c7
                        • Opcode Fuzzy Hash: 668cbed1d8bfe0425078be975e39f18b7af2982d34dcc95099249ccae02b1519
                        • Instruction Fuzzy Hash: C9E13775E01A199FCF15CF98C940AEEBBB2BF49320F15811AF915BB350DB71AA41CB90
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Empty$Client
                        • String ID:
                        • API String ID: 1457177775-0
                        • Opcode ID: 32ba301af6f2f4cf95895730dbf4045b5fdd1194adacb0653544c24b4ca99c1e
                        • Instruction ID: 748aaafd9854b587a470ebb660d4e0ce79e855d46a131fd0fcaa2a5368436019
                        • Opcode Fuzzy Hash: 32ba301af6f2f4cf95895730dbf4045b5fdd1194adacb0653544c24b4ca99c1e
                        • Instruction Fuzzy Hash: B7D17A31E00A19CFCF25CFA8C684ADEB7F2BF49314F244569E816BB640D775A946CB50
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C89C840
                        • IsWindow.USER32(00000000), ref: 6C89C854
                        • GetClientRect.USER32(00000000,00000000), ref: 6C89C8A9
                        • GetCursorPos.USER32(?), ref: 6C89CA72
                        • ScreenToClient.USER32(00000000,?), ref: 6C89CA7F
                          • Part of subcall function 6C890801: __EH_prolog3_GS.LIBCMT ref: 6C89080B
                          • Part of subcall function 6C890801: GetClientRect.USER32(00000000,00000000), ref: 6C890865
                          • Part of subcall function 6C89BEAB: __EH_prolog3_GS.LIBCMT ref: 6C89BEB5
                          • Part of subcall function 6C89BEAB: SendMessageW.USER32(00000000,0000040D,00000000,00000000), ref: 6C89BEE0
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ClientH_prolog3_$Rect$CursorMessageScreenSendWindow
                        • String ID:
                        • API String ID: 3214297127-0
                        • Opcode ID: 878924af2f90de392eb6d3a545714f847eb4392817e0a471e84b1762dbc675ce
                        • Instruction ID: 565171f4eb6c7cd8e5c1a1710192cf1ae32e7966c57f92dbc73219685e25ee6c
                        • Opcode Fuzzy Hash: 878924af2f90de392eb6d3a545714f847eb4392817e0a471e84b1762dbc675ce
                        • Instruction Fuzzy Hash: CC816F71E00619CFDF24DFA8CA80ADCBBB5BF48308F14457AE806AB755DB31A945CB60
                        APIs
                        • __EH_prolog3_catch.LIBCMT ref: 6C879D36
                        • GlobalLock.KERNEL32(00000000), ref: 6C879E38
                        • DestroyWindow.USER32(?,?,?,00000000,6C879B30,00000000), ref: 6C879F21
                        • GlobalUnlock.KERNEL32(00000000), ref: 6C879F2E
                        • GlobalFree.KERNEL32(00000000), ref: 6C879F35
                          • Part of subcall function 6C88F46E: GetStockObject.GDI32(00000011), ref: 6C88F490
                          • Part of subcall function 6C88F46E: GetStockObject.GDI32(0000000D), ref: 6C88F49C
                          • Part of subcall function 6C88F46E: GetObjectW.GDI32(00000000,0000005C,?), ref: 6C88F4AD
                          • Part of subcall function 6C88F46E: GetDC.USER32(00000000), ref: 6C88F4BC
                          • Part of subcall function 6C88F46E: GetDeviceCaps.GDI32(00000000,0000005A), ref: 6C88F4D3
                          • Part of subcall function 6C88F46E: MulDiv.KERNEL32(?,00000048,00000000), ref: 6C88F4DF
                          • Part of subcall function 6C88F46E: ReleaseDC.USER32(00000000,00000000), ref: 6C88F4EB
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: GlobalObject$Stock$CapsDestroyDeviceFreeH_prolog3_catchLockReleaseUnlockWindow
                        • String ID:
                        • API String ID: 2997204342-0
                        • Opcode ID: 874959f143cabf5472a4635525812a600a25e573330080bebe04b1519e506980
                        • Instruction ID: 8a5275102b6561ea59b3d9c578a9bfb1a3a0445184f7715cd147aaf292725816
                        • Opcode Fuzzy Hash: 874959f143cabf5472a4635525812a600a25e573330080bebe04b1519e506980
                        • Instruction Fuzzy Hash: 9D51A730A01619CFCF21CFA4CA44AEDBBB4BF05314F104965E801B7B50EB74AD05CBA1
                        APIs
                        • GetClientRect.USER32(?,?), ref: 6C8A02C7
                          • Part of subcall function 6C8723E0: ClientToScreen.USER32(?,?), ref: 6C8723EF
                          • Part of subcall function 6C8723E0: ClientToScreen.USER32(?,?), ref: 6C8723FC
                        • PtInRect.USER32(?,00000000,?), ref: 6C8A02E1
                        • PtInRect.USER32(?,?,?), ref: 6C8A035A
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ClientRect$Screen
                        • String ID:
                        • API String ID: 3187875807-0
                        • Opcode ID: 116f26b08d1efd9cb3c3a974f37cd0936587102256deef396a99fa62e91d52cb
                        • Instruction ID: 7acf932f1ca165ff39d3d6ffefc5e27a06ef54542756e32d5ec6f8d6426d58f5
                        • Opcode Fuzzy Hash: 116f26b08d1efd9cb3c3a974f37cd0936587102256deef396a99fa62e91d52cb
                        • Instruction Fuzzy Hash: C1413131A0464ADFCF20CFE8CA8499EB7B5FF09305F104969E906FB654D731AA46CB60
                        APIs
                        • GetModuleHandleA.KERNEL32(6C85D37C), ref: 6C85C78A
                        • FindResourceW.KERNEL32(?,?,?), ref: 6C85C87A
                        • LoadResource.KERNEL32(?,00000000), ref: 6C85C895
                        • SizeofResource.KERNEL32(?,00000000), ref: 6C85C8A6
                        • LockResource.KERNEL32(?), ref: 6C85C8B3
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Resource$FindHandleLoadLockModuleSizeof
                        • String ID:
                        • API String ID: 1601749889-0
                        • Opcode ID: bef2d3622203b2640e10667caeccee0263255b1cc492704f3df5332f8c156213
                        • Instruction ID: e066a3c573ec3fa7c8070ed2d0073b9cb814e32903438cdc8598236b46d04ee7
                        • Opcode Fuzzy Hash: bef2d3622203b2640e10667caeccee0263255b1cc492704f3df5332f8c156213
                        • Instruction Fuzzy Hash: B64103B4E14608DBDB04DBE4D980BEEB7B6EF58300F105429E209E7390E7799A45CB5A
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Parent$FocusMessageSendUpdateWindow
                        • String ID:
                        • API String ID: 2438739141-0
                        • Opcode ID: ae45d5093f3412809ee2344a4a27964f3361f7a5a0df6b81bf1b14273a03d89e
                        • Instruction ID: 5bbaaaa59aa00fb64772f5d69e50cc60d0fc41a4e192be86bae4e260db76629d
                        • Opcode Fuzzy Hash: ae45d5093f3412809ee2344a4a27964f3361f7a5a0df6b81bf1b14273a03d89e
                        • Instruction Fuzzy Hash: 7D412430704B128BCF205F398A58A1E3A75BB45728F244B79E822EBBD5DF30D8018B90
                        APIs
                        • LoadCursorW.USER32(?,00007904), ref: 6C895B8D
                        • LoadCursorW.USER32(?,00007905), ref: 6C895BC0
                        • LoadCursorW.USER32(00000000,00007F86), ref: 6C895BEB
                        • CreatePen.GDI32(00000000,00000001,?), ref: 6C895C63
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CursorLoad$Create
                        • String ID:
                        • API String ID: 1516763891-0
                        • Opcode ID: 880dd3acff040a605c5d3a7c72a9db353f06bb4c95fcc1a614c55819cd60e2b2
                        • Instruction ID: 943cd66c80a761dba97c913c727b30592e08dffaa2426c40545edc1751a88d14
                        • Opcode Fuzzy Hash: 880dd3acff040a605c5d3a7c72a9db353f06bb4c95fcc1a614c55819cd60e2b2
                        • Instruction Fuzzy Hash: 0F31F570A00A119BDB305B7D8A88EFD32B89F45359F150E76E909DBF81EF3494098A31
                        APIs
                          • Part of subcall function 6C868F77: GetWindowLongW.USER32(?,000000F0), ref: 6C868F84
                        • GetWindowRect.USER32(?,?), ref: 6C8881D4
                        • GetSystemMetrics.USER32(00000021), ref: 6C8881DC
                        • GetSystemMetrics.USER32(00000020), ref: 6C8881E6
                        • GetKeyState.USER32(00000002), ref: 6C88820A
                        • InflateRect.USER32(?,?,00000000), ref: 6C888243
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MetricsRectSystemWindow$InflateLongState
                        • String ID:
                        • API String ID: 2406722796-0
                        • Opcode ID: e2854c98679379a7b985355873c31ad86e5a6d828916b21d6b49493845eeb968
                        • Instruction ID: bcf3130401e70f0436c19e2abcbe111f181f1b21449294b951b90f563ae05505
                        • Opcode Fuzzy Hash: e2854c98679379a7b985355873c31ad86e5a6d828916b21d6b49493845eeb968
                        • Instruction Fuzzy Hash: 3731E632B116099BDF209EB8CA49BBE77B5FF45754F20491AE511E7D81D770D980C740
                        APIs
                        • GetCursorPos.USER32(00000000), ref: 6C86F875
                        • GetKeyState.USER32(00000011), ref: 6C86F87D
                        • ScreenToClient.USER32(?,00000000), ref: 6C86F915
                        • ClientToScreen.USER32(?,00000000), ref: 6C86F962
                        • SetCursorPos.USER32(00000000,00000000), ref: 6C86F96E
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ClientCursorScreen$State
                        • String ID:
                        • API String ID: 3982492586-0
                        • Opcode ID: 5b02c5798c4d4b8c83b336040705eebb2216685bc62ef9b227659a3ce4698183
                        • Instruction ID: 4330cd3586f2cabb487770ee8104fb4104878f0e334a957f59825a58b45d5991
                        • Opcode Fuzzy Hash: 5b02c5798c4d4b8c83b336040705eebb2216685bc62ef9b227659a3ce4698183
                        • Instruction Fuzzy Hash: 5C31C572A01519BFCB288F79C655BADBBB5FF56314F204A6AE512E3E90C730E9408B40
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ClientCursorScreen$Rect
                        • String ID:
                        • API String ID: 1082406499-0
                        • Opcode ID: 63d97a2cc6fbac464d9e58f15d20778376414a60dea52ebc7904bf613ab46798
                        • Instruction ID: e910abb9476e8556dbc13b24a6e8d81d0ee2e96495ad4091e261599460daffbd
                        • Opcode Fuzzy Hash: 63d97a2cc6fbac464d9e58f15d20778376414a60dea52ebc7904bf613ab46798
                        • Instruction Fuzzy Hash: 36316C71A0060A9FCF15DFA8CA84AEEB7B5FF09618F20452AE516A3650DB30A945CB90
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C89D087
                        • CreatePopupMenu.USER32 ref: 6C89D09D
                        • AppendMenuW.USER32(00000000,?,?,-00000010), ref: 6C89D16D
                        • AppendMenuW.USER32(00000000,00000000,?,?), ref: 6C89D18F
                        • SetMenuDefaultItem.USER32(00000000,?,00000000,00000000,?,?,?,?,?,?,?,00000014), ref: 6C89D1B8
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Menu$Append$CreateDefaultH_prolog3ItemPopup
                        • String ID:
                        • API String ID: 1187709018-0
                        • Opcode ID: 9172d1d59169b9bafd084b0d743778ca1689e56e7b1eaf0dcef2c736a7cc15f8
                        • Instruction ID: a7a05988f3d76534aa348801f7050246081be0b62e426239d484d5f7b02d886a
                        • Opcode Fuzzy Hash: 9172d1d59169b9bafd084b0d743778ca1689e56e7b1eaf0dcef2c736a7cc15f8
                        • Instruction Fuzzy Hash: 3A419531A0161A9BEF15DFA8C944BFDF7B5BF18308F244529E904B7B80DB74A904CBA5
                        APIs
                          • Part of subcall function 6C860735: GetParent.USER32(?), ref: 6C860738
                          • Part of subcall function 6C860735: GetParent.USER32(00000000), ref: 6C86073F
                        • GetWindowLongW.USER32(?,000000EC), ref: 6C861612
                        • RedrawWindow.USER32(?,00000000,00000000,00000081,?,?,?,?,?,6C860C56,00000000), ref: 6C861666
                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 6C861675
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000137,?,?,?,?,?,6C860C56,00000000), ref: 6C86168B
                        • GetClientRect.USER32(?,?), ref: 6C86169F
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$LongParent$ClientRectRedraw
                        • String ID:
                        • API String ID: 556606033-0
                        • Opcode ID: 46b6bdf864a920bd6e10d083860c79595f69c5b405ecaeff0a150c25dc1e3d8b
                        • Instruction ID: edc15b2133dac83949aa37c2425613280edd648cc8444bd9e1daffcecf088914
                        • Opcode Fuzzy Hash: 46b6bdf864a920bd6e10d083860c79595f69c5b405ecaeff0a150c25dc1e3d8b
                        • Instruction Fuzzy Hash: C8210B35714915BFEF214B66CE84ADE7678EF05758F140635E512E2DA1DF60DC008B80
                        APIs
                          • Part of subcall function 6C868F77: GetWindowLongW.USER32(?,000000F0), ref: 6C868F84
                          • Part of subcall function 6C860735: GetParent.USER32(?), ref: 6C860738
                          • Part of subcall function 6C860735: GetParent.USER32(00000000), ref: 6C86073F
                        • SendMessageW.USER32(?,00000234,00000000,00000000), ref: 6C8601D5
                        • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 6C8601FE
                        • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 6C86021D
                        • SendMessageW.USER32(?,00000222,?,00000000), ref: 6C860237
                        • SendMessageW.USER32(?,00000222,00000000,?), ref: 6C860260
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageSend$Parent$LongWindow
                        • String ID:
                        • API String ID: 4191550487-0
                        • Opcode ID: 2854b7c5863ceec3659e79a4aa491601d66bac7389891e631a3310a851b8f3cd
                        • Instruction ID: bb25e48002e835e11aa53d40e62765cca02bff8b6318c7546003ee502bc9ce70
                        • Opcode Fuzzy Hash: 2854b7c5863ceec3659e79a4aa491601d66bac7389891e631a3310a851b8f3cd
                        • Instruction Fuzzy Hash: 80212E71614644BFEB215B62CD88F9E767EFF08358F100A29F14292E90DB31AD50865C
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C87747D
                          • Part of subcall function 6C876CD0: __EH_prolog3.LIBCMT ref: 6C876CD7
                        • GetCurrentThread.KERNEL32 ref: 6C8774DC
                        • GetCurrentThreadId.KERNEL32 ref: 6C8774E5
                        • GetVersionExW.KERNEL32 ref: 6C877581
                        • SysFreeString.OLEAUT32 ref: 6C8775D5
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CurrentThread$FreeH_prolog3H_prolog3_StringVersion
                        • String ID:
                        • API String ID: 1514388774-0
                        • Opcode ID: 1fa0afe5a8c787d8970b7df6328d5fe55b6f736b8a1b769a8d8dfbeb3c2aade7
                        • Instruction ID: c5b7fba4460f9b056cece1ef8e523906d515e21fbb4dac95e1d2db1c59fa7ca1
                        • Opcode Fuzzy Hash: 1fa0afe5a8c787d8970b7df6328d5fe55b6f736b8a1b769a8d8dfbeb3c2aade7
                        • Instruction Fuzzy Hash: 4941A1B0901B058FD7718F2A868478AFAF0BF49708F90496ED1AED7B10DB70A584CF51
                        APIs
                        • GetCursorPos.USER32(?), ref: 6C89EF40
                        • GetClientRect.USER32(?,?), ref: 6C89EF6C
                        • PtInRect.USER32(?,?,?), ref: 6C89EF84
                        • MapWindowPoints.USER32(?,?,?,00000001), ref: 6C89EFAD
                        • SendMessageW.USER32(?,00000200,?,?), ref: 6C89EFCC
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$ClientCursorMessagePointsSendWindow
                        • String ID:
                        • API String ID: 1257894355-0
                        • Opcode ID: 26a4ef623213a3614e76af364985d5c89350f715a5ff1a41471f7f2157acb9c9
                        • Instruction ID: d6293d03683a8285e51b02451ece99f1c70b66bd0cb75aa566e92ca8538bb598
                        • Opcode Fuzzy Hash: 26a4ef623213a3614e76af364985d5c89350f715a5ff1a41471f7f2157acb9c9
                        • Instruction Fuzzy Hash: A1316171604609EFDF149F68CD549AEBFB5FF05314B20862FF82AA6550DB31E950CB90
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 6C8A5A41
                          • Part of subcall function 6C868F23: GetWindowLongW.USER32(?,000000EC), ref: 6C868F30
                        • OffsetRect.USER32(?,?,00000000), ref: 6C8A5A9D
                        • UnionRect.USER32(?,?,?), ref: 6C8A5AB6
                        • EqualRect.USER32(?,?), ref: 6C8A5AC4
                        • UpdateWindow.USER32(?), ref: 6C8A5AFB
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Window$EqualLongOffsetUnionUpdate
                        • String ID:
                        • API String ID: 4261707372-0
                        • Opcode ID: 97b09e7b08688723ee45efe86659e8bf800b7fd8c6d7cc2dd2b1d9a7b72b80ff
                        • Instruction ID: 636f7f1888870a5761bb50bb4aae407c2e26fa7cd3ca120442d162094ba51167
                        • Opcode Fuzzy Hash: 97b09e7b08688723ee45efe86659e8bf800b7fd8c6d7cc2dd2b1d9a7b72b80ff
                        • Instruction Fuzzy Hash: 3A318271B05A0AABCB14CFA5CA44BDEF7B9BF09314F204226E415E2650DB70A995CB90
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C866F77
                        • GetTopWindow.USER32(?), ref: 6C866FA4
                        • GetDlgCtrlID.USER32(00000000), ref: 6C866FB6
                        • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 6C867011
                        • GetWindow.USER32(00000000,00000002), ref: 6C867053
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$CtrlH_prolog3MessageSend
                        • String ID:
                        • API String ID: 849854284-0
                        • Opcode ID: 66d2d0f8011d09b3db9e4536dc9b04bd730b02371fd4a6408a9244619351813a
                        • Instruction ID: 18216a62e24d55735b4ccf516ee7f135bf2cc787dad95ad158efde1ccba6827a
                        • Opcode Fuzzy Hash: 66d2d0f8011d09b3db9e4536dc9b04bd730b02371fd4a6408a9244619351813a
                        • Instruction Fuzzy Hash: D121F371915204AADF319B26CF40FEEB776AF51308F100569F815F2E80EB30CA44CBA2
                        APIs
                          • Part of subcall function 6C89ADCA: __EH_prolog3_GS.LIBCMT ref: 6C89ADD1
                          • Part of subcall function 6C89ADCA: GetWindowRect.USER32(00000000,00000000), ref: 6C89AE1A
                          • Part of subcall function 6C89ADCA: CreateRoundRectRgn.GDI32(00000000,00000000,00000001,?,00000004,00000004), ref: 6C89AE44
                          • Part of subcall function 6C89ADCA: SetWindowRgn.USER32(00000000,?,00000000), ref: 6C89AE5A
                        • GetSystemMenu.USER32(?,00000000), ref: 6C8980DD
                        • DeleteMenu.USER32(?,0000F120,00000000,00000000), ref: 6C8980FA
                        • DeleteMenu.USER32(?,0000F020,00000000), ref: 6C898109
                        • DeleteMenu.USER32(?,0000F030,00000000), ref: 6C898118
                        • EnableMenuItem.USER32(?,0000F060,00000001), ref: 6C898140
                          • Part of subcall function 6C894EAB: SetRectEmpty.USER32(?), ref: 6C894ED6
                          • Part of subcall function 6C894EAB: ReleaseCapture.USER32 ref: 6C894EDC
                          • Part of subcall function 6C894EAB: SetCapture.USER32(?), ref: 6C894EEF
                          • Part of subcall function 6C894EAB: RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 6C894FEF
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Menu$DeleteRectWindow$Capture$CreateEmptyEnableH_prolog3_ItemRedrawReleaseRoundSystem
                        • String ID:
                        • API String ID: 4022425685-0
                        • Opcode ID: cb63a9a098fb44475e8d62fbb20248027528c84d93f18684b466545d2a86b7b1
                        • Instruction ID: 5072246255cda68a24cf66c40dcc34172ce77f7f8c1707440964a7b780ff36f6
                        • Opcode Fuzzy Hash: cb63a9a098fb44475e8d62fbb20248027528c84d93f18684b466545d2a86b7b1
                        • Instruction Fuzzy Hash: DA21D135701212EBEF211F65CD88DBE7F7AEF48758B18443AFA09A6651CB31D811CA90
                        APIs
                        • IsWindow.USER32(00000000), ref: 6C873FCC
                        • SendMessageW.USER32(?,00000455,00000000,00000000), ref: 6C873FE0
                        • SendMessageW.USER32(?,00000454,00000000,00000000), ref: 6C873FF3
                        • SetWindowLongW.USER32(?,000000F0,?), ref: 6C87402A
                        • SendMessageW.USER32(?,00000454,00000000,00000000), ref: 6C87403F
                          • Part of subcall function 6C868F77: GetWindowLongW.USER32(?,000000F0), ref: 6C868F84
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageSendWindow$Long
                        • String ID:
                        • API String ID: 3430364388-0
                        • Opcode ID: 791c343563bd29b450713b155eca50f5e9f1088de84194801585891c4ecfbab5
                        • Instruction ID: 51f2b185e4980af5e8f02ada96396c243348125d7230b4395c953d59562e83bb
                        • Opcode Fuzzy Hash: 791c343563bd29b450713b155eca50f5e9f1088de84194801585891c4ecfbab5
                        • Instruction Fuzzy Hash: 9521C571204A01BFDB244F69CC94A6EBBB9FB85754F10862DB646A7A90EB709C408B20
                        APIs
                          • Part of subcall function 6C87F682: EnterCriticalSection.KERNEL32(6CA38B60,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6B3
                          • Part of subcall function 6C87F682: InitializeCriticalSection.KERNEL32(00000000,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6C9
                          • Part of subcall function 6C87F682: LeaveCriticalSection.KERNEL32(6CA38B60,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6D7
                          • Part of subcall function 6C87F682: EnterCriticalSection.KERNEL32(00000000,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498,00000120), ref: 6C87F6E4
                        • SetCursor.USER32(00000009), ref: 6C870644
                        • LoadCursorW.USER32(?,00007905), ref: 6C870689
                        • LoadCursorW.USER32(00000000,00007F85), ref: 6C87069F
                        • SetCursor.USER32(00000000,?,00000009), ref: 6C8706B8
                        • DestroyCursor.USER32(00000000), ref: 6C8706C3
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Cursor$CriticalSection$EnterLoad$DestroyInitializeLeave
                        • String ID:
                        • API String ID: 900973665-0
                        • Opcode ID: 7f3f03b287b426c2871652a5162249aa1ac9c4d3c81331951c0c90f46d646a21
                        • Instruction ID: 9e9c499cafc4f3264b7b7515175f487b5ba35aaaba7230475e9b28c824af65b1
                        • Opcode Fuzzy Hash: 7f3f03b287b426c2871652a5162249aa1ac9c4d3c81331951c0c90f46d646a21
                        • Instruction Fuzzy Hash: E511A171B097858BDB705B68CA68A5E3679D783718B204C33E108D7A10EB36DC418BB2
                        APIs
                        • RegDeleteKeyW.ADVAPI32(00000000,?), ref: 6C878EDB
                        • RegDeleteValueW.ADVAPI32(00000000,?,?,00000000), ref: 6C878EFB
                        • RegCloseKey.ADVAPI32(00000000), ref: 6C878F2C
                          • Part of subcall function 6C878733: RegCloseKey.ADVAPI32(00000000), ref: 6C8787D8
                          • Part of subcall function 6C878733: RegCloseKey.ADVAPI32(00000000), ref: 6C8787E7
                        • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000001,?,00000000,?,00000000), ref: 6C878F23
                        • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 6C878F47
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Close$DeleteValue$PrivateProfileStringWrite
                        • String ID:
                        • API String ID: 222425065-0
                        • Opcode ID: 377a1c496cbae040fb4509af872b3d6688264de62af46073c7ebba492010eaea
                        • Instruction ID: b4ee695242c089aea879bfb0135078af04b5031592725d6930182044db836b9c
                        • Opcode Fuzzy Hash: 377a1c496cbae040fb4509af872b3d6688264de62af46073c7ebba492010eaea
                        • Instruction Fuzzy Hash: B911A333509A15FBCB321B658D48E9F3A3AEF467A4B114826F915BA900FB31D84197F0
                        APIs
                        • IsWindow.USER32(00000000), ref: 6C873EE6
                        • SendMessageW.USER32(?,00000455,00000000,00000000), ref: 6C873EFA
                        • SendMessageW.USER32(?,00000454,00000000,00000000), ref: 6C873F0D
                        • SetWindowLongW.USER32(?,000000F0,?), ref: 6C873F2C
                        • SendMessageW.USER32(?,00000454,00000000,00000000), ref: 6C873F42
                          • Part of subcall function 6C868F77: GetWindowLongW.USER32(?,000000F0), ref: 6C868F84
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageSendWindow$Long
                        • String ID:
                        • API String ID: 3430364388-0
                        • Opcode ID: fb7edae68829f910bb9baa64f45b7a01c49280e9a72b5b3a0c7febc3643d1a60
                        • Instruction ID: e8960c6b4c116ddd7840edb623b2150a52da33aa996b2b32edac92f0b6fbbcc2
                        • Opcode Fuzzy Hash: fb7edae68829f910bb9baa64f45b7a01c49280e9a72b5b3a0c7febc3643d1a60
                        • Instruction Fuzzy Hash: 27119671704A00BBDF314B69CC08F5EBAB9FB85B55F204629B255A7A90EB719C40C720
                        APIs
                        • EnableMenuItem.USER32(?,00004212,00000001), ref: 6C89CFFE
                        • EnableMenuItem.USER32(?,00004213,00000000), ref: 6C89D00F
                        • EnableMenuItem.USER32(?,00004214,00000000), ref: 6C89D03E
                        • CheckMenuItem.USER32(?,00004213,00000008), ref: 6C89D064
                        • CheckMenuItem.USER32(?,00004214,00000000), ref: 6C89D070
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ItemMenu$Enable$Check
                        • String ID:
                        • API String ID: 1852492618-0
                        • Opcode ID: c477997ed3b0af8a5e4ea1aacf7980f15091afa9329c38a105003d6af79c4edf
                        • Instruction ID: 9f3dce756bec0c0a64574f92f6cb71c43c65630a52f6ab6fbd2e108d724a6f97
                        • Opcode Fuzzy Hash: c477997ed3b0af8a5e4ea1aacf7980f15091afa9329c38a105003d6af79c4edf
                        • Instruction Fuzzy Hash: AA11BF71345A05FFEB205F28CE88E52B7B9FF15748F504826B20AEA8A0C770EC51CA64
                        APIs
                        • GlobalGetAtomNameW.KERNEL32(?,?,00000103), ref: 6C86B4FE
                        • GlobalAddAtomW.KERNEL32(?), ref: 6C86B50B
                        • GlobalGetAtomNameW.KERNEL32(?,?,00000103), ref: 6C86B525
                        • GlobalAddAtomW.KERNEL32(?), ref: 6C86B532
                        • SendMessageW.USER32(00000000,000003E4,00000000,?), ref: 6C86B557
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AtomGlobal$Name$MessageSend
                        • String ID:
                        • API String ID: 1515195355-0
                        • Opcode ID: cb0d005baa3f3effb2423922514e6704bea21eb4a3994f3ecaacbf5cf2a87718
                        • Instruction ID: 0b3e406ba31d9187c5c00b8b0b393feae542041ec3beea3703f68ef01fffef20
                        • Opcode Fuzzy Hash: cb0d005baa3f3effb2423922514e6704bea21eb4a3994f3ecaacbf5cf2a87718
                        • Instruction Fuzzy Hash: 7D210872601A08EBDF208F39C95CBF9B3B8FB05709F10451AF86993881D774E984DB50
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C89ADD1
                        • GetWindowRect.USER32(00000000,00000000), ref: 6C89AE1A
                        • CreateRoundRectRgn.GDI32(00000000,00000000,00000001,?,00000004,00000004), ref: 6C89AE44
                        • SetWindowRgn.USER32(00000000,?,00000000), ref: 6C89AE5A
                        • SetWindowRgn.USER32(00000000,00000000,00000000), ref: 6C89AE72
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$Rect$CreateH_prolog3_Round
                        • String ID:
                        • API String ID: 2502471913-0
                        • Opcode ID: 8ff58b9303187106654e1f9d1e5bc7f275cefa7a06ca4e12adf83253f3e6f150
                        • Instruction ID: 4fb78e45fabdacebd094db61ccc702884c544737b6ed608fc9784ad30eb9684e
                        • Opcode Fuzzy Hash: 8ff58b9303187106654e1f9d1e5bc7f275cefa7a06ca4e12adf83253f3e6f150
                        • Instruction Fuzzy Hash: 13113D71E016099FDF15DF68C984AEDBB78FF19318F240619E50173A50DB30AD90CB64
                        APIs
                        • IsWindow.USER32(?), ref: 6C8744ED
                        • SendMessageW.USER32(?,00000420,00000000,?), ref: 6C874511
                        • SendMessageW.USER32(?,0000041F,00000000,?), ref: 6C87452E
                        • SendMessageW.USER32(?,0000043A,00000000,00000000), ref: 6C87454A
                        • InvalidateRect.USER32(?,00000000,00000001,?,6C873CA2,?,?,?,?,00000000,?,?,?,?,?), ref: 6C874568
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageSend$InvalidateRectWindow
                        • String ID:
                        • API String ID: 3225880595-0
                        • Opcode ID: b328bf3b247bd56c53edd37372e8335a767cba4dc03c83168ad99003c2a031ee
                        • Instruction ID: 6699b89ba6eea587c1b842307b7581267afbc07339df33c6a2af283e44b1340b
                        • Opcode Fuzzy Hash: b328bf3b247bd56c53edd37372e8335a767cba4dc03c83168ad99003c2a031ee
                        • Instruction Fuzzy Hash: 18114671104754AFEB248F25CC04BBB7BF5FB89751F40892EF99BA6650E770A850DB20
                        APIs
                        • GetCursorPos.USER32(?), ref: 6C8A31B4
                        • ScreenToClient.USER32(?,?), ref: 6C8A31C1
                        • PtInRect.USER32(?,?,?), ref: 6C8A31D4
                        • LoadCursorW.USER32(00000000,00007F86), ref: 6C8A31F6
                        • SetCursor.USER32(?), ref: 6C8A3214
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Cursor$ClientLoadRectScreen
                        • String ID:
                        • API String ID: 2747913190-0
                        • Opcode ID: d3bd607669fee76f1b79e98a6511f017776abf86b1b8e3858b709c72e7577f15
                        • Instruction ID: 280120534b452fc54a5aaa75e4f65f7d40522caead3c14ea4ba7d5eabe9c2c0d
                        • Opcode Fuzzy Hash: d3bd607669fee76f1b79e98a6511f017776abf86b1b8e3858b709c72e7577f15
                        • Instruction Fuzzy Hash: 7701AD71904509FFDF215FA5CA08CEE7FB8EF4A315B0008B9F515E2620EB30A945DB20
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C9A0D57
                        • std::_Lockit::_Lockit.LIBCPMT ref: 6C9A0D62
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 6C9A0DD0
                          • Part of subcall function 6C9A0EB4: std::locale::_Locimp::_Locimp.LIBCPMT ref: 6C9A0ECC
                        • std::locale::_Setgloballocale.LIBCPMT ref: 6C9A0D7D
                        • _Yarn.LIBCPMT ref: 6C9A0D93
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                        • String ID:
                        • API String ID: 1088826258-0
                        • Opcode ID: fafaec7cc17d59defe64a84fe358a93ccd9296c9ac5efce9848eb3ec41932f3e
                        • Instruction ID: 44730b59f88bdaa9521c5f9e146ec7ef55e2a70f96a693ec65e5baab1a413758
                        • Opcode Fuzzy Hash: fafaec7cc17d59defe64a84fe358a93ccd9296c9ac5efce9848eb3ec41932f3e
                        • Instruction Fuzzy Hash: B001D872B016A19BCB05DFA0C8545BDB775BFA5258B248009D81257B80CF34EE47CB81
                        APIs
                        • GetDC.USER32(?), ref: 6C86F7F5
                          • Part of subcall function 6C882EDC: CreateBitmap.GDI32(00000008,00000008,00000001,00000001,?), ref: 6C882F23
                          • Part of subcall function 6C882EDC: CreatePatternBrush.GDI32(00000000), ref: 6C882F30
                          • Part of subcall function 6C882EDC: DeleteObject.GDI32(00000000), ref: 6C882F3C
                        • SelectObject.GDI32(?,?), ref: 6C86F814
                        • PatBlt.GDI32(?,?,?,?,?,005A0049), ref: 6C86F839
                        • SelectObject.GDI32(?,00000000), ref: 6C86F847
                        • ReleaseDC.USER32(?,?), ref: 6C86F853
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Object$CreateSelect$BitmapBrushDeletePatternRelease
                        • String ID:
                        • API String ID: 2474928807-0
                        • Opcode ID: 028f4de7021967be969ca23478c97fdeb7ee41834ad4e8566a9642c5e73b4da5
                        • Instruction ID: 2939e2d7b7e27f1b641a32f87b91171a6181324475e71f0e982f60c596fecca8
                        • Opcode Fuzzy Hash: 028f4de7021967be969ca23478c97fdeb7ee41834ad4e8566a9642c5e73b4da5
                        • Instruction Fuzzy Hash: 27014B32200600EFCB119FA9CE48C5ABFBAFF4A7443248569F519D6626CB33E811DB20
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C88A581
                        • LoadCursorW.USER32(00000000,00007F00), ref: 6C88A5A5
                        • GetClassInfoW.USER32(?,?,?), ref: 6C88A5E0
                          • Part of subcall function 6C862890: __EH_prolog3_catch.LIBCMT ref: 6C862897
                          • Part of subcall function 6C862890: GetClassInfoW.USER32(?,?,00000030), ref: 6C8628A9
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ClassInfo$CursorH_prolog3H_prolog3_catchLoad
                        • String ID: %Ts:%x:%x:%x:%x
                        • API String ID: 937286869-4057404147
                        • Opcode ID: 01a5ec8e8128e36138d26e84215992f674164e83306759fe4a4713e0dc783547
                        • Instruction ID: df4c44b4f72fc0990eb89bf45938c5b5166969abeffad13f5f32848ba06855ff
                        • Opcode Fuzzy Hash: 01a5ec8e8128e36138d26e84215992f674164e83306759fe4a4713e0dc783547
                        • Instruction Fuzzy Hash: 7D719275D01219EFDB20DFA8CA809DEB7F4FF59304F20482AE404B7B84DB74AA458B90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: H_prolog3
                        • String ID: %TsMFCToolBar-%d$%TsMFCToolBar-%d%x$MFCToolBars
                        • API String ID: 431132790-2016111687
                        • Opcode ID: d45e22449f8332e0fc37d6005921da2a3c2d2c04300a36f81b57071abbe18c82
                        • Instruction ID: d5ec654b356b6bbfd994fe0a5d579750b19f291ff3fbc9283f1b242d5847e4e9
                        • Opcode Fuzzy Hash: d45e22449f8332e0fc37d6005921da2a3c2d2c04300a36f81b57071abbe18c82
                        • Instruction Fuzzy Hash: 2D41A171A011199FDF21DFADCA809EFB778AF54218F104939D815A7B80DB70E909CBA0
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C89BEB5
                        • SendMessageW.USER32(00000000,0000040D,00000000,00000000), ref: 6C89BEE0
                        • SendMessageW.USER32(?,0000043A,-00000001,00000030), ref: 6C89BF28
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageSend$H_prolog3_
                        • String ID: 0
                        • API String ID: 3491702567-4108050209
                        • Opcode ID: 87224d52476e712d53c9726724780e91392231d46b434e9db33a72432b2f9322
                        • Instruction ID: 1d2223a8c8bd603c8ca4bf0ccc751d1ba7047d43d9fab47ca3c05ebc57afb8ff
                        • Opcode Fuzzy Hash: 87224d52476e712d53c9726724780e91392231d46b434e9db33a72432b2f9322
                        • Instruction Fuzzy Hash: 5631B374B00219AFDB24CB68CD84FE9B778BF45358F0006A9E11DA7A90DB716E85CF61
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: H_prolog3
                        • String ID: %TsMFCToolBarParameters$LargeIcons$MFCToolBars
                        • API String ID: 431132790-953485693
                        • Opcode ID: 24133d6cb7b141eb10e81000f43d2383646eb29a8eec70ecdf2bfa26709bfc49
                        • Instruction ID: e9623358e736ea1eef4b98d737aff3c68a896eaee5dc66982f9f43da34caf652
                        • Opcode Fuzzy Hash: 24133d6cb7b141eb10e81000f43d2383646eb29a8eec70ecdf2bfa26709bfc49
                        • Instruction Fuzzy Hash: DB217170A0020A9BCF00DFE8C9909EEB771BF98308F104829E511BB781DB74E909CB51
                        APIs
                          • Part of subcall function 6C868BC0: LoadLibraryW.KERNEL32(?,6CA1F518,00000010,6C8634BC,?,?,?,00000000), ref: 6C868C01
                        • GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 6C87C471
                        • FreeLibrary.KERNEL32(00000000,?,?,00001000,?,?,?), ref: 6C87C4BD
                          • Part of subcall function 6C87C41B: GetLastError.KERNEL32(00000000,00000000,0000F000), ref: 6C87C41B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Library$AddressErrorFreeLastLoadProc
                        • String ID: DllGetVersion$comctl32.dll
                        • API String ID: 2540614322-3857068685
                        • Opcode ID: 774d18a0e8541b69ce14db1b99a4c414d6c535da75367a0ab02c6d5ca35eef30
                        • Instruction ID: 8e968cb82b14652fd87c8922987788fe10b31ddbc0db30ee067fa9124d8a7bb7
                        • Opcode Fuzzy Hash: 774d18a0e8541b69ce14db1b99a4c414d6c535da75367a0ab02c6d5ca35eef30
                        • Instruction Fuzzy Hash: BD110A75A006099BCB31EF69C944BEFBBB5AF89315F104425E904A7741EB34D905CBB4
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: DataOpenParentThemeThemed
                        • String ID: REBAR
                        • API String ID: 2040651904-925029515
                        • Opcode ID: 1820d1ef355096d5ffc9f9fef42413003adb0e3acbe04d88f6d3dc6db42119b7
                        • Instruction ID: 282a6a2c5eaba2977debb2c11e3d51790788186e3052e6e2caa165f0cbb01a42
                        • Opcode Fuzzy Hash: 1820d1ef355096d5ffc9f9fef42413003adb0e3acbe04d88f6d3dc6db42119b7
                        • Instruction Fuzzy Hash: 22010431305B01ABDB244A79CA44BAE7776BF85318F200D39E915E6F90EF30E845C660
                        APIs
                          • Part of subcall function 6C87F682: EnterCriticalSection.KERNEL32(6CA38B60,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6B3
                          • Part of subcall function 6C87F682: InitializeCriticalSection.KERNEL32(00000000,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6C9
                          • Part of subcall function 6C87F682: LeaveCriticalSection.KERNEL32(6CA38B60,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6D7
                          • Part of subcall function 6C87F682: EnterCriticalSection.KERNEL32(00000000,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498,00000120), ref: 6C87F6E4
                          • Part of subcall function 6C87CD9C: __EH_prolog3_catch.LIBCMT ref: 6C87CDA3
                          • Part of subcall function 6C8633F4: GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 6C86341A
                          • Part of subcall function 6C8633F4: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 6C86342A
                          • Part of subcall function 6C8633F4: EncodePointer.KERNEL32(00000000,?,00000000), ref: 6C863433
                        • GetProcAddress.KERNEL32(00000000,HtmlHelpW), ref: 6C8627FF
                        • FreeLibrary.KERNEL32(?,?,6C863ABF,?,?,?,6C879E54), ref: 6C86280F
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CriticalSection$AddressEnterProc$EncodeFreeH_prolog3_catchHandleInitializeLeaveLibraryModulePointer
                        • String ID: HtmlHelpW$hhctrl.ocx
                        • API String ID: 849444252-3773518134
                        • Opcode ID: b3c812a19d3e5f575dca073d084e89b3530b2b5f829da01fd7007fb3f9969bbe
                        • Instruction ID: 8797ede933fbc3ca55de6e9be973790f41688186e60fbe7afd7d3767c65090eb
                        • Opcode Fuzzy Hash: b3c812a19d3e5f575dca073d084e89b3530b2b5f829da01fd7007fb3f9969bbe
                        • Instruction Fuzzy Hash: 1A01D431504A2AABCB305F6BCE18A4A7FB0AF05755F10CC39F505A7F60DB34E8509A61
                        APIs
                        • GetModuleHandleW.KERNEL32(Advapi32.dll,0002001F,?,?,6C8787C4,?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 6C878BEB
                        • GetProcAddress.KERNEL32(00000000,RegCreateKeyTransactedW), ref: 6C878BFB
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: Advapi32.dll$RegCreateKeyTransactedW
                        • API String ID: 1646373207-2994018265
                        • Opcode ID: c6d3fa417f19a6f12bc1f0103674227b4dbd5752f40cd9aacdc88601aa8e9f06
                        • Instruction ID: cb5d95c1dcd1a750ebeedb57cce79afcce3f146d0f5c4386d8f2bf49c08b6e5b
                        • Opcode Fuzzy Hash: c6d3fa417f19a6f12bc1f0103674227b4dbd5752f40cd9aacdc88601aa8e9f06
                        • Instruction Fuzzy Hash: 3A016232205509EBCF225F94DD04BAD3FB6EB89356F224426FA54A1420D632D4A1EB60
                        APIs
                        • GetModuleHandleW.KERNEL32(Advapi32.dll,00000000,00000010,?,?,6C879742,?,00000010), ref: 6C87984B
                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 6C87985B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: Advapi32.dll$RegDeleteKeyTransactedW
                        • API String ID: 1646373207-2168864297
                        • Opcode ID: deb4aedbb9a3e1f2228a811ae199940a438ce22922e6e4d27fe8ec405af0605f
                        • Instruction ID: d1e4540afa7507072f585b1167363acbbc0e8725d8eecef66a54bb0eb264b4dc
                        • Opcode Fuzzy Hash: deb4aedbb9a3e1f2228a811ae199940a438ce22922e6e4d27fe8ec405af0605f
                        • Instruction Fuzzy Hash: 1DF0B43320991DBFAF201FA49D84D3E77BDEBC52AA321893AF56091910EA31DC408B70
                        APIs
                        • GetWindowLongW.USER32(?,000000F0), ref: 6C87C5C6
                        • GetClassNameW.USER32(?,?,0000000A), ref: 6C87C5DB
                        • CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,combobox,000000FF), ref: 6C87C5F2
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ClassCompareLongNameStringWindow
                        • String ID: combobox
                        • API String ID: 1414938635-2240613097
                        • Opcode ID: 77e79f9bee626653a0b9e134560989599a9d5e704cac2b859fe611cf51750aa8
                        • Instruction ID: 0436fe0bc894e85cc3d7006a40fb91d07c2b9c8a1c9acc631c388231aabf7922
                        • Opcode Fuzzy Hash: 77e79f9bee626653a0b9e134560989599a9d5e704cac2b859fe611cf51750aa8
                        • Instruction Fuzzy Hash: 1BF0F4316591186BCB10EF688C46EAEB3B8DF16724F504314B421F70C0EA20A9418794
                        APIs
                        • GetModuleHandleW.KERNEL32(Advapi32.dll,0002001F,?,?,6C87876C,80000001,software,00000000,0002001F,?), ref: 6C878C5B
                        • GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 6C878C6B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: Advapi32.dll$RegOpenKeyTransactedW
                        • API String ID: 1646373207-3913318428
                        • Opcode ID: 8002320c4a506de71edf30f79c2b97ddde53b887de22e4dfc6bd4c37df507e08
                        • Instruction ID: e233a8b717909fe68574d3322e3f985cfe28276c20418513739792c546b1b1aa
                        • Opcode Fuzzy Hash: 8002320c4a506de71edf30f79c2b97ddde53b887de22e4dfc6bd4c37df507e08
                        • Instruction Fuzzy Hash: D1F0C232205909EBDF211E95DE08BAE3BB5EBC9256F218836F611F1460EA31D491EB60
                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,?), ref: 6C8D9E5E
                        • GetProcAddress.KERNEL32(00000000,GetFileAttributesTransactedW), ref: 6C8D9E6E
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: GetFileAttributesTransactedW$kernel32.dll
                        • API String ID: 1646373207-1378992308
                        • Opcode ID: d84e6c4328170b23e39c35e399fc5fbc8b39ecae2f20e82eb24fd47074973cc8
                        • Instruction ID: 237b15ae3c224e15fe39123f4f8f303486115bcdedd32d348968c886335c487d
                        • Opcode Fuzzy Hash: d84e6c4328170b23e39c35e399fc5fbc8b39ecae2f20e82eb24fd47074973cc8
                        • Instruction Fuzzy Hash: A8F0F631205607DFEF201FA1CD54B6A77B5EF0922AF61483AF61091820CFB2A490CB40
                        APIs
                        • __current_exception.VCRUNTIME140 ref: 008517AF
                        • __current_exception_context.VCRUNTIME140 ref: 008517B9
                        • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 008517C0
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1695694382.0000000000851000.00000020.00000001.01000000.00000005.sdmp, Offset: 00850000, based on PE: true
                        • Associated: 00000003.00000002.1695648911.0000000000850000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695714101.0000000000852000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695732256.0000000000853000.00000004.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000854000.00000002.00000001.01000000.00000005.sdmpDownload File
                        • Associated: 00000003.00000002.1695770889.0000000000896000.00000002.00000001.01000000.00000005.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_850000_Update.jbxd
                        Similarity
                        • API ID: __current_exception__current_exception_contextterminate
                        • String ID: csm
                        • API String ID: 2542180945-1018135373
                        • Opcode ID: 41fdafd931ad9aaddf137b82d0d58c14b10d2b972e8e795f6593ee17b9bb6dd7
                        • Instruction ID: 016ac6f1909b83eeee331ec554ed0546edd01f334af066807b2708178a04e37c
                        • Opcode Fuzzy Hash: 41fdafd931ad9aaddf137b82d0d58c14b10d2b972e8e795f6593ee17b9bb6dd7
                        • Instruction Fuzzy Hash: B3F08C358002008F8F346E2D948D71DB7AEFF66363B580856EC98CBA14CF64AD99C6D2
                        APIs
                        • swprintf.LIBCMT ref: 6C8A8E63
                        • GetFileAttributesW.KERNEL32(000000FF,00000104,00000104,000000FF,?,?), ref: 6C8A8E6E
                        • GetTempFileNameW.KERNEL32(?,?,00000000,000000FF,?,?,6C8B2C49,00000000,AFX,00000000,00000104,00000104,000000FF,?,?), ref: 6C8A8E86
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: File$AttributesNameTempswprintf
                        • String ID: %s%s%X.tmp
                        • API String ID: 2659213859-596088238
                        • Opcode ID: d41d7bd42abfa7bbb62941ebf7a1a092761595952b23d2995e19e4734a55777d
                        • Instruction ID: ec9739a79e55d01a7faa70fcde95290a8ac05fc1be3e4a413a70de3f8c02b7c4
                        • Opcode Fuzzy Hash: d41d7bd42abfa7bbb62941ebf7a1a092761595952b23d2995e19e4734a55777d
                        • Instruction Fuzzy Hash: B0F0343250020EFBCF029FA4CD01ACE3B76AF04329F104910FA24A48A1D732C670BB50
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6C9A5793,00000001,?,00000001,?,?,?,6C9A5882,00000001,FlsFree,6CA0B020,FlsFree), ref: 6C9A57EF
                        • GetLastError.KERNEL32(?,6C9A5793,00000001,?,00000001,?,?,?,6C9A5882,00000001,FlsFree,6CA0B020,FlsFree,00000001,?,6C9A479F), ref: 6C9A57F9
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6C9A5821
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID: api-ms-
                        • API String ID: 3177248105-2084034818
                        • Opcode ID: b16a2d2577e49f49c51467a8bf2669c6d6560e3639a6470b08592f57ae55b6d8
                        • Instruction ID: 4045edb2e975759d9507bfc16d8586d39658a009768593e90591da61def42697
                        • Opcode Fuzzy Hash: b16a2d2577e49f49c51467a8bf2669c6d6560e3639a6470b08592f57ae55b6d8
                        • Instruction Fuzzy Hash: EFE04F70748608BBEF101AA1DD05B5D3F7DAF01B5AF200070FA0DB88D2DB61E492C6D4
                        APIs
                        • IsThemeBackgroundPartiallyTransparent.UXTHEME(?,00000006,00000000,6C9DE490), ref: 6C886856
                        • DrawThemeParentBackground.UXTHEME(?,?,00000000), ref: 6C886870
                        • DrawThemeBackground.UXTHEME(?,?,00000006,00000000,00000000,00000000), ref: 6C88688C
                        • GetBkColor.GDI32(?), ref: 6C88689E
                          • Part of subcall function 6C882E3A: SetBkColor.GDI32(?,?), ref: 6C882E53
                          • Part of subcall function 6C882E3A: ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 6C882E85
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: BackgroundTheme$ColorDraw$ParentPartiallyTextTransparent
                        • String ID:
                        • API String ID: 501873518-0
                        • Opcode ID: 27a4a1fe49be6e162f554444c38b7c1a9b2d7fa56b971b19b5ed946d22a2c7ba
                        • Instruction ID: d98c1e81906d142252b71f4021ea7369555deee61f3cc0e61c5f9eb083ea9528
                        • Opcode Fuzzy Hash: 27a4a1fe49be6e162f554444c38b7c1a9b2d7fa56b971b19b5ed946d22a2c7ba
                        • Instruction Fuzzy Hash: 90914D31E12219DBDF21CF99C944BEEBBB1EF48714F148565E918FBA90C774A840CBA0
                        APIs
                        • GetClientRect.USER32(?,?), ref: 6C8A4EE9
                        • InflateRect.USER32(?,00000000,00000000), ref: 6C8A4F1F
                        • GetSystemMetrics.USER32(00000002), ref: 6C8A4FA6
                          • Part of subcall function 6C866C52: SetScrollInfo.USER32(?,?,?,?), ref: 6C866C96
                        • EnableScrollBar.USER32(?,00000002,00000003), ref: 6C8A50C5
                          • Part of subcall function 6C868E3F: EnableWindow.USER32(?,00000024), ref: 6C868E50
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: EnableRectScroll$ClientInflateInfoMetricsSystemWindow
                        • String ID:
                        • API String ID: 3090651611-0
                        • Opcode ID: fc24521d791c60ebe8707ad412a7420529872368a8487b9102b84603901071c2
                        • Instruction ID: d29c4edfc746e773d9e4e226d0911ab9b111498a7be56e6caece290937a91cdc
                        • Opcode Fuzzy Hash: fc24521d791c60ebe8707ad412a7420529872368a8487b9102b84603901071c2
                        • Instruction Fuzzy Hash: A9715A31A01619DFCF10CFA9CA84AEDB7B9FF88704F14457AE909EB685DB70A941CB50
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C86C364
                        • GetDlgCtrlID.USER32(?), ref: 6C86C3B4
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000213), ref: 6C86C449
                        • SetMenu.USER32(?,?), ref: 6C86C555
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CtrlH_prolog3_MenuWindow
                        • String ID:
                        • API String ID: 739472796-0
                        • Opcode ID: f55946070cff5b91f047c9380a2ee5b9006bce2f03145c0f7de210733bfd4fc1
                        • Instruction ID: c6bfe7589ce0bedfd75c43e473529956853b218864417e1ebb1c105c104fd217
                        • Opcode Fuzzy Hash: f55946070cff5b91f047c9380a2ee5b9006bce2f03145c0f7de210733bfd4fc1
                        • Instruction Fuzzy Hash: 315128316006099BCF30EF6ACE48AAEB779FF55318F14496AE91597F81DB70E840CB91
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8E5654
                        • LoadImageW.USER32(?,?,00000000,00000000,00000000,00002000), ref: 6C8E57AA
                        • GetObjectW.GDI32(00000000,00000018,?), ref: 6C8E57BC
                        • DeleteObject.GDI32(00000000), ref: 6C8E5814
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Object$DeleteH_prolog3ImageLoad
                        • String ID:
                        • API String ID: 91933946-0
                        • Opcode ID: f0b192c9511d27933971e382c422ab27fcde5791efa27681a1be8ee815613f0e
                        • Instruction ID: cdb351369ec684c88fecb1cb719173e179b49629b38024efeb575ec5e8090ccc
                        • Opcode Fuzzy Hash: f0b192c9511d27933971e382c422ab27fcde5791efa27681a1be8ee815613f0e
                        • Instruction Fuzzy Hash: 1961CE31901724CBDF21CF68CA807EE77B5BF4A314F208A79DC19AB685D7309985CBA0
                        APIs
                          • Part of subcall function 6C86F42F: GetDlgCtrlID.USER32(?), ref: 6C86F43D
                          • Part of subcall function 6C86F42F: IsChild.USER32(?,?), ref: 6C86F44B
                        • GetScrollPos.USER32(?,00000002), ref: 6C86E897
                        • GetScrollPos.USER32(?,00000002), ref: 6C86E8C3
                        • SetScrollPos.USER32(?,00000002,00000000,00000000), ref: 6C86E920
                        • SetScrollPos.USER32(?,00000002,00000000,00000000), ref: 6C86E9A2
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Scroll$ChildCtrl
                        • String ID:
                        • API String ID: 656700424-0
                        • Opcode ID: d14d52285181bc8a16287789abb63a7a460bdc7a59b9aebb3bdb22b5d26312ce
                        • Instruction ID: 8f7235be2d6c51063bdc149494736cfd43d5dbffc1b7d8cb23165d00109550bb
                        • Opcode Fuzzy Hash: d14d52285181bc8a16287789abb63a7a460bdc7a59b9aebb3bdb22b5d26312ce
                        • Instruction Fuzzy Hash: F1517B71B0062AAFDF158F65CC55BAEBBB5BF48310F20456AE916B7780CB70A941CB90
                        APIs
                          • Part of subcall function 6C86F42F: GetDlgCtrlID.USER32(?), ref: 6C86F43D
                          • Part of subcall function 6C86F42F: IsChild.USER32(?,?), ref: 6C86F44B
                        • GetScrollPos.USER32(?,00000002), ref: 6C86EA4D
                        • GetScrollPos.USER32(?,00000002), ref: 6C86EA79
                        • SetScrollPos.USER32(?,00000002,00000000,00000000), ref: 6C86EAD6
                        • SetScrollPos.USER32(?,00000002,00000000,00000000), ref: 6C86EB4B
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Scroll$ChildCtrl
                        • String ID:
                        • API String ID: 656700424-0
                        • Opcode ID: d8773387e1a067ff3a8b856636224c5ffee09d24aa846bb431b2f96b44158ca3
                        • Instruction ID: 230cfe47821504c40f8aa34ed51f3533ddabdc64c36b767a3e0617d7e1963dfa
                        • Opcode Fuzzy Hash: d8773387e1a067ff3a8b856636224c5ffee09d24aa846bb431b2f96b44158ca3
                        • Instruction Fuzzy Hash: 2F514A71B00219AFDF11CF65C905BAEBBB6BF89310F20446AE905B7690CB31A9419F90
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C88CC0E
                          • Part of subcall function 6C878733: RegCloseKey.ADVAPI32(00000000), ref: 6C8787D8
                          • Part of subcall function 6C878733: RegCloseKey.ADVAPI32(00000000), ref: 6C8787E7
                        • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 6C88CD93
                        • RegCloseKey.ADVAPI32(?), ref: 6C88CDA6
                        • RegCloseKey.ADVAPI32(?,00000000,00000000,0002001F), ref: 6C88CE00
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Close$EnumH_prolog3_Value
                        • String ID:
                        • API String ID: 431837299-0
                        • Opcode ID: 66ab490f390ec5b6d7d031154ab4469ca442baaf90542f53735018a69f084955
                        • Instruction ID: b796aad8769885680b77defe05e5849386b7490210e780ea6359988dbdbf409f
                        • Opcode Fuzzy Hash: 66ab490f390ec5b6d7d031154ab4469ca442baaf90542f53735018a69f084955
                        • Instruction Fuzzy Hash: 665130B19011389BCB20DB54CD84ADEBBBCEF49658F4005DAE609A7641DB709E89CF98
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: EmptyRect
                        • String ID:
                        • API String ID: 2270935405-0
                        • Opcode ID: 1084df4df123acec2809426bb876e7fb4759b3cff3147656a36598c518218db3
                        • Instruction ID: 1d38933a38cbb9e81d74601a3302b629b1573c805e56ce74f03e2aca812a4986
                        • Opcode Fuzzy Hash: 1084df4df123acec2809426bb876e7fb4759b3cff3147656a36598c518218db3
                        • Instruction Fuzzy Hash: E851C4B0915625CFCB648F5985C46E93BB8BB09B14F1841BBED0CCFA4ACBB05446DFA1
                        APIs
                        • GetPrivateProfileStringW.KERNEL32(?,?,6C9DC6B0,?,00001000,?), ref: 6C878B40
                          • Part of subcall function 6C878B72: RegCloseKey.ADVAPI32(00000000,?,?,?,6C878881,?,00000000,00000018), ref: 6C878BB7
                        • RegQueryValueExW.ADVAPI32(00000000,?,00000000,?,00000000,?,?,00000000,7CCA8F6A,?,?,?,?,6C9CCAAF,000000FF), ref: 6C878A8E
                        • RegQueryValueExW.ADVAPI32(00000000,?,00000000,?,00000000,?,?,?,?,?,?,6C9CCAAF,000000FF), ref: 6C878ACA
                        • RegCloseKey.ADVAPI32(00000000,?,?,?,?,6C9CCAAF,000000FF), ref: 6C878AE4
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CloseQueryValue$PrivateProfileString
                        • String ID:
                        • API String ID: 2114517702-0
                        • Opcode ID: d9648869bd70b20a46d11bcee1aa23762f97f06eb9f3705b29201ca356f85ce9
                        • Instruction ID: d95be56aa25e7dcbdc313d01123533544f0f06542782f7e7c221f02f5896fa4c
                        • Opcode Fuzzy Hash: d9648869bd70b20a46d11bcee1aa23762f97f06eb9f3705b29201ca356f85ce9
                        • Instruction Fuzzy Hash: 52415171900219EFDB35CF18CD48AEEB7B9EF04314F1045AAE519A3681D7309E59DF61
                        APIs
                        • GetStockObject.GDI32(00000000), ref: 6C88877A
                          • Part of subcall function 6C882EDC: CreateBitmap.GDI32(00000008,00000008,00000001,00000001,?), ref: 6C882F23
                          • Part of subcall function 6C882EDC: CreatePatternBrush.GDI32(00000000), ref: 6C882F30
                          • Part of subcall function 6C882EDC: DeleteObject.GDI32(00000000), ref: 6C882F3C
                        • GetSystemMetrics.USER32(00000020), ref: 6C8887BB
                        • GetSystemMetrics.USER32(00000021), ref: 6C8887C7
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 6C888829
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CreateMetricsObjectSystem$BitmapBrushDeleteInflatePatternRectStock
                        • String ID:
                        • API String ID: 419749085-0
                        • Opcode ID: 7470e7837f952de05aa67df34f21ffca6438a2dc45c7bbf9a1341697252bf05e
                        • Instruction ID: b71b3ef5c2235c5d612574aa3f023d09fddf6d3525650c446adb698b9ee91160
                        • Opcode Fuzzy Hash: 7470e7837f952de05aa67df34f21ffca6438a2dc45c7bbf9a1341697252bf05e
                        • Instruction Fuzzy Hash: F1415871D01219CFCF00DFA8CA44AEEBBB5FF49714F21426AE810B7661D734A945CBA4
                        APIs
                        • GetCursorPos.USER32(?), ref: 6C89F08E
                        • ScreenToClient.USER32(000000FF,?), ref: 6C89F09E
                        • PtInRect.USER32(000000D8,?,?), ref: 6C89F0B1
                        • PostMessageW.USER32(000000FF,00000010,00000000,00000000), ref: 6C89F0CC
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ClientCursorMessagePostRectScreen
                        • String ID:
                        • API String ID: 1913696736-0
                        • Opcode ID: e6a4b801faac622e37e632930b2c138d3ec7df5f9d69c9f25ee04e624480c9f8
                        • Instruction ID: c4d17cd715dab520d24b915e2fe0aff80c5e3eb1c6df74f504fc66fe149d0b33
                        • Opcode Fuzzy Hash: e6a4b801faac622e37e632930b2c138d3ec7df5f9d69c9f25ee04e624480c9f8
                        • Instruction Fuzzy Hash: D9312875700515EFCF258F68C944AAD7B79FF58368B204565F819A3A40EB30E901CB90
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8FDF7A
                        • SendMessageW.USER32(?,00000421,00000001,?), ref: 6C8FE011
                        • SendMessageW.USER32(?,00000421,00000001,?), ref: 6C8FE026
                        • lstrcpyW.KERNEL32(00000000,00000010,00000000,00000010,6C89846A,00000000,?,00000002,?,?), ref: 6C8FE055
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageSend$H_prolog3lstrcpy
                        • String ID:
                        • API String ID: 3361160815-0
                        • Opcode ID: 4fbccfc8dd38d02b21e68f108f305eaf9a88cfb9afdcb696190901566c2bd113
                        • Instruction ID: 741265db8a7241b969401b024a49e59316bc66d660e61c6373e5a54d6daed6fe
                        • Opcode Fuzzy Hash: 4fbccfc8dd38d02b21e68f108f305eaf9a88cfb9afdcb696190901566c2bd113
                        • Instruction Fuzzy Hash: C4418E71A0120A9FDF24DF68CD85BAE77B4BF44398F204929E525AB6D0CB70D946CB90
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8897EB
                        • GetClientRect.USER32(6C9DD1C4,?), ref: 6C88983A
                          • Part of subcall function 6C8643A9: GetScrollPos.USER32(?,?), ref: 6C8643D5
                          • Part of subcall function 6C87E9A4: GetModuleHandleW.KERNEL32(uxtheme.dll), ref: 6C87E9B3
                          • Part of subcall function 6C87E9A4: GetProcAddress.KERNEL32(00000000,BufferedPaintInit), ref: 6C87E9C3
                          • Part of subcall function 6C87E9A4: EncodePointer.KERNEL32(00000000), ref: 6C87E9CC
                        • CreateCompatibleDC.GDI32(?), ref: 6C8898D6
                        • CreateCompatibleBitmap.GDI32(?,?,?), ref: 6C8898FC
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CompatibleCreate$AddressBitmapClientEncodeH_prolog3HandleModulePointerProcRectScroll
                        • String ID:
                        • API String ID: 1015973060-0
                        • Opcode ID: a3a93b5a9e172a6a159a70e7ec727de62472fd67b4ac610a5d61df5b5b2cff9a
                        • Instruction ID: d9fd852390cb35b919260aa39be4d57dfe8fd3bf774a9f8070963ba2cf942064
                        • Opcode Fuzzy Hash: a3a93b5a9e172a6a159a70e7ec727de62472fd67b4ac610a5d61df5b5b2cff9a
                        • Instruction Fuzzy Hash: 2F417E70601A06EFDB20DF69CA84A99F7F4BF04308B048929D41997F50E730F954CF90
                        APIs
                          • Part of subcall function 6C868F77: GetWindowLongW.USER32(?,000000F0), ref: 6C868F84
                        • GetClientRect.USER32(?,?), ref: 6C8647B6
                        • IsMenu.USER32(00000000), ref: 6C8647F2
                        • AdjustWindowRectEx.USER32(?,00000000,00000000,?), ref: 6C86480A
                        • GetClientRect.USER32(?,?), ref: 6C864852
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$ClientWindow$AdjustLongMenu
                        • String ID:
                        • API String ID: 3435883281-0
                        • Opcode ID: ba21af108f56a7d156404a281b4df52b0960238634a7e414adc8083d427cce12
                        • Instruction ID: a7671eb819557b33d820fa7d87bb046557c38707b824eb352e8135727d58d80b
                        • Opcode Fuzzy Hash: ba21af108f56a7d156404a281b4df52b0960238634a7e414adc8083d427cce12
                        • Instruction Fuzzy Hash: ED31A731E00259AFDB10DFBACA54EBFB7B9EF95208F254529E904B7B40DB30A940CB50
                        APIs
                        • SetRectEmpty.USER32(00000000), ref: 6C87DB2D
                        • GetClientRect.USER32(?,00000000), ref: 6C87DB4D
                        • GetParent.USER32(?), ref: 6C87DB6C
                        • OffsetRect.USER32(00000000,00000000,00000000), ref: 6C87DBEE
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$ClientEmptyOffsetParent
                        • String ID:
                        • API String ID: 3819956977-0
                        • Opcode ID: c882e644c0738063112338c30d517846a2c404a081b11bec151f5328bab4c878
                        • Instruction ID: aaf4825cdb43204ef996575c1b23255d3924ebd23337fd721d523b26d251f930
                        • Opcode Fuzzy Hash: c882e644c0738063112338c30d517846a2c404a081b11bec151f5328bab4c878
                        • Instruction Fuzzy Hash: 55317571204612AFDB24DF69CA94E7DB7B5FF85764B10C52DE41987A40EB60FC50CBA0
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$EqualInflateParentWindow
                        • String ID:
                        • API String ID: 719057501-0
                        • Opcode ID: 8c22313671eaa542b0c0f265de81ef9874c31bf8a9a673e5b391ad2a6edbbfb5
                        • Instruction ID: 8a586079161a38406e48a044f440aed669f8e483b8cb1719b3ee21eee5790639
                        • Opcode Fuzzy Hash: 8c22313671eaa542b0c0f265de81ef9874c31bf8a9a673e5b391ad2a6edbbfb5
                        • Instruction Fuzzy Hash: 2E313271A042499BCF24DFA5CA54AEEB7B9FF0D304F14452AF505E3640EB35EA458B60
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 6C8FBE37
                        • EqualRect.USER32(?,?), ref: 6C8FBE5D
                        • BeginDeferWindowPos.USER32(?), ref: 6C8FBE6A
                        • EndDeferWindowPos.USER32(00000000), ref: 6C8FBE90
                          • Part of subcall function 6C8EE85D: GetWindowRect.USER32(?,?), ref: 6C8EE871
                          • Part of subcall function 6C8EE85D: GetParent.USER32(?), ref: 6C8EE8C7
                          • Part of subcall function 6C8EE85D: GetParent.USER32(?), ref: 6C8EE8DA
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$Rect$DeferParent$BeginEqual
                        • String ID:
                        • API String ID: 2054780619-0
                        • Opcode ID: 9543f3dbf7a53541f9ce283248fe1948b31feaecee5682374cefe31596b6d1d9
                        • Instruction ID: 85eb58dd1f4faf0263c820ecb30157cbf317d7811ee2e21bee7d14692dbf6a50
                        • Opcode Fuzzy Hash: 9543f3dbf7a53541f9ce283248fe1948b31feaecee5682374cefe31596b6d1d9
                        • Instruction Fuzzy Hash: 82318431F016199BCF10DFA5CA949EEB7F9BF09354F604526E915B3A00DB30A949CB60
                        APIs
                        • GetClientRect.USER32(?,?), ref: 6C89EE1D
                        • PtInRect.USER32(?,?,?), ref: 6C89EE47
                          • Part of subcall function 6C89D1E2: ScreenToClient.USER32(?,?), ref: 6C89D1FE
                          • Part of subcall function 6C89D1E2: GetParent.USER32(?), ref: 6C89D20E
                          • Part of subcall function 6C89D1E2: GetClientRect.USER32(?,?), ref: 6C89D2A1
                          • Part of subcall function 6C89D1E2: MapWindowPoints.USER32(?,?,?,00000002), ref: 6C89D2B3
                          • Part of subcall function 6C89D1E2: PtInRect.USER32(?,?,?), ref: 6C89D2C3
                        • MapWindowPoints.USER32(?,?,?,00000001), ref: 6C89EE70
                        • SendMessageW.USER32(?,00000202,?,?), ref: 6C89EE8F
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Client$PointsWindow$MessageParentScreenSend
                        • String ID:
                        • API String ID: 2689702638-0
                        • Opcode ID: 95380581cdac5a472492ebf8ebdf4688041e11483be9ad7a72b00a66d66523ef
                        • Instruction ID: 447f9fd77982d756518b99565110685c1f351abbd2b762a21e800b23ecf0e110
                        • Opcode Fuzzy Hash: 95380581cdac5a472492ebf8ebdf4688041e11483be9ad7a72b00a66d66523ef
                        • Instruction Fuzzy Hash: 9831D231600A09EBCF22DF69CD049AEBFB5FF49314B20852AF85997550EB31E951DB90
                        APIs
                        • RedrawWindow.USER32(?,00000000,00000000,00000585,?,?,00000000,?,6C8B1E05,00000002,00000000,?,00000000,?,6C88A812,00000000), ref: 6C8B1BD9
                        • RedrawWindow.USER32(?,00000000,00000000,00000585,?,00000000,?,6C8B1E05,00000002,00000000,?,00000000,?,6C88A812,00000000,00000000), ref: 6C8B1C06
                        • RedrawWindow.USER32(?,00000000,00000000,00000185,?,00000000,?,6C8B1E05,00000002,00000000,?,00000000,?,6C88A812,00000000,00000000), ref: 6C8B1C43
                        • RedrawWindow.USER32(?,00000000,00000000,00000585,?,?,00000000,?,6C88A812,00000000,00000000), ref: 6C8CAB51
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: RedrawWindow
                        • String ID:
                        • API String ID: 2219533335-0
                        • Opcode ID: 4af66ecb36d5fde9fcec1f822c05d74abfa00d2a775e0297485b1eb2ad6d63d2
                        • Instruction ID: 7ddeba6f77ea01b0a3116615b0e1379c2241eadc7768862114d2181fcafa7a2c
                        • Opcode Fuzzy Hash: 4af66ecb36d5fde9fcec1f822c05d74abfa00d2a775e0297485b1eb2ad6d63d2
                        • Instruction Fuzzy Hash: 2D21C136745B12BBDB350B15CE44F967776AF45F24F260915AD447BFA0EB30F8408A90
                        APIs
                        • RedrawWindow.USER32(00000041,?,?,00000041), ref: 6C86F68C
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 6C86F6CF
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: InflateRectRedrawWindow
                        • String ID:
                        • API String ID: 3190756164-0
                        • Opcode ID: 8a9b35711c571e832ddea6790b44d94c8f50bdde46c1ca61304401ae88c7e12f
                        • Instruction ID: ac7603aaf0ecbd9eec878a0952ae16cdae0f947ea1ca2341074c5cdeb0c9c36c
                        • Opcode Fuzzy Hash: 8a9b35711c571e832ddea6790b44d94c8f50bdde46c1ca61304401ae88c7e12f
                        • Instruction Fuzzy Hash: C2218F7160520EEBCF10CFD8CE54DAE7779EB06328B20872AB514F7590DB35990A8B61
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a37666fc223b5aeed9b8c0f1b9c124016137710cc6faf8794f572053b27436d3
                        • Instruction ID: e75e3d65f5b927177c4d529077b12364d575a33ac56bf1d051b11a8cb77ba0bc
                        • Opcode Fuzzy Hash: a37666fc223b5aeed9b8c0f1b9c124016137710cc6faf8794f572053b27436d3
                        • Instruction Fuzzy Hash: 7C21AE71308A06AFD700DFE58CD0A9A77BDFF2136D7148619E81697E50EB70EC568BA0
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ae7d43ae032238a1338f5c737f20532e964f22cca85182ace0edf98c4a49c0be
                        • Instruction ID: 96d0afcbd5ddb0b3cb4e73be470930b7979c908467f2b3d407d60dcda7a3de17
                        • Opcode Fuzzy Hash: ae7d43ae032238a1338f5c737f20532e964f22cca85182ace0edf98c4a49c0be
                        • Instruction Fuzzy Hash: D8110371608205BBDB205FAA9D04B8B3BBDEB43768F214324E912F7680DBF0D94187A4
                        APIs
                        • DestroyMenu.USER32(?,7CCA8F6A,?,?,?,Function_0018C862,000000FF), ref: 6C89FC95
                        • IsWindow.USER32(?), ref: 6C89FCA6
                        • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 6C89FCBA
                        • Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRT ref: 6C89FD17
                          • Part of subcall function 6C90F292: GetParent.USER32(00000000), ref: 6C90F319
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ContextExternal$BaseBase::~Concurrency::details::DestroyMenuMessageParentSendWindow
                        • String ID:
                        • API String ID: 3377428259-0
                        • Opcode ID: c916ec029bc090843f85c9dd0b3eef68159d5c7318a210928638661898b3e9ba
                        • Instruction ID: c8bfb5912184df93f31db6093aa3fed59981cbe8a9f46392803af25a48785ad4
                        • Opcode Fuzzy Hash: c916ec029bc090843f85c9dd0b3eef68159d5c7318a210928638661898b3e9ba
                        • Instruction Fuzzy Hash: 2E215C70201B419BC7299F38C984BEAB7B8FF55758F504C2DE46683B80DB74A545CA10
                        APIs
                        • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6C866322
                        • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 6C86634C
                        • GetCapture.USER32 ref: 6C866362
                        • SendMessageW.USER32(00000000,0000001F,00000000,00000000), ref: 6C866371
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageSend$Capture
                        • String ID:
                        • API String ID: 1665607226-0
                        • Opcode ID: 0c369d2612e7bff56d236b1ebbaf7ea116191c7486bf8318564a0a330d40a59b
                        • Instruction ID: 23e2c3884862eb5484964a682f72c2ffbbe183a9cc22f7d582e07736ea06c8dc
                        • Opcode Fuzzy Hash: 0c369d2612e7bff56d236b1ebbaf7ea116191c7486bf8318564a0a330d40a59b
                        • Instruction Fuzzy Hash: 93119371300609BFEF211F258D88FBE7B7EFB48798F104524F605ABA91CB71AC509660
                        APIs
                        • KillTimer.USER32(?,0000EC17), ref: 6C89E3C5
                        • KillTimer.USER32(?,0000EC18), ref: 6C89E3D3
                        • IsWindow.USER32(?), ref: 6C89E443
                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 6C89E46A
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: KillTimer$MessagePostWindow
                        • String ID:
                        • API String ID: 3970157719-0
                        • Opcode ID: ece24535e0c26a220bca66bea986e65cdf6bcb36de1601cb0fd2b6ed1d13d0aa
                        • Instruction ID: 6bd10178d033c044150fbe70db2fd10d794c1efb811ab91fe84fcd187eb431e1
                        • Opcode Fuzzy Hash: ece24535e0c26a220bca66bea986e65cdf6bcb36de1601cb0fd2b6ed1d13d0aa
                        • Instruction Fuzzy Hash: 7721C231700A05EFEF149F65C888B9E7BB5FF48715F204569D901ABA91DB71A841CB90
                        APIs
                        • GetClientRect.USER32 ref: 6C89ED67
                        • PtInRect.USER32(?,?,?), ref: 6C89ED80
                          • Part of subcall function 6C89D1E2: ScreenToClient.USER32(?,?), ref: 6C89D1FE
                          • Part of subcall function 6C89D1E2: GetParent.USER32(?), ref: 6C89D20E
                          • Part of subcall function 6C89D1E2: GetClientRect.USER32(?,?), ref: 6C89D2A1
                          • Part of subcall function 6C89D1E2: MapWindowPoints.USER32(?,?,?,00000002), ref: 6C89D2B3
                          • Part of subcall function 6C89D1E2: PtInRect.USER32(?,?,?), ref: 6C89D2C3
                        • MapWindowPoints.USER32(?,?,?,00000001), ref: 6C89EDB6
                        • SendMessageW.USER32(?,00000201,?,?), ref: 6C89EDD5
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$Client$PointsWindow$MessageParentScreenSend
                        • String ID:
                        • API String ID: 2689702638-0
                        • Opcode ID: 73c154e823100966337db9db01ab20207bae51274ce3e992087354fe1c40c0a5
                        • Instruction ID: 71d8a1a18e17ed1884b14f904cd415fe635eb255bd48e6ee2daa2318cd2565fa
                        • Opcode Fuzzy Hash: 73c154e823100966337db9db01ab20207bae51274ce3e992087354fe1c40c0a5
                        • Instruction Fuzzy Hash: A921AF31A0060DEFCF158F64CC04AAEBBB6FF08304F10862AF815A2650EB71A960DB90
                        APIs
                        • BeginDeferWindowPos.USER32(00000000), ref: 6C87E004
                        • IsWindow.USER32(?), ref: 6C87E01F
                        • DeferWindowPos.USER32(00000000,?,00000000,?,?,?,?,00000000), ref: 6C87E068
                        • EndDeferWindowPos.USER32(00000000), ref: 6C87E073
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$Defer$Begin
                        • String ID:
                        • API String ID: 2880567340-0
                        • Opcode ID: b83bb247f77bc2e1543fe88350969c37271e55e7f52edb4f827213d1e6a3c83c
                        • Instruction ID: e1926511fc51d2d2bf34ed634bc9423e1e4c0c06e4514594240d10ffbf8fe179
                        • Opcode Fuzzy Hash: b83bb247f77bc2e1543fe88350969c37271e55e7f52edb4f827213d1e6a3c83c
                        • Instruction Fuzzy Hash: ED112E71A00209AFDB21CFA9C944BAEB7F9FF19204F144559E501F7650DB31A9818BA0
                        APIs
                        • UnlockFile.KERNEL32(?,?,?,?,?), ref: 6C88EAC8
                        • GetLastError.KERNEL32 ref: 6C88EAE1
                        • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,00000000,00000000), ref: 6C88EB0B
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: File$ErrorLastUnlockWrite
                        • String ID:
                        • API String ID: 1673360954-0
                        • Opcode ID: 7d1d6330eeb84b62742a7d8daa4cb89561ffdefa93059a77e4f0e4b35ebc0f2e
                        • Instruction ID: 611e6e3f58f5146418e8e730bf53728a83730fb5822f4e46808019a51d15f0c8
                        • Opcode Fuzzy Hash: 7d1d6330eeb84b62742a7d8daa4cb89561ffdefa93059a77e4f0e4b35ebc0f2e
                        • Instruction Fuzzy Hash: 9711063250551CBBCF209F95CD08EDB7B7CFF05665B108929FA15A69A0DB30E914C7E0
                        APIs
                        • GetCursorPos.USER32(00000000), ref: 6C87ACA6
                        • GetWindowRect.USER32(?,?), ref: 6C87ACC2
                        • PtInRect.USER32(?,00000000,00000000), ref: 6C87ACD2
                        • CallNextHookEx.USER32(?,?,?), ref: 6C87ACFA
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$CallCursorHookNextWindow
                        • String ID:
                        • API String ID: 3719484595-0
                        • Opcode ID: a7ae988dbf70378344c8ac1cc489ef4508b9107e698d8c9b901435e7346f39eb
                        • Instruction ID: 69e7ecee6c97787ff3824ce2296859b8f6360b8f1620123686424221660ee028
                        • Opcode Fuzzy Hash: a7ae988dbf70378344c8ac1cc489ef4508b9107e698d8c9b901435e7346f39eb
                        • Instruction Fuzzy Hash: 7F219032A0120AEBCF219FA4CE08AEEBBB4BF55309F258115E415E2560E730E641CB60
                        APIs
                        • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000004,?,00000004,?,00000000), ref: 6C878E69
                        • RegCloseKey.ADVAPI32(00000000), ref: 6C878E72
                        • swprintf.LIBCMT ref: 6C878E8F
                        • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 6C878EA0
                          • Part of subcall function 6C878B72: RegCloseKey.ADVAPI32(00000000,?,?,?,6C878881,?,00000000,00000018), ref: 6C878BB7
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Close$PrivateProfileStringValueWriteswprintf
                        • String ID:
                        • API String ID: 581541481-0
                        • Opcode ID: f0a49eb4f223f7ac71e022a5fab6eabfb645da8f0b5376b8dacd5c53577e9407
                        • Instruction ID: 0f731146e4477ec4c0cfefd2ebec93dda281f0acf3190149ee00ce73cdead92d
                        • Opcode Fuzzy Hash: f0a49eb4f223f7ac71e022a5fab6eabfb645da8f0b5376b8dacd5c53577e9407
                        • Instruction Fuzzy Hash: A2015E72600608ABDB209F68CD85FAFB3BCEB4AA48F51481AB601B6650E774ED459760
                        APIs
                        • GetObjectW.GDI32(?,0000000C,?), ref: 6C8645E6
                        • SetBkColor.GDI32(?,?), ref: 6C8645F0
                        • GetSysColor.USER32(00000008), ref: 6C864600
                        • SetTextColor.GDI32(?,?), ref: 6C864608
                          • Part of subcall function 6C87C5AB: GetWindowLongW.USER32(?,000000F0), ref: 6C87C5C6
                          • Part of subcall function 6C87C5AB: GetClassNameW.USER32(?,?,0000000A), ref: 6C87C5DB
                          • Part of subcall function 6C87C5AB: CompareStringW.KERNEL32(0000007F,00000001,?,000000FF,combobox,000000FF), ref: 6C87C5F2
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Color$ClassCompareLongNameObjectStringTextWindow
                        • String ID:
                        • API String ID: 3274569906-0
                        • Opcode ID: 753a04ac4f3024401ef5769c4808b235da9a0e202db25690b39217de70f97981
                        • Instruction ID: d892a087d631b60780f8ec6f3078770b2ae4eae7bc718af27b48f9770ae50855
                        • Opcode Fuzzy Hash: 753a04ac4f3024401ef5769c4808b235da9a0e202db25690b39217de70f97981
                        • Instruction Fuzzy Hash: F5016131605504ABEB30DFAE8A549AF77B9EFC6618B604915F913D3D84DB30DD8187A0
                        APIs
                        • CreateThread.KERNEL32(00000000,?,6C9B03B6,00000000,00000004,00000000), ref: 6C9B0563
                        • GetLastError.KERNEL32(?,?,?,6C8F8F8E,6C8F8FDE,00000000,00000000,?,?,?,6C898FBA,00000001), ref: 6C9B056F
                        • __dosmaperr.LIBCMT ref: 6C9B0576
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CreateErrorLastThread__dosmaperr
                        • String ID:
                        • API String ID: 2744730728-0
                        • Opcode ID: e54e90b5a9582e578362f5af938e1f39b64c511c559e1dfd0b4aecbe6ad81897
                        • Instruction ID: a829368c20166429458c20995e65ba31d6329d15e16b4470ea53273336a488d8
                        • Opcode Fuzzy Hash: e54e90b5a9582e578362f5af938e1f39b64c511c559e1dfd0b4aecbe6ad81897
                        • Instruction Fuzzy Hash: 510184B2905644BBCB10CBA6CE04B9F7BB9EF91379F204219F524A69D0DBB0C545D760
                        APIs
                        • SetActiveWindow.USER32(?), ref: 6C86B60F
                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 6C86B622
                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 6C86B650
                        • DragFinish.SHELL32(?), ref: 6C86B685
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Drag$FileQuery$ActiveFinishWindow
                        • String ID:
                        • API String ID: 892977027-0
                        • Opcode ID: 80f2438ec5b77bfe3d79a8fa4f09e6d230ce88be177158e1e7b1c3bdb1f0ee58
                        • Instruction ID: 8e00cdd7bd2dc6f4803525d1b8183648c2f25090f21294463882759707fcecd7
                        • Opcode Fuzzy Hash: 80f2438ec5b77bfe3d79a8fa4f09e6d230ce88be177158e1e7b1c3bdb1f0ee58
                        • Instruction Fuzzy Hash: 491151756016189BCB20DB25CD8CDAEBBB8FB9A714F104599E519A7241DB30AD44CF60
                        APIs
                        • GetDlgCtrlID.USER32(?), ref: 6C87004C
                        • GetScrollPos.USER32(?,00000002), ref: 6C87005F
                        • SendMessageW.USER32(?,00000115,?,?), ref: 6C870099
                        • SetScrollPos.USER32(?,00000002,?,00000000), ref: 6C8700B7
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Scroll$CtrlMessageSend
                        • String ID:
                        • API String ID: 1219558039-0
                        • Opcode ID: 0cb443fc8a164c41f1afd614dcbcf5808fef45ccaf6e14d84c77677fb56e664b
                        • Instruction ID: 7869d0a32d098814245ba53bee0348b0af81b6db670b196550daf873993e8f8b
                        • Opcode Fuzzy Hash: 0cb443fc8a164c41f1afd614dcbcf5808fef45ccaf6e14d84c77677fb56e664b
                        • Instruction Fuzzy Hash: D411CE32600218AFDF218F68CD49EAE7BB5FF49350F100969F905AB151E771AC50CB60
                        APIs
                          • Part of subcall function 6C868F77: GetWindowLongW.USER32(?,000000F0), ref: 6C868F84
                        • GetForegroundWindow.USER32 ref: 6C888145
                        • GetLastActivePopup.USER32(?), ref: 6C88815A
                        • SendMessageW.USER32(?,0000036D,00000040,00000000), ref: 6C888176
                        • SendMessageW.USER32(?,0000036D,00000004,00000000), ref: 6C888192
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: MessageSendWindow$ActiveForegroundLastLongPopup
                        • String ID:
                        • API String ID: 2039223353-0
                        • Opcode ID: ec7fcb642e2a1627112a837bececbc9dfeef453705ea9b53cc5a4486bb8fddd1
                        • Instruction ID: f806351f87552a4843616f07e6076a824f8ca14fe2550631476201fc89a4fa46
                        • Opcode Fuzzy Hash: ec7fcb642e2a1627112a837bececbc9dfeef453705ea9b53cc5a4486bb8fddd1
                        • Instruction Fuzzy Hash: 5D01D6B6345B007BEB311A768E45FAA2179AB44718F340E3BF741EAE90DF70D8454250
                        APIs
                        • GetDlgCtrlID.USER32(?), ref: 6C86F769
                        • GetScrollPos.USER32(?,00000002), ref: 6C86F77C
                        • SendMessageW.USER32(?,00000114,?,?), ref: 6C86F7B6
                        • SetScrollPos.USER32(?,00000002,?,00000000), ref: 6C86F7D4
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Scroll$CtrlMessageSend
                        • String ID:
                        • API String ID: 1219558039-0
                        • Opcode ID: 86633b93baf0c22857cdb20b8657c3da2b8a9d402778a3fd9db2461c78cfe8a7
                        • Instruction ID: 63e7fc0ad8e3642a611e38996fa20c39453b052246b9d568d869b464f4e72d2f
                        • Opcode Fuzzy Hash: 86633b93baf0c22857cdb20b8657c3da2b8a9d402778a3fd9db2461c78cfe8a7
                        • Instruction Fuzzy Hash: 5F11CE72600218EFEF118FA9CC49FAEBBB4FF4A340F014969F941AB161D670AC50DB60
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8719F9
                        • BeginPaint.USER32(?,?,00000004,6C842755,?), ref: 6C871A25
                        • __EH_prolog3.LIBCMT ref: 6C871A4E
                        • CreatePen.GDI32(?,?,?), ref: 6C871A6F
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: H_prolog3$BeginCreatePaint
                        • String ID:
                        • API String ID: 3507124140-0
                        • Opcode ID: d7741204ec3490d3a76656e217b3e90bcf3cf61eeb9270b3508f759c81f8dc5a
                        • Instruction ID: b5e45b2b17ee0d02ceb411484ea0a8bcf3b895ca504b94e40a549845b5b2b10c
                        • Opcode Fuzzy Hash: d7741204ec3490d3a76656e217b3e90bcf3cf61eeb9270b3508f759c81f8dc5a
                        • Instruction Fuzzy Hash: 03115AB1600715DFDB34DF68CA04B9EBAB0AF18708F10882DA559D7F50EB34EA048BA5
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: OffsetRect
                        • String ID:
                        • API String ID: 177026234-0
                        • Opcode ID: ce6ff8779b2ca3aa9205877245c7e73677f6b5f68ea904f61b9a24d0207fa929
                        • Instruction ID: 97b980505413b6127e631e5bf26d2808bcea6c237ad3c6330b52ff0dafaad9d6
                        • Opcode Fuzzy Hash: ce6ff8779b2ca3aa9205877245c7e73677f6b5f68ea904f61b9a24d0207fa929
                        • Instruction Fuzzy Hash: 59010076602104AFCF109FA9D988DCA7BBCEF46665F10856AFD09DB605D630E984CBE0
                        APIs
                        • GetMenuItemCount.USER32(00000000), ref: 6C8607FB
                        • GetSubMenu.USER32(00000000,-00000001), ref: 6C86080A
                        • GetMenuItemCount.USER32(00000000), ref: 6C860817
                        • GetMenuItemID.USER32(00000000,00000000), ref: 6C86082D
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Menu$Item$Count
                        • String ID:
                        • API String ID: 879546783-0
                        • Opcode ID: 528692e0e97898c58d2082a4a19c8feb0b9d7b1e97acac1509f23f923cd2b1fc
                        • Instruction ID: 0329572dbbd3de15b9c5f130961c68d4bc633c79c8b0513a98bf3a11893e82e7
                        • Opcode Fuzzy Hash: 528692e0e97898c58d2082a4a19c8feb0b9d7b1e97acac1509f23f923cd2b1fc
                        • Instruction Fuzzy Hash: 79012171615669EFDF61CB66CE84A4E7AB9EF05744F204839E409F6B00DB30D9408698
                        APIs
                        • InflateRect.USER32(?,00000002,00000002), ref: 6C895F08
                        • InvalidateRect.USER32(?,?,00000001), ref: 6C895F1C
                        • UpdateWindow.USER32(?), ref: 6C895F25
                        • SetRectEmpty.USER32(?), ref: 6C895F2C
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Rect$EmptyInflateInvalidateUpdateWindow
                        • String ID:
                        • API String ID: 3040190709-0
                        • Opcode ID: 77ed5793e7b748b67c88d07aa1781f05d93622088110732b6ac7032c422f977f
                        • Instruction ID: 6b89b0167667df385f23ac9d648ed56768f382bdeb3b899ac92dcce3ab95825a
                        • Opcode Fuzzy Hash: 77ed5793e7b748b67c88d07aa1781f05d93622088110732b6ac7032c422f977f
                        • Instruction Fuzzy Hash: E301C0316006099FDB10DF68C849FABBBF8FB4A320F610369E406E7190DB306944CB50
                        APIs
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 6C8606D0
                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 6C8606DF
                        • IsWindow.USER32(00000000), ref: 6C8606F0
                        • SetWindowLongW.USER32(00000000,000000F0,?), ref: 6C860700
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID:
                        • API String ID: 847901565-0
                        • Opcode ID: 0f9e349c43f7cc71ae7103ceb6bb9621a8764564c3b97acb026c81c8a496ed3a
                        • Instruction ID: 2f1ad266da5caaef04a59c8b8c160cc5fd44baeaba6039dd7f2f94e643d42bd1
                        • Opcode Fuzzy Hash: 0f9e349c43f7cc71ae7103ceb6bb9621a8764564c3b97acb026c81c8a496ed3a
                        • Instruction Fuzzy Hash: 6B01DB31308514AFDF005B758C54A7E76B8EB4BB34B200728F812E6BC1DF75A8419B59
                        APIs
                        • GetTopWindow.USER32(6C8605D0), ref: 6C866B64
                        • GetTopWindow.USER32(00000000), ref: 6C866BA7
                        • GetWindow.USER32(00000000,00000002), ref: 6C866BC9
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window
                        • String ID:
                        • API String ID: 2353593579-0
                        • Opcode ID: 3493e4ce26b4c11753bae2133984ffd5ef57ed9db8a8f1cb04d29cf0636aa943
                        • Instruction ID: 470cdfdf457c573678de5de7897cdfb7f90a03b5d4ce71082efcce853936c7e8
                        • Opcode Fuzzy Hash: 3493e4ce26b4c11753bae2133984ffd5ef57ed9db8a8f1cb04d29cf0636aa943
                        • Instruction Fuzzy Hash: 6C01E532101559FBCF225FA2CE04FDE3B3ABF0A354F504914FA14A5860C736D665EBA5
                        APIs
                        • GetDlgItem.USER32(6C8605D0,?), ref: 6C864055
                        • GetTopWindow.USER32(00000000), ref: 6C864062
                          • Part of subcall function 6C86404B: GetWindow.USER32(00000000,00000002), ref: 6C8640B1
                        • GetTopWindow.USER32(6C8605D0), ref: 6C864096
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$Item
                        • String ID:
                        • API String ID: 369458955-0
                        • Opcode ID: dc145390540056bad60ad4b0c05a37fb864d6370d29cf5641e6bb0e2f2f3b732
                        • Instruction ID: 13ade65a4f58a04db6ba13ba2ca05c057bfb7b7c4ef36ac9bc800a858abfecc0
                        • Opcode Fuzzy Hash: dc145390540056bad60ad4b0c05a37fb864d6370d29cf5641e6bb0e2f2f3b732
                        • Instruction Fuzzy Hash: 00018F31105639B7CB72AE678E14A8E3AB9AFC5358F144920FD54A6D00D732C5188A97
                        APIs
                        • GetParent.USER32(?), ref: 6C869203
                        • GetParent.USER32(?), ref: 6C869216
                        • GetParent.USER32(?), ref: 6C869230
                        • SetFocus.USER32(?,00000000,?,?,6C86BEB8,?,6C8424E3,?), ref: 6C869249
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Parent$Focus
                        • String ID:
                        • API String ID: 384096180-0
                        • Opcode ID: 248c885db3eb3981c1f44aa815e6df0daa2c0e73e81c6be7ba6c2f1164ce1ed1
                        • Instruction ID: 39197dc70e54bef730581d3f0900156f1fb9fa0b8895bd90b0df9197c776707d
                        • Opcode Fuzzy Hash: 248c885db3eb3981c1f44aa815e6df0daa2c0e73e81c6be7ba6c2f1164ce1ed1
                        • Instruction Fuzzy Hash: 24F08132B04B009BCF252BB7C91896E76BAFF88615B144D2DE55297F60DF30EC018B50
                        APIs
                        • WriteConsoleW.KERNEL32(00000000,6C9C3A52,00000000,00000000,00000000,?,6C9C3ECF,00000000,00000001,00000000,?,?,6C9BD77C,?,00000000,00000000), ref: 6C9C9709
                        • GetLastError.KERNEL32(?,6C9C3ECF,00000000,00000001,00000000,?,?,6C9BD77C,?,00000000,00000000,?,?,?,6C9BDD56,?), ref: 6C9C9715
                          • Part of subcall function 6C9C96DB: CloseHandle.KERNEL32(FFFFFFFE,6C9C9725,?,6C9C3ECF,00000000,00000001,00000000,?,?,6C9BD77C,?,00000000,00000000,?,?), ref: 6C9C96EB
                        • ___initconout.LIBCMT ref: 6C9C9725
                          • Part of subcall function 6C9C969D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6C9C96CC,6C9C3EBC,?,?,6C9BD77C,?,00000000,00000000,?), ref: 6C9C96B0
                        • WriteConsoleW.KERNEL32(00000000,6C9C3A52,00000000,00000000,?,6C9C3ECF,00000000,00000001,00000000,?,?,6C9BD77C,?,00000000,00000000,?), ref: 6C9C973A
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                        • String ID:
                        • API String ID: 2744216297-0
                        • Opcode ID: 34aa1b1871841848892d7ba115b760b247bd6e4b83b0810555b7dafc72098028
                        • Instruction ID: 69916251cc617c6e5ea6f6215446d2dd801464c809e985c2f19be015529d688c
                        • Opcode Fuzzy Hash: 34aa1b1871841848892d7ba115b760b247bd6e4b83b0810555b7dafc72098028
                        • Instruction Fuzzy Hash: C2F01236304255BBCF125F96CC18D893F35FF05765B154514FA1D95150C631D8609B92
                        APIs
                        • PeekConsoleInputA.KERNEL32(?,?,?,00000000,?,6C9A5F2C,00000000,6C8445C6,?,?,?,?,?,?,6C8445C6), ref: 6C9B99CD
                        • GetLastError.KERNEL32(?,6C9A5F2C,00000000,6C8445C6,?,?,?,?,?,?,6C8445C6), ref: 6C9B99D9
                          • Part of subcall function 6C9B9AA2: CloseHandle.KERNEL32(FFFFFFFF,6C9B997E,?,?,6C9A5EC2,6C8445C6,?,?,?,?,?,6C8445C6), ref: 6C9B9AB2
                        • ___initconin.LIBCMT ref: 6C9B99E9
                          • Part of subcall function 6C9B98EE: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C9B99A9,6C9A5EB1,?,?,?,?,?,6C8445C6), ref: 6C9B9901
                        • PeekConsoleInputA.KERNEL32(?,?,?,?,6C9A5F2C,00000000,6C8445C6,?,?,?,?,?,?,6C8445C6), ref: 6C9B99FD
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ConsoleInputPeek$CloseCreateErrorFileHandleLast___initconin
                        • String ID:
                        • API String ID: 1545762386-0
                        • Opcode ID: d1c56c36e5f6ef8db98973a4a181d064064dec7d07c9db6a9ef2e96d08161aeb
                        • Instruction ID: 645ee4f19329da7140070f5dabd61e23e4b252cf140c8fc3e513cbca1481899b
                        • Opcode Fuzzy Hash: d1c56c36e5f6ef8db98973a4a181d064064dec7d07c9db6a9ef2e96d08161aeb
                        • Instruction Fuzzy Hash: E4F03736144559BB8F121FD1CC1488E3F76EB157A5B154124FA1DA1510C732D860DBA1
                        APIs
                        • ReadConsoleInputW.KERNEL32(6C8445C6,?,?,00000000,?,6C9A5C94,00000001,00000001,?,6CA2CEB8,00000038,6C9A5C10), ref: 6C9B9A1F
                        • GetLastError.KERNEL32(?,6C9A5C94,00000001,00000001,?,6CA2CEB8,00000038,6C9A5C10), ref: 6C9B9A2B
                          • Part of subcall function 6C9B9AA2: CloseHandle.KERNEL32(FFFFFFFF,6C9B997E,?,?,6C9A5EC2,6C8445C6,?,?,?,?,?,6C8445C6), ref: 6C9B9AB2
                        • ___initconin.LIBCMT ref: 6C9B9A3B
                          • Part of subcall function 6C9B98EE: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C9B99A9,6C9A5EB1,?,?,?,?,?,6C8445C6), ref: 6C9B9901
                        • ReadConsoleInputW.KERNEL32(6C8445C6,?,?,?,6C9A5C94,00000001,00000001,?,6CA2CEB8,00000038,6C9A5C10), ref: 6C9B9A4F
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ConsoleInputRead$CloseCreateErrorFileHandleLast___initconin
                        • String ID:
                        • API String ID: 838051604-0
                        • Opcode ID: 395e1d20f9e01c515e07eb613cd6081d31708fb58bce95057f5b5c0096021442
                        • Instruction ID: b8ae62070560cd98f930641710f4de1169221eb81b82a4cd6c8dec60808cbecf
                        • Opcode Fuzzy Hash: 395e1d20f9e01c515e07eb613cd6081d31708fb58bce95057f5b5c0096021442
                        • Instruction Fuzzy Hash: 89F03036644559BB8F122FD1CC1888E3F36EB293A5B154120FA09A5620C732D860EBD1
                        APIs
                        • GetSystemTimeAsFileTime.KERNEL32(00000001), ref: 6C9A073C
                        • GetCurrentThreadId.KERNEL32 ref: 6C9A074B
                        • GetCurrentProcessId.KERNEL32 ref: 6C9A0754
                        • QueryPerformanceCounter.KERNEL32(?), ref: 6C9A0761
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                        • String ID:
                        • API String ID: 2933794660-0
                        • Opcode ID: a8e19076884966b84d37bfbc13563f4ac647c60590f3a7a54f95912b1d8585df
                        • Instruction ID: 532cf7ca2723258df243a2c6debcb3c0ecadf0c0d28ba32ebecf64c6255e9445
                        • Opcode Fuzzy Hash: a8e19076884966b84d37bfbc13563f4ac647c60590f3a7a54f95912b1d8585df
                        • Instruction Fuzzy Hash: CAF06275D1460DEFCF00DBB4C68999EBBF8FF1D205BA14595A412F7100E730AB849B50
                        APIs
                          • Part of subcall function 6C86931F: ShowWindow.USER32(?,?,00000000,?,6C86CF2F,00000000,?,?,?,?,?,?,?,6C86CA7A,00000000,000000FF), ref: 6C869330
                        • UpdateWindow.USER32(?), ref: 6C9990F5
                        • UpdateWindow.USER32(?), ref: 6C999108
                        • SetRectEmpty.USER32(?), ref: 6C999115
                        • SetRectEmpty.USER32(?), ref: 6C999122
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Window$EmptyRectUpdate$Show
                        • String ID:
                        • API String ID: 1262231214-0
                        • Opcode ID: 903bfdd2f1b6b0fc73687609e741ef6d1889d24c43fc46bc15f1e12fe59fe4fc
                        • Instruction ID: 0122c8203c00e515f677885935b8e6893e8987ef5476d11567141cf5f664357c
                        • Opcode Fuzzy Hash: 903bfdd2f1b6b0fc73687609e741ef6d1889d24c43fc46bc15f1e12fe59fe4fc
                        • Instruction Fuzzy Hash: D7F0F831215A15CFEB609F31C908BD677B8BB09215F154859F0AED7160DB30E484CF10
                        APIs
                        • GetConsoleMode.KERNEL32(6C8445C6,?,?,6C9A5C73,?,6CA2CEB8,00000038,6C9A5C10), ref: 6C9B991C
                        • GetLastError.KERNEL32(?,?,6C9A5C73,?,6CA2CEB8,00000038,6C9A5C10), ref: 6C9B9928
                          • Part of subcall function 6C9B9AA2: CloseHandle.KERNEL32(FFFFFFFF,6C9B997E,?,?,6C9A5EC2,6C8445C6,?,?,?,?,?,6C8445C6), ref: 6C9B9AB2
                        • ___initconin.LIBCMT ref: 6C9B9938
                          • Part of subcall function 6C9B98EE: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C9B99A9,6C9A5EB1,?,?,?,?,?,6C8445C6), ref: 6C9B9901
                        • GetConsoleMode.KERNEL32(6C8445C6,?,?,6C9A5C73,?,6CA2CEB8,00000038,6C9A5C10), ref: 6C9B9946
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ConsoleMode$CloseCreateErrorFileHandleLast___initconin
                        • String ID:
                        • API String ID: 3067319862-0
                        • Opcode ID: f0b59305b1b9f3057a9c8d5f8d4a0cb680b89d49757b53da367ca7cad9757534
                        • Instruction ID: d64a046895ce63db50339dc6324133f28c6b44aa722b7978c0e191f45e539fc6
                        • Opcode Fuzzy Hash: f0b59305b1b9f3057a9c8d5f8d4a0cb680b89d49757b53da367ca7cad9757534
                        • Instruction Fuzzy Hash: 0EE0D832208415778F221BE1CC1898E3EB5DB262A63110120FA0DE1710C631D850CBD1
                        APIs
                        • GetNumberOfConsoleInputEvents.KERNEL32(?,?,?,6C9A5EC2,6C8445C6,?,?,?,?,?,6C8445C6), ref: 6C9B9962
                        • GetLastError.KERNEL32(?,?,6C9A5EC2,6C8445C6,?,?,?,?,?,6C8445C6), ref: 6C9B996E
                          • Part of subcall function 6C9B9AA2: CloseHandle.KERNEL32(FFFFFFFF,6C9B997E,?,?,6C9A5EC2,6C8445C6,?,?,?,?,?,6C8445C6), ref: 6C9B9AB2
                        • ___initconin.LIBCMT ref: 6C9B997E
                          • Part of subcall function 6C9B98EE: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C9B99A9,6C9A5EB1,?,?,?,?,?,6C8445C6), ref: 6C9B9901
                        • GetNumberOfConsoleInputEvents.KERNEL32(?,?,?,6C9A5EC2,6C8445C6,?,?,?,?,?,6C8445C6), ref: 6C9B998C
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ConsoleEventsInputNumber$CloseCreateErrorFileHandleLast___initconin
                        • String ID:
                        • API String ID: 1600138625-0
                        • Opcode ID: d13c5d74fd5a5c9761b62b6df0c27e63051393b19c70d0b4aba8cc0e02155c6f
                        • Instruction ID: 3b0d4763edabbe814d412d8e56c57434d286963e77af2fe19de072c506fc3342
                        • Opcode Fuzzy Hash: d13c5d74fd5a5c9761b62b6df0c27e63051393b19c70d0b4aba8cc0e02155c6f
                        • Instruction Fuzzy Hash: 0AE0D8362444257B8F221BD5CC1C88E3F35DB262A67114120FD0DE1710CA31D85087E1
                        APIs
                        • SetConsoleMode.KERNEL32(6C8445C6,00000000,?,6C9A5C7B,00000000,?,6CA2CEB8,00000038,6C9A5C10), ref: 6C9B9A6B
                        • GetLastError.KERNEL32(?,6C9A5C7B,00000000,?,6CA2CEB8,00000038,6C9A5C10), ref: 6C9B9A77
                          • Part of subcall function 6C9B9AA2: CloseHandle.KERNEL32(FFFFFFFF,6C9B997E,?,?,6C9A5EC2,6C8445C6,?,?,?,?,?,6C8445C6), ref: 6C9B9AB2
                        • ___initconin.LIBCMT ref: 6C9B9A87
                          • Part of subcall function 6C9B98EE: CreateFileW.KERNELBASE(CONIN$,C0000000,00000003,00000000,00000003,00000000,00000000,6C9B99A9,6C9A5EB1,?,?,?,?,?,6C8445C6), ref: 6C9B9901
                        • SetConsoleMode.KERNEL32(6C8445C6,?,6C9A5C7B,00000000,?,6CA2CEB8,00000038,6C9A5C10), ref: 6C9B9A95
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ConsoleMode$CloseCreateErrorFileHandleLast___initconin
                        • String ID:
                        • API String ID: 3067319862-0
                        • Opcode ID: db195aed944668577dd738c939b435df0c599a1af381fbfc61c2d4a08c478726
                        • Instruction ID: c1cd12eee62987e1f7a10ca1ae0061b45389b9011458a4a79c650ec868231068
                        • Opcode Fuzzy Hash: db195aed944668577dd738c939b435df0c599a1af381fbfc61c2d4a08c478726
                        • Instruction Fuzzy Hash: A1E0483660451D778F252BD5DC1C88E3E75FB263A67150124F90DE1610D631D8509BE1
                        APIs
                          • Part of subcall function 6C888752: GetStockObject.GDI32(00000000), ref: 6C88877A
                          • Part of subcall function 6C888752: InflateRect.USER32(?,000000FF,000000FF), ref: 6C888829
                        • ReleaseCapture.USER32 ref: 6C888716
                        • GetDesktopWindow.USER32 ref: 6C88871C
                        • LockWindowUpdate.USER32(00000000,00000000), ref: 6C88872C
                        • ReleaseDC.USER32(?,?), ref: 6C888742
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ReleaseWindow$CaptureDesktopInflateLockObjectRectStockUpdate
                        • String ID:
                        • API String ID: 1260764132-0
                        • Opcode ID: a980c3ae0d42a2f7c66c0c8a3b11f808090d25cb4ac9de197cfa58c8f1df52c0
                        • Instruction ID: ccfcafd12516e1cb536b8613f0d3f7d982f983c969b5ba8324bb7447b35549e5
                        • Opcode Fuzzy Hash: a980c3ae0d42a2f7c66c0c8a3b11f808090d25cb4ac9de197cfa58c8f1df52c0
                        • Instruction Fuzzy Hash: 4EE04F36306700ABDF242BB1DA0CB8A3B35FF42766F24082DF146DA950CF72A8819B50
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: EmptyRect
                        • String ID:
                        • API String ID: 2270935405-0
                        • Opcode ID: 2d7ff4ce74fac2d8ee795300d527faa326f5f6388c9edaec2d4f1109f6fd623b
                        • Instruction ID: 071027dbc4ff58f8d7f35f85f1bedbf0989aa78b8adc5e365695aa38a9f38db1
                        • Opcode Fuzzy Hash: 2d7ff4ce74fac2d8ee795300d527faa326f5f6388c9edaec2d4f1109f6fd623b
                        • Instruction Fuzzy Hash: AEE0AE71414B1A8BEB30AFA1C448ADAB7FCFB09325F90081DE18293910DB78F1898B90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: _strcspn
                        • String ID: @
                        • API String ID: 3709121408-2766056989
                        • Opcode ID: f67e9732b9c01e556859cbb10b39576cbc8a92117456cdd62283aaafc048534e
                        • Instruction ID: a5b45524682776087e050a31a38aac09b9da081b89693a11551104d8ecb87d73
                        • Opcode Fuzzy Hash: f67e9732b9c01e556859cbb10b39576cbc8a92117456cdd62283aaafc048534e
                        • Instruction Fuzzy Hash: 67F138B190024D9FCB14CFA8C990BEEBBB5BF89304F14C969E519AB790D734A945CF90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: __aulldiv
                        • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                        • API String ID: 3732870572-1956417402
                        • Opcode ID: b0cb16c35e69169624afd6d036c436f49dd3db0f9e38869f6a71418b237f2555
                        • Instruction ID: 3ce450c6090f0fca4a04861d8f001f97081c6c76c2e13a574e6c27e7ac8bf1a2
                        • Opcode Fuzzy Hash: b0cb16c35e69169624afd6d036c436f49dd3db0f9e38869f6a71418b237f2555
                        • Instruction Fuzzy Hash: CB61E371E04249DFDB058EE998807AEBBFDAF8B354F244059E8A4A7A40D374C943CB64
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID:
                        • String ID: $
                        • API String ID: 0-227171996
                        • Opcode ID: 05cbaf42b832159deb634e64fcc2ce51e13062d08229133408db7c445646a859
                        • Instruction ID: e0a9b6fccee63589339e954ddc222f6ccaa0ad755ceece2140814e7224bbce7f
                        • Opcode Fuzzy Hash: 05cbaf42b832159deb634e64fcc2ce51e13062d08229133408db7c445646a859
                        • Instruction Fuzzy Hash: 956148B1D0020DEFCB54CFE8C9819EEBBB5BF49308F5089A8D415A7740D731AA95CBA4
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 6C88C11A
                        • CoCreateGuid.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,00000028), ref: 6C88C175
                        Strings
                        • %08lX%04X%04x%02X%02X%02X%02X%02X%02X%02X%02X, xrefs: 6C88C1BF
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CreateGuidH_prolog3_
                        • String ID: %08lX%04X%04x%02X%02X%02X%02X%02X%02X%02X%02X
                        • API String ID: 2971167768-1017209998
                        • Opcode ID: 7150d5af03b594e7c833c72be9700a6425a470cbeed0cbfca6787021450e7ede
                        • Instruction ID: 1d787c123cd7050a7a1139bbcdd733c0504445cdcf873b08b1d838d028359340
                        • Opcode Fuzzy Hash: 7150d5af03b594e7c833c72be9700a6425a470cbeed0cbfca6787021450e7ede
                        • Instruction Fuzzy Hash: B041A471901159AFCF21DFACC954AFEBBF9AF19314F144859E440BB681CB789E09CBA0
                        APIs
                        • GetClassInfoW.USER32(?,0000007C,?), ref: 6C8629DF
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ClassInfo
                        • String ID: Afx:%p:%x$Afx:%p:%x:%p:%p:%p
                        • API String ID: 3534257612-2801496823
                        • Opcode ID: 10a8aff15bd67079941c09952b4a7b3c184f591965c21c9c047847ad3b6e5340
                        • Instruction ID: ef16f2616a3c60958881b7be53c789061e47d91739a7b7af891bc63fbe9d164f
                        • Opcode Fuzzy Hash: 10a8aff15bd67079941c09952b4a7b3c184f591965c21c9c047847ad3b6e5340
                        • Instruction Fuzzy Hash: 2B316070900209EFDB21DFAAC944BCE7BF4FF59308F014866E515A7B10D7789A54CBA1
                        APIs
                          • Part of subcall function 6C878B72: RegCloseKey.ADVAPI32(00000000,?,?,?,6C878881,?,00000000,00000018), ref: 6C878BB7
                        • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000003,?,?,?,00000000), ref: 6C878D88
                        • RegCloseKey.ADVAPI32(00000000), ref: 6C878D91
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: Close$Value
                        • String ID: A
                        • API String ID: 299128501-3554254475
                        • Opcode ID: 7b8c088e671b908dcb109c75e5f9928a61c9bab5c383b0c9349d5d3f9971ee78
                        • Instruction ID: 0ce64fe656419d0eef535ee723fff5b82688d88565921ac28b11f0bc9ce5ab1c
                        • Opcode Fuzzy Hash: 7b8c088e671b908dcb109c75e5f9928a61c9bab5c383b0c9349d5d3f9971ee78
                        • Instruction Fuzzy Hash: 56210336600624BBCF258F68DD49AAE7FB5EF49364F20406AF904EB250EB35DD42D760
                        APIs
                        • SHGetFolderPathA.SHELL32(00000000,00000010,00000000,00000000,?), ref: 6C85CA5D
                        • DeleteFileA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 6C85CB19
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: DeleteFileFolderPath
                        • String ID: .lnk
                        • API String ID: 2724039827-24824748
                        • Opcode ID: 94889abcf65b52fdae9ff44e4437c1a32059ebbe8aa5ef7b35292e013111fdee
                        • Instruction ID: 420ea12ebfec005f87d60a7c2300939ac54f736ccd778580e410fcd9ce759457
                        • Opcode Fuzzy Hash: 94889abcf65b52fdae9ff44e4437c1a32059ebbe8aa5ef7b35292e013111fdee
                        • Instruction Fuzzy Hash: D9312D71D0424CAFCB14DFE8DA51BEEB7B4AB98704F108668E515A7780DB746A08CBA1
                        APIs
                        • GetSysColor.USER32(00000014), ref: 6C889DBF
                        • CreateDIBitmap.GDI32(?,00000028,00000004,?,00000028,00000000), ref: 6C889E38
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: BitmapColorCreate
                        • String ID: (
                        • API String ID: 2048008349-3887548279
                        • Opcode ID: d0839c10387d4c09f1ad0c9582acee781f8d40dda2baa3b54b8915eb6edd610d
                        • Instruction ID: fc1dcede185acfd7fd5654df323264b4aeb554cf3df668aa63441575906d377b
                        • Opcode Fuzzy Hash: d0839c10387d4c09f1ad0c9582acee781f8d40dda2baa3b54b8915eb6edd610d
                        • Instruction Fuzzy Hash: 81219520A1538C9BEB11CF78CC427DDB7B4BF29245F148299E545F7141EB345A88CB64
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: EmptyH_prolog3_Rect
                        • String ID: Afx:ToolBar
                        • API String ID: 2941628838-177727192
                        • Opcode ID: cbbd6076f8c1cf8d9d0956a6d123ce5f81d04211f32a14dde781d4bc6a42ae7d
                        • Instruction ID: a3667261b2bbc24cc25cdf37460aaa8a698b790c119ea5c872eb4b52783c9f5e
                        • Opcode Fuzzy Hash: cbbd6076f8c1cf8d9d0956a6d123ce5f81d04211f32a14dde781d4bc6a42ae7d
                        • Instruction Fuzzy Hash: 8E218B31A006199BCB18CFA8C945AEDBBB5AF4C324F05062DF805B7790DB34AD548BA4
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CopyInfoMonitorRect
                        • String ID: (
                        • API String ID: 2119610155-3887548279
                        • Opcode ID: 92622abb29ec88c4f085fb3147239d7c68ea899909bc001d39879d50f9155032
                        • Instruction ID: 93e59ef43146498244f85955d4f271842e55206bcdc5ae78f8d805fca770bc16
                        • Opcode Fuzzy Hash: 92622abb29ec88c4f085fb3147239d7c68ea899909bc001d39879d50f9155032
                        • Instruction Fuzzy Hash: AD11A271A01B09DFCB10DFA9C58899AB7F8FF18615B50882DE5AAE3650E734F984CF50
                        APIs
                        • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 6C877E43
                        • PathFindExtensionW.SHLWAPI(?), ref: 6C877E59
                          • Part of subcall function 6C877905: __EH_prolog3_GS.LIBCMT ref: 6C87790F
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: ExtensionFileFindH_prolog3_ModuleNamePath
                        • String ID: %Ts%Ts.dll
                        • API String ID: 3433622546-1896370695
                        • Opcode ID: 05d07fe1403523d61bcdaece7c3619232ade9a2e36657c8e89dde2cea3ad359c
                        • Instruction ID: 6fcdc4dcbe62accc5a25b3efdd4eb62d0845c08ddec577695eb1436b367241b6
                        • Opcode Fuzzy Hash: 05d07fe1403523d61bcdaece7c3619232ade9a2e36657c8e89dde2cea3ad359c
                        • Instruction Fuzzy Hash: 1C018632A11119ABDB22EFA4DD49ADFB3F8EF09704F5144669515E7540EB30EA09CBA0
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8E71C0
                        • RegisterWindowMessageW.USER32(00000010,00000004,6C8E6F25,00000000,00000000,0000005C,6C89199F,?,00000550), ref: 6C8E720A
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: H_prolog3MessageRegisterWindow
                        • String ID: ToolbarButton%p
                        • API String ID: 875023513-899657487
                        • Opcode ID: 48edb9e6101e4ab0ca607b06e901571e80ac11d861216447fe315806c803e76a
                        • Instruction ID: 2214cf5aee40af2116c3b7143f91fd90bd70ca4d6fdf148003a411ff0335b6e5
                        • Opcode Fuzzy Hash: 48edb9e6101e4ab0ca607b06e901571e80ac11d861216447fe315806c803e76a
                        • Instruction Fuzzy Hash: 48F0D1799002528BCF20ABE98D04BE972706F06308F544C59F461A7B81EF7899098BA9
                        APIs
                        • __EH_prolog3.LIBCMT ref: 6C8C5D75
                        • FindResourceW.KERNEL32(?,?,STYLE_XML,?,?,00000004,6C88A807,00000000,00000000), ref: 6C8C5DB3
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: FindH_prolog3Resource
                        • String ID: STYLE_XML
                        • API String ID: 3036663282-3909253476
                        • Opcode ID: ec1902d4e618571db94347edce15c664980dbd24da89295f4174fd6ec1eaa5f1
                        • Instruction ID: b613ed3e5ba6322592858f4d41404f953c8556a73b2c5fce06288361c08620de
                        • Opcode Fuzzy Hash: ec1902d4e618571db94347edce15c664980dbd24da89295f4174fd6ec1eaa5f1
                        • Instruction Fuzzy Hash: 0BF0C2717003119BCF34ABB98E444AEB778BFA934A7080D35E11AE6B40CB34C405D662
                        APIs
                          • Part of subcall function 6C841E90: GetLastError.KERNEL32 ref: 6C841EC9
                          • Part of subcall function 6C841E90: _HRESULT_FROM_WIN32.LIBCMTD ref: 6C841ED0
                        • IsDebuggerPresent.KERNEL32(?,?,?,6C841C6B), ref: 6C9A08AC
                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,6C841C6B), ref: 6C9A08BB
                        Strings
                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 6C9A08B6
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: DebugDebuggerErrorLastOutputPresentString
                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                        • API String ID: 389471666-631824599
                        • Opcode ID: a23fbf35468f165f49f318ff1e513f6929d7a7ce901f7379664e93e4394d65f1
                        • Instruction ID: a58c98292632c942287dfd99afae2c315376947fd93595ccdfc1e8f5219a86e3
                        • Opcode Fuzzy Hash: a23fbf35468f165f49f318ff1e513f6929d7a7ce901f7379664e93e4394d65f1
                        • Instruction Fuzzy Hash: 88E06D71201B818BDBA49FBCE5043867BF4AF11748F108D6CD497C6B00EBB6E4898BA5
                        APIs
                        • EnterCriticalSection.KERNEL32(6CA38B60,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6B3
                        • InitializeCriticalSection.KERNEL32(00000000,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6C9
                        • LeaveCriticalSection.KERNEL32(6CA38B60,?,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498), ref: 6C87F6D7
                        • EnterCriticalSection.KERNEL32(00000000,?,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498,00000120), ref: 6C87F6E4
                          • Part of subcall function 6C87F65E: InitializeCriticalSection.KERNEL32(6CA38B60,6C87F69C,?,?,6C87CDB6,00000010,00000008,6C87B7A1,6C87B7E4,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498,00000120), ref: 6C87F676
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterInitialize$Leave
                        • String ID:
                        • API String ID: 713024617-0
                        • Opcode ID: 307da8b4b3efe3c32501d62274773063846413ea27dd8ac664c163ed5ab1685d
                        • Instruction ID: 5d52be5ea37d446602f429554e102c0bc37985ff9732cefd01d53dfd7b48939b
                        • Opcode Fuzzy Hash: 307da8b4b3efe3c32501d62274773063846413ea27dd8ac664c163ed5ab1685d
                        • Instruction Fuzzy Hash: E3F022B2A083199BDF305F5ACD58B1C763CAF6331AF50142BF009E2A00D730DC82CAA6
                        APIs
                        • EnterCriticalSection.KERNEL32(6CA388F0,?,?,?,?,6C87CE99,00000000,00000004,6C87B787,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498,00000120), ref: 6C87CEA9
                        • TlsGetValue.KERNEL32(6CA388D4,?,?,?,?,6C87CE99,00000000,00000004,6C87B787,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498,00000120), ref: 6C87CEBD
                        • LeaveCriticalSection.KERNEL32(6CA388F0,?,?,?,?,6C87CE99,00000000,00000004,6C87B787,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498,00000120), ref: 6C87CED7
                        • LeaveCriticalSection.KERNEL32(6CA388F0,?,?,?,?,6C87CE99,00000000,00000004,6C87B787,6C863ABF,6C87116D,?,6C876CE6,00000004,6C877498,00000120), ref: 6C87CEE2
                        Memory Dump Source
                        • Source File: 00000003.00000002.1696297062.000000006C841000.00000020.00000001.01000000.00000006.sdmp, Offset: 6C840000, based on PE: true
                        • Associated: 00000003.00000002.1696283332.000000006C840000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696407461.000000006C9DB000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696445167.000000006CA31000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696459019.000000006CA33000.00000008.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696473487.000000006CA38000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000003.00000002.1696487145.000000006CA3C000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6c840000_Update.jbxd
                        Similarity
                        • API ID: CriticalSection$Leave$EnterValue
                        • String ID:
                        • API String ID: 3969253408-0
                        • Opcode ID: 5d1302302eff213f041bf2cfa60b7657ced672bf50fba389da9c569861205623
                        • Instruction ID: 528591611731660552ad9a5019a62a2eabca258b553fe2c2cefd924176523082
                        • Opcode Fuzzy Hash: 5d1302302eff213f041bf2cfa60b7657ced672bf50fba389da9c569861205623
                        • Instruction Fuzzy Hash: FAF06D372055189BEB20EF15C98485EF738AF057A532544AAE806E7A23DB31F885CAB0